Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-vk37-s4p6-fufm
Summary
runc container escape with malicious config due to /dev/console mount and related races
### Impact ###
This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). 

In runc version 1.0.0-rc3 and later, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This happens after `pivot_root(2)`, so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of `/proc/sysrq-trigger` or `/proc/sys/kernel/core_pattern` (respectively). 

The reason that the attacker can gain write access to these files is because the `/dev/console` bind-mount happens before `maskedPaths` and `readonlyPaths` are applied.

#### Additional Findings ####
While investigating this issue, runc discovered some other theoretical issues that may or may not be exploitable, as well as taking the opportunity to fix some fairly well-known issues related to consoles.

##### Issue 1: Problematic Usage of `os.Create` #####
Go provides an `os.Create` function for creating files, which older code in runc (dating back to the original `libcontainer` from the early 2010s) had a tendency to use fairly liberally. `os.Create` implies `O_CREAT|O_TRUNC` but by design it does not apply `O_NOFOLLOW` nor `O_EXCL`, meaning if the target is swapped with a malicious symlink runc can be tricked into truncating host files (which can lead to denial of service attacks, among other concerns). 

Runc conducted an audit of all `os.Create` usages in runc and found some suspicious usages related to device inodes, but based on runc's testing these were not exploitable in practice. Runc now has custom code lints to block any `os.Create` usage in runc, and plan to do a further audit of any other plain `os.*` operation usage throughout runc after this advisory becomes public. 

CVE-2024-45310 was a similar attack but without the `O_TRUNC` component (which resulted in a "Low" severity) -- a similar attack being exploitable would've been much more severe.

##### Issue 2: Malicious `/dev/pts/$n` Inode Attacks (`TIOCGPTPEER`) #####
The (very) classic API for constructing consoles involves first opening `/dev/ptmx` for reading and writing. This allocates a new pseudo-terminal and the returned file descriptor is the "master" end (which is used by higher-level runtimes to do I/O with the container). 

Traditionally, in order to get the "slave" end, you do `ioctl(ptm, TIOCGPTN)` to get the pseudo-terminal number and then open the file in `/dev/pts/` with the corresponding base-10 decimal number of the number returned by `TIOCGPTN`. The naive way of doing this is vulnerable to very basic race attacks where `/dev/pts/$n` is replaced with a different pseudo-terminal or other malicious file. 

In order to provide a mechanism to mitigate this risk, Aleksa Sarai (@cyphar from SUSE) implemented `TIOCGPTPEER` back in 2017 to provide a race-free way of doing the last `TIOCGPTN` step by opening the peer end of the pseudo-terminal directly. However, at the time it was believed to be too impractical to implement this protection in runc due to its no-monitor-process architecture (unlike runtimes like LXC which made use of `TIOCGPTPEER` almost immediately). While working on this advisory, runc found a way to make `TIOCGPTN` usage on pre-4.13 kernels still safe against race attacks and so have implemented both `TIOCGPTPEER` support as well as safe `TIOCGPTN` support as a fallback. 

Another possible target of attack would be replacing `/dev/ptmx` or `/dev/pts/ptmx` with a different inode and tricking runc into trying to operate on it. This is very similar to the core issue in CVE-2025-31133 and had a similar solution. 

Runc's analysis was that while this attack appears to be potentially problematic in theory, it seems unlikely to actually be exploitable due to how consoles are treated (runc tries to do several pseudo-terminal-specific `ioctl`s and will error out if they fail -- which happens for most other file types). In principle you could imagine a DoS attack using a disconnected NFS handle but it seems impractical to exploit. However, runc felt it prudent to include a solution (and this also provides a safe mechanism to get the source mount for the `/dev/console` bind-mount issue at the beginning of this advisory).

### Patches ###
This advisory is being published as part of a set of three advisories:

  * CVE-2025-31133
  * CVE-2025-52881
  * CVE-2025-52565

The patches fixing this issue have accordingly been combined into a single patchset. The following patches from that patchset resolve the issues in this advisory:

 * db19bbed5348 ("internal/sys: add VerifyInode helper")
 * ff94f9991bd3 ("*: switch to safer securejoin.Reopen")
 * 531ef794e4ec ("console: use TIOCGPTPEER when allocating peer PTY")
 * 398955bccb7f ("console: add fallback for pre-TIOCGPTPEER kernels")
 * 9be1dbf4ac67 ("console: avoid trivial symlink attacks for /dev/console")
 * de87203e625c ("console: verify /dev/pts/ptmx before use")
 * 01de9d65dc72 ("rootfs: avoid using os.Create for new device inodes")
 * aee7d3fe355d ("ci: add lint to forbid the usage of os.Create")

runc 1.2.8, 1.3.3, and 1.4.0-rc.3 have been released and all contain fixes for these issues. As per [runc's new release model](https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md), runc 1.1.x and earlier are no longer supported and thus have not been patched.

[CVE-2025-31133]: https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
[CVE-2025-52565]: https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
[CVE-2025-52881]: https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
[RELEASES.md]: https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md

### Mitigations ###
* Use containers with user namespaces (with the host root user not mapped into the container's user namespace). This will block most of the most serious aspects of these attacks, as the `procfs` files used for the container breakout use Unix DAC permissions and user namespaced users will not have access to the relevant files. 

An attacker would still be able to bind-mount host paths into the container but if the host uids and gids mapped into the container do not overlap with ordinary users on the host (which is the generally recommended configuration) then the attacker would likely not be able to read or write to most sensitive host files (depending on the Unix DAC permissions of the host files). Note that this is still technically more privilege than an unprivileged user on the host -- because the bind-mount is done by a privileged process, the attacker would be able to get access to directories whose parents may have denied search access (i.e., they may be able to access paths inside a `chmod 700` directory that would normally block them from resolving subpaths). 

Runc would also like to take this opportunity to re-iterate that runc **strongly** recommend all users use user namespaced containers. They have proven to be one of the best security hardening mechanisms against container breakouts, and the kernel applies additional restrictions to user namespaced containers above and beyond the user remapping functionality provided. With the advent of id-mapped mounts (Linux 5.12), there is very little reason to not use user namespaces for most applications. Note that using user namespaces to configure your container does not mean you have to enable unprivileged user namespace creation *inside* the container -- most container runtimes apply a seccomp-bpf profile which blocks `unshare(CLONE_NEWUSER)` inside containers regardless of whether the container itself uses user namespaces. 

Rootless containers can provide even more protection if your configuration can use them -- by having runc itself be an unprivileged process, in general you would expect the impact scope of a runc bug to be less severe as it would only have the privileges afforded to the host user which spawned runc. 

 * For non-user namespaced containers, configure all containers you spawn to not permit processes to run with root privileges. In most cases this would require configuring the container to use a non-root user and enabling `noNewPrivileges` to disable any setuid or set-capability binaries. (Note that this is runc's general recommendation for a secure container setup -- it is very difficult, if not impossible, to run an untrusted program with root privileges safely.) If you need to use `ping` in your containers, there is a `net.ipv4.ping_group_range` sysctl that can be used to allow unprivileged users to ping without requiring setuid or set-capability binaries. 
 * Do not run untrusted container images from unknown or unverified sources.
 * The default `containers-selinux` SELinux policy mitigates this issue, as (unlike CVE-2025-31133) the `/dev/console` bind-mount does not get relabeled and so the container process cannot write to the bind-mounted procfs file by default.

   Please note that CVE-2025-52881 allows an attacker to bypass LSM labels, and so this mitigation is not that helpful when considered in combination with CVE-2025-52881.

 * The default AppArmor policy used by Docker and Podman does not mitigate this issue (as access to `/dev/console`) is usually permitted. Users could create a custom profile that blocks access to `/dev/console`, but such a profile might break regular containers.

   Please note that CVE-2025-52881 allows an attacker to bypass LSM labels, and so the mitigation provided with a custom profile is not that helpful when considered in combination with CVE-2025-52881.

[CVE-2025-31133]: https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
[CVE-2025-52881]: https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm

### Other Runtimes ###
As this vulnerability boils down to a fairly easy-to-make logic bug,runc has provided information to other OCI (crun, youki) and non-OCI (LXC) container runtimes about this vulnerability.

Based on discussions with other runtimes, it seems that crun and youki may have similar security issues and will release a co-ordinated security release along with runc. LXC appears to also be vulnerable in some aspects, but [their security stance][lxc-security] is (understandably) that non-user-namespaced containers are fundamentally insecure by design.

[lxc-security]: https://linuxcontainers.org/lxc/security/

### Credits ###

Thanks to Lei Wang (@ssst0n3 from Huawei) and Li Fubang (@lifubang from acmcoder.com, CIIC) for discovering and reporting the main `/dev/console` bind-mount vulnerability, as well as Aleksa Sarai (@cyphar from SUSE) for discovering Issues 1 and 2 and the original research into these classes of issues several years ago.
Aliases
0
alias CVE-2025-52565
1
alias GHSA-qw9x-cqr3-wc7r
Fixed_packages
0
url pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=aarch64&distroversion=v3.22&reponame=community
1
url pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=riscv64&distroversion=v3.22&reponame=community
2
url pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=aarch64&distroversion=edge&reponame=community
3
url pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armhf&distroversion=edge&reponame=community
4
url pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armv7&distroversion=edge&reponame=community
5
url pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=loongarch64&distroversion=edge&reponame=community
6
url pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=ppc64le&distroversion=edge&reponame=community
7
url pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=riscv64&distroversion=edge&reponame=community
8
url pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=s390x&distroversion=edge&reponame=community
9
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86&distroversion=edge&reponame=community
10
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86_64&distroversion=edge&reponame=community
11
url pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armhf&distroversion=v3.22&reponame=community
12
url pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armv7&distroversion=v3.22&reponame=community
13
url pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
14
url pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
15
url pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=s390x&distroversion=v3.22&reponame=community
16
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86&distroversion=v3.22&reponame=community
17
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86_64&distroversion=v3.22&reponame=community
18
url pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=aarch64&distroversion=v3.23&reponame=community
19
url pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armhf&distroversion=v3.23&reponame=community
20
url pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armv7&distroversion=v3.23&reponame=community
21
url pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
22
url pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
23
url pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
24
url pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=s390x&distroversion=v3.23&reponame=community
25
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86&distroversion=v3.23&reponame=community
26
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
27
url pkg:deb/debian/runc@1.0.3%2Bds1-1
purl pkg:deb/debian/runc@1.0.3%2Bds1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.3%252Bds1-1
28
url pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.3%252Bds1-2%3Fdistro=trixie
29
url pkg:deb/debian/runc@1.3.3%2Bds1-2
purl pkg:deb/debian/runc@1.3.3%2Bds1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.3%252Bds1-2
30
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
31
url pkg:golang/github.com/opencontainers/runc@1.2.8
purl pkg:golang/github.com/opencontainers/runc@1.2.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/opencontainers/runc@1.2.8
32
url pkg:golang/github.com/opencontainers/runc@1.3.3
purl pkg:golang/github.com/opencontainers/runc@1.3.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/opencontainers/runc@1.3.3
33
url pkg:golang/github.com/opencontainers/runc@1.4.0-rc.3
purl pkg:golang/github.com/opencontainers/runc@1.4.0-rc.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/opencontainers/runc@1.4.0-rc.3
Affected_packages
0
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1
3
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.1.15%2Bds1-2
purl pkg:deb/debian/runc@1.1.15%2Bds1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2
5
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
6
url pkg:rpm/redhat/runc@4:1.2.5-3?arch=el9_6
purl pkg:rpm/redhat/runc@4:1.2.5-3?arch=el9_6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.5-3%3Farch=el9_6
7
url pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_0
purl pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mt76-ah1b-s3gc
2
vulnerability VCID-vk37-s4p6-fufm
3
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1%3Farch=el9_0
8
url pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_4
purl pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mt76-ah1b-s3gc
2
vulnerability VCID-vk37-s4p6-fufm
3
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1%3Farch=el9_4
9
url pkg:rpm/redhat/runc@4:1.2.9-1.el9_2?arch=1
purl pkg:rpm/redhat/runc@4:1.2.9-1.el9_2?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mt76-ah1b-s3gc
2
vulnerability VCID-vk37-s4p6-fufm
3
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.el9_2%3Farch=1
10
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.16?arch=el8
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.16?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.16%3Farch=el8
11
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el8
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17%3Farch=el8
12
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el9
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17%3Farch=el9
13
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.18?arch=el8
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.18?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.18%3Farch=el8
14
url pkg:rpm/redhat/runc@4:1.3.0-4?arch=el9_7
purl pkg:rpm/redhat/runc@4:1.3.0-4?arch=el9_7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.3.0-4%3Farch=el9_7
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52565.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-52565
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04296
published_at 2026-04-08T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04268
published_at 2026-04-13T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04289
published_at 2026-04-12T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04303
published_at 2026-04-11T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04265
published_at 2026-04-07T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04311
published_at 2026-04-09T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04617
published_at 2026-04-04T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05376
published_at 2026-04-16T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06685
published_at 2026-04-18T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06842
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08657
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-52565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52565
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
5
reference_url https://github.com/opencontainers/runc/commit/01de9d65dc72f67b256ef03f9bfb795a2bf143b4
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/01de9d65dc72f67b256ef03f9bfb795a2bf143b4
6
reference_url https://github.com/opencontainers/runc/commit/398955bccb7f20565c224a3064d331c19e422398
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/398955bccb7f20565c224a3064d331c19e422398
7
reference_url https://github.com/opencontainers/runc/commit/531ef794e4ecd628006a865ad334a048ee2b4b2e
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/531ef794e4ecd628006a865ad334a048ee2b4b2e
8
reference_url https://github.com/opencontainers/runc/commit/9be1dbf4ac67d9840a043ebd2df5c68f36705d1d
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/9be1dbf4ac67d9840a043ebd2df5c68f36705d1d
9
reference_url https://github.com/opencontainers/runc/commit/aee7d3fe355dd02939d44155e308ea0052e0d53a
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/aee7d3fe355dd02939d44155e308ea0052e0d53a
10
reference_url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
11
reference_url https://github.com/opencontainers/runc/commit/de87203e625cd7a27141fb5f2ad00a320c69c5e8
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/de87203e625cd7a27141fb5f2ad00a320c69c5e8
12
reference_url https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480
13
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-52565
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-52565
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
reference_id 1120140
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2404708
reference_id 2404708
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2404708
17
reference_url https://access.redhat.com/errata/RHSA-2025:19927
reference_id RHSA-2025:19927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19927
18
reference_url https://access.redhat.com/errata/RHSA-2025:20957
reference_id RHSA-2025:20957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20957
19
reference_url https://access.redhat.com/errata/RHSA-2025:21232
reference_id RHSA-2025:21232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21232
20
reference_url https://access.redhat.com/errata/RHSA-2025:21795
reference_id RHSA-2025:21795
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21795
21
reference_url https://access.redhat.com/errata/RHSA-2025:21824
reference_id RHSA-2025:21824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21824
22
reference_url https://access.redhat.com/errata/RHSA-2025:23078
reference_id RHSA-2025:23078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23078
23
reference_url https://access.redhat.com/errata/RHSA-2025:23079
reference_id RHSA-2025:23079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23079
24
reference_url https://access.redhat.com/errata/RHSA-2025:23080
reference_id RHSA-2025:23080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23080
25
reference_url https://access.redhat.com/errata/RHSA-2025:23202
reference_id RHSA-2025:23202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23202
26
reference_url https://access.redhat.com/errata/RHSA-2025:23204
reference_id RHSA-2025:23204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23204
27
reference_url https://access.redhat.com/errata/RHSA-2025:23205
reference_id RHSA-2025:23205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23205
28
reference_url https://access.redhat.com/errata/RHSA-2025:23209
reference_id RHSA-2025:23209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23209
29
reference_url https://access.redhat.com/errata/RHSA-2025:23449
reference_id RHSA-2025:23449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23449
30
reference_url https://access.redhat.com/errata/RHSA-2026:0315
reference_id RHSA-2026:0315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0315
31
reference_url https://access.redhat.com/errata/RHSA-2026:0331
reference_id RHSA-2026:0331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0331
32
reference_url https://access.redhat.com/errata/RHSA-2026:0418
reference_id RHSA-2026:0418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0418
33
reference_url https://access.redhat.com/errata/RHSA-2026:0425
reference_id RHSA-2026:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0425
34
reference_url https://access.redhat.com/errata/RHSA-2026:0676
reference_id RHSA-2026:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0676
35
reference_url https://access.redhat.com/errata/RHSA-2026:0701
reference_id RHSA-2026:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0701
36
reference_url https://access.redhat.com/errata/RHSA-2026:0995
reference_id RHSA-2026:0995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0995
37
reference_url https://access.redhat.com/errata/RHSA-2026:1540
reference_id RHSA-2026:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1540
38
reference_url https://access.redhat.com/errata/RHSA-2026:3461
reference_id RHSA-2026:3461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3461
39
reference_url https://access.redhat.com/errata/RHSA-2026:3462
reference_id RHSA-2026:3462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3462
40
reference_url https://access.redhat.com/errata/RHSA-2026:4531
reference_id RHSA-2026:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4531
41
reference_url https://access.redhat.com/errata/RHSA-2026:4693
reference_id RHSA-2026:4693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4693
42
reference_url https://access.redhat.com/errata/RHSA-2026:6492
reference_id RHSA-2026:6492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6492
43
reference_url https://access.redhat.com/errata/RHSA-2026:8325
reference_id RHSA-2026:8325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8325
44
reference_url https://usn.ubuntu.com/7851-1/
reference_id USN-7851-1
reference_type
scores
url https://usn.ubuntu.com/7851-1/
Weaknesses
0
cwe_id 363
name Race Condition Enabling Link Following
description The product checks the status of a file or directory before accessing it, which produces a race condition in which the file can be replaced with a link before the access is performed, causing the product to access the wrong file.
1
cwe_id 61
name UNIX Symbolic Link (Symlink) Following
description The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.
2
cwe_id 59
name Improper Link Resolution Before File Access ('Link Following')
description The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-vk37-s4p6-fufm