Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-wxsf-mu1t-aqa4
Summary
runc container escape and denial of service due to arbitrary write gadgets and procfs write redirects
### Impact ###

This attack is primarily a more sophisticated version of CVE-2019-19921, which was a flaw which allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy `tmpfs` file and thus not apply the correct LSM labels to the container process. The mitigation runc applied for CVE-2019-19921 was fairly limited and effectively only caused runc to verify that when runc writes LSM labels that those labels are actual procfs files.

Rather than using a fake `tmpfs` file for `/proc/self/attr/<label>`, an attacker could instead (through various means) make `/proc/self/attr/<label>` reference a real `procfs` file, but one that would still be a no-op (such as `/proc/self/sched`). This would have the same effect but would clear the "is a procfs file" check. Runc is aware that this kind of attack would be possible (even going so far as to discuss this publicly as "future work" at conferences), and runc is working on a far more comprehensive mitigation of this attack, but this security issue was disclosed before runc could complete this work.

In all known versions of runc, an attacker can trick runc into misdirecting writes to `/proc` to other procfs files through the use of a racing container with shared mounts (runc has also verified this attack is possible to exploit using a standard Dockerfile with `docker buildx build` as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a `tmpfs` or theoretically other methods such as regular bind-mounts.

Note that while `/proc/self/attr/<label>` was the example used above (which is LSM-specific), this issue affect all writes to `/proc` in runc and thus also affects sysctls (written to `/proc/sys/...`) and some other APIs.

#### Additional Impacts ####

While investigating this issue, runc discovered that another risk with these redirected writes is that they could be redirected to dangerous files such as `/proc/sysrq-trigger` rather than just no-op files like `/proc/self/sched`. For instance, the default AppArmor profile name in Docker is `docker-default`, which when written to `/proc/sysrq-trigger` would cause the host system to crash.

When this was discovered, runc conducted an audit of other write operations within runc and found several possible areas where runc could be used as a semi-arbitrary write gadget when combined with the above race attacks. The most concerning attack scenario was the configuration of sysctls. Because the contents of the sysctl are free-form text, an attacker could use a misdirected write to write to `/proc/sys/kernel/core_pattern` and break out of the container (as described in CVE-2025-31133, kernel upcalls are not namespaced and so coredump helpers will run with complete root privileges on the host). Even if the attacker cannot configure custom sysctls, a valid sysctl string (when redirected to `/proc/sysrq-trigger`) can easily cause the machine to hang.

Note that the fact that this attack allows you to disable LSM labels makes it a very useful attack to combine with CVE-2025-31133 (as one of the only mitigations available to most users for that issue is AppArmor, and this attack would let you bypass that). However, the misdirected write issue above means that you could also achieve most of the same goals without needing to chain together attacks.

### Patches ###

This advisory is being published as part of a set of three advisories:

  * CVE-2025-31133
  * CVE-2025-52881
  * CVE-2025-52565

The patches fixing this issue have accordingly been combined into a single patchset. The following patches from that patchset resolve the issues in this advisory:

 * db19bbed5348 ("internal/sys: add VerifyInode helper")
 * 6fc191449109 ("internal: move utils.MkdirAllInRoot to internal/pathrs")
 * ff94f9991bd3 ("*: switch to safer securejoin.Reopen")
 * 44a0fcf685db ("go.mod: update to github.com/cyphar/filepath-securejoin@v0.5.0")
 * 77889b56db93 ("internal: add wrappers for securejoin.Proc*")
 * fdcc9d3cad2f ("apparmor: use safe procfs API for labels")
 * ff6fe1324663 ("utils: use safe procfs for /proc/self/fd loop code")
 * b3dd1bc562ed ("utils: remove unneeded EnsureProcHandle")
 * 77d217c7c377 ("init: write sysctls using safe procfs API")
 * 435cc81be6b7 ("init: use securejoin for /proc/self/setgroups")
 * d61fd29d854b ("libct/system: use securejoin for /proc/$pid/stat")
 * 4b37cd93f86e ("libct: align param type for mountCgroupV1/V2 functions")
 * d40b3439a961 ("rootfs: switch to fd-based handling of mountpoint targets")
 * ed6b1693b8b3 ("selinux: use safe procfs API for labels")
   - Please note that this patch includes a private patch for `github.com/opencontainers/selinux` that could not be made public through a public pull request (as it would necessarily disclose this embargoed security issue).

     The patch includes a complete copy of the forked code and a `replace` directive (as well as `go mod vendor` applied), which should still work with downstream build systems. If you cannot apply this patch, you can safely drop it -- some of the other patches in this series should block these kinds of racing mount attacks entirely.

     See https://github.com/opencontainers/selinux/pull/237 for the upstream patch.
 * 3f925525b44d ("rootfs: re-allow dangling symlinks in mount targets")
 * a41366e74080 ("openat2: improve resilience on busy systems")

runc 1.2.8, 1.3.3, and 1.4.0-rc.3 have been released and all contain fixes for these issues. As per [runc's new release model][RELEASES.md], runc 1.1.x and earlier are no longer supported and thus have not been patched.

[CVE-2025-31133]: https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
[CVE-2025-52565]: https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
[CVE-2025-52881]: https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
[RELEASES.md]: https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md

### Mitigations ###

 * Do not run untrusted container images from unknown or unverified sources.

 * For the basic no-op attack, this attack allows a container process to run with the same LSM labels as `runc`. For most AppArmor deployments this means it will be `unconfined`, and for SELinux it will likely be `container_runtime_t`. Runc has not conducted in-depth testing of the impact on SELinux -- it is possible that it provides some reasonable protection but it seems likely that an attacker could cause harm to systems even with such an SELinux setup.

 * For the more involved redirect and write gadget attacks, unfortunately most LSM profiles (including the standard container-selinux profiles) provide the container runtime access to sysctl files (including `/proc/sysrq-trigger`) and so LSMs likely do not provide much protection against these attacks.

 * Using rootless containers provides some protection against these kinds of bugs (privileged writes in runc being redirected) -- by having runc itself be an unprivileged process, in general you would expect the impact scope of a runc bug to be less severe as it would only have the privileges afforded to the host user which spawned runc. For this particular bug, the privilege escalation caused by the inadvertent write issue is entirely mitigated with rootless containers because the unprivileged user that the `runc` process is executing as cannot write to the aforementioned procfs files (even intentionally).

### Other Runtimes ###

As this vulnerability boils down to a fairly easy-to-make logic bug, runc has provided information to other OCI (crun, youki) and non-OCI (LXC) container runtimes about this vulnerability.

Based on discussions with other runtimes, it seems that crun and youki may have similar security issues and will release a co-ordinated security release along with runc. LXC appears to use the host's `/proc` for all procfs operations, and so is likely not vulnerable to this issue (this is a trade-off -- runc uses the container's procfs to avoid CVE-2016-9962-style attacks).

[CVE-2016-9962]: https://seclists.org/fulldisclosure/2017/Jan/21

### Credits ###

Thanks to Li Fubang (@lifubang from acmcoder.com, CIIC) and Tõnis Tiigi (@tonistiigi from Docker) for both independently discovering this vulnerability, as well as Aleksa Sarai (@cyphar from SUSE) for the original research into this class of security issues and solutions.

Additional thanks go to Tõnis Tiigi for finding some very useful exploit templates for these kinds of race attacks using `docker buildx build`.
Aliases
0
alias CVE-2025-52881
1
alias GHSA-cgrx-mc8f-2prm
Fixed_packages
0
url pkg:apk/alpine/buildah@1.41.6-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/buildah@1.41.6-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.41.6-r0%3Farch=armhf&distroversion=v3.22&reponame=community
1
url pkg:apk/alpine/buildah@1.41.6-r0?arch=x86&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/buildah@1.41.6-r0?arch=x86&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.41.6-r0%3Farch=x86&distroversion=v3.22&reponame=community
2
url pkg:apk/alpine/buildah@1.41.6-r0?arch=armv7&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/buildah@1.41.6-r0?arch=armv7&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.41.6-r0%3Farch=armv7&distroversion=v3.22&reponame=community
3
url pkg:apk/alpine/buildah@1.41.6-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/buildah@1.41.6-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.41.6-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
4
url pkg:apk/alpine/buildah@1.41.6-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/buildah@1.41.6-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.41.6-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
5
url pkg:apk/alpine/buildah@1.41.6-r0?arch=riscv64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/buildah@1.41.6-r0?arch=riscv64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.41.6-r0%3Farch=riscv64&distroversion=v3.22&reponame=community
6
url pkg:apk/alpine/buildah@1.41.6-r0?arch=aarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/buildah@1.41.6-r0?arch=aarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.41.6-r0%3Farch=aarch64&distroversion=v3.22&reponame=community
7
url pkg:apk/alpine/buildah@1.41.6-r0?arch=s390x&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/buildah@1.41.6-r0?arch=s390x&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.41.6-r0%3Farch=s390x&distroversion=v3.22&reponame=community
8
url pkg:apk/alpine/buildah@1.41.6-r0?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/buildah@1.41.6-r0?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.41.6-r0%3Farch=x86_64&distroversion=v3.22&reponame=community
9
url pkg:apk/alpine/buildah@1.42.1-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community
10
url pkg:apk/alpine/buildah@1.42.1-r0?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=riscv64&distroversion=edge&reponame=community
11
url pkg:apk/alpine/buildah@1.42.1-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=armhf&distroversion=v3.23&reponame=community
12
url pkg:apk/alpine/buildah@1.42.1-r0?arch=armv7&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=armv7&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=armv7&distroversion=v3.23&reponame=community
13
url pkg:apk/alpine/buildah@1.42.1-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
14
url pkg:apk/alpine/buildah@1.42.1-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=armhf&distroversion=edge&reponame=community
15
url pkg:apk/alpine/buildah@1.42.1-r0?arch=s390x&distroversion=edge&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=s390x&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=s390x&distroversion=edge&reponame=community
16
url pkg:apk/alpine/buildah@1.42.1-r0?arch=aarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=aarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=aarch64&distroversion=edge&reponame=community
17
url pkg:apk/alpine/buildah@1.42.1-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=armv7&distroversion=edge&reponame=community
18
url pkg:apk/alpine/buildah@1.42.1-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=x86&distroversion=edge&reponame=community
19
url pkg:apk/alpine/buildah@1.42.1-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=x86_64&distroversion=edge&reponame=community
20
url pkg:apk/alpine/buildah@1.42.1-r0?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=aarch64&distroversion=v3.23&reponame=community
21
url pkg:apk/alpine/buildah@1.42.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
22
url pkg:apk/alpine/buildah@1.42.1-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
23
url pkg:apk/alpine/buildah@1.42.1-r0?arch=s390x&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=s390x&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=s390x&distroversion=v3.23&reponame=community
24
url pkg:apk/alpine/buildah@1.42.1-r0?arch=x86&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=x86&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=x86&distroversion=v3.23&reponame=community
25
url pkg:apk/alpine/buildah@1.42.1-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
26
url pkg:apk/alpine/buildah@1.42.1-r0?arch=ppc64le&distroversion=edge&reponame=community
purl pkg:apk/alpine/buildah@1.42.1-r0?arch=ppc64le&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.42.1-r0%3Farch=ppc64le&distroversion=edge&reponame=community
27
url pkg:apk/alpine/podman@5.6.2-r1?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/podman@5.6.2-r1?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.6.2-r1%3Farch=x86_64&distroversion=v3.22&reponame=community
28
url pkg:apk/alpine/podman@5.6.2-r1?arch=armv7&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/podman@5.6.2-r1?arch=armv7&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.6.2-r1%3Farch=armv7&distroversion=v3.22&reponame=community
29
url pkg:apk/alpine/podman@5.6.2-r1?arch=aarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/podman@5.6.2-r1?arch=aarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.6.2-r1%3Farch=aarch64&distroversion=v3.22&reponame=community
30
url pkg:apk/alpine/podman@5.6.2-r1?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/podman@5.6.2-r1?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.6.2-r1%3Farch=armhf&distroversion=v3.22&reponame=community
31
url pkg:apk/alpine/podman@5.6.2-r1?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/podman@5.6.2-r1?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.6.2-r1%3Farch=loongarch64&distroversion=v3.22&reponame=community
32
url pkg:apk/alpine/podman@5.6.2-r1?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/podman@5.6.2-r1?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.6.2-r1%3Farch=ppc64le&distroversion=v3.22&reponame=community
33
url pkg:apk/alpine/podman@5.6.2-r1?arch=riscv64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/podman@5.6.2-r1?arch=riscv64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.6.2-r1%3Farch=riscv64&distroversion=v3.22&reponame=community
34
url pkg:apk/alpine/podman@5.6.2-r1?arch=s390x&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/podman@5.6.2-r1?arch=s390x&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.6.2-r1%3Farch=s390x&distroversion=v3.22&reponame=community
35
url pkg:apk/alpine/podman@5.6.2-r1?arch=x86&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/podman@5.6.2-r1?arch=x86&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.6.2-r1%3Farch=x86&distroversion=v3.22&reponame=community
36
url pkg:apk/alpine/podman@5.7.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
37
url pkg:apk/alpine/podman@5.7.0-r0?arch=x86&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=x86&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=x86&distroversion=v3.23&reponame=community
38
url pkg:apk/alpine/podman@5.7.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
39
url pkg:apk/alpine/podman@5.7.0-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=armv7&distroversion=edge&reponame=community
40
url pkg:apk/alpine/podman@5.7.0-r0?arch=armv7&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=armv7&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=armv7&distroversion=v3.23&reponame=community
41
url pkg:apk/alpine/podman@5.7.0-r0?arch=aarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=aarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=aarch64&distroversion=edge&reponame=community
42
url pkg:apk/alpine/podman@5.7.0-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=armhf&distroversion=edge&reponame=community
43
url pkg:apk/alpine/podman@5.7.0-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=loongarch64&distroversion=edge&reponame=community
44
url pkg:apk/alpine/podman@5.7.0-r0?arch=ppc64le&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=ppc64le&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=ppc64le&distroversion=edge&reponame=community
45
url pkg:apk/alpine/podman@5.7.0-r0?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=riscv64&distroversion=edge&reponame=community
46
url pkg:apk/alpine/podman@5.7.0-r0?arch=s390x&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=s390x&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=s390x&distroversion=edge&reponame=community
47
url pkg:apk/alpine/podman@5.7.0-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=x86&distroversion=edge&reponame=community
48
url pkg:apk/alpine/podman@5.7.0-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=x86_64&distroversion=edge&reponame=community
49
url pkg:apk/alpine/podman@5.7.0-r0?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=aarch64&distroversion=v3.23&reponame=community
50
url pkg:apk/alpine/podman@5.7.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
51
url pkg:apk/alpine/podman@5.7.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
52
url pkg:apk/alpine/podman@5.7.0-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
53
url pkg:apk/alpine/podman@5.7.0-r0?arch=s390x&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/podman@5.7.0-r0?arch=s390x&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@5.7.0-r0%3Farch=s390x&distroversion=v3.23&reponame=community
54
url pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=aarch64&distroversion=v3.22&reponame=community
55
url pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=riscv64&distroversion=v3.22&reponame=community
56
url pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=aarch64&distroversion=edge&reponame=community
57
url pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armhf&distroversion=edge&reponame=community
58
url pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armv7&distroversion=edge&reponame=community
59
url pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=loongarch64&distroversion=edge&reponame=community
60
url pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=ppc64le&distroversion=edge&reponame=community
61
url pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=riscv64&distroversion=edge&reponame=community
62
url pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=s390x&distroversion=edge&reponame=community
63
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86&distroversion=edge&reponame=community
64
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86_64&distroversion=edge&reponame=community
65
url pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armhf&distroversion=v3.22&reponame=community
66
url pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armv7&distroversion=v3.22&reponame=community
67
url pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
68
url pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
69
url pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=s390x&distroversion=v3.22&reponame=community
70
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86&distroversion=v3.22&reponame=community
71
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86_64&distroversion=v3.22&reponame=community
72
url pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=aarch64&distroversion=v3.23&reponame=community
73
url pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armhf&distroversion=v3.23&reponame=community
74
url pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armv7&distroversion=v3.23&reponame=community
75
url pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
76
url pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
77
url pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
78
url pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=s390x&distroversion=v3.23&reponame=community
79
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86&distroversion=v3.23&reponame=community
80
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
81
url pkg:deb/debian/runc@1.0.3%2Bds1-1
purl pkg:deb/debian/runc@1.0.3%2Bds1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.3%252Bds1-1
82
url pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.3%252Bds1-2%3Fdistro=trixie
83
url pkg:deb/debian/runc@1.3.3%2Bds1-2
purl pkg:deb/debian/runc@1.3.3%2Bds1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.3%252Bds1-2
84
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
85
url pkg:golang/github.com/opencontainers/runc@1.2.8
purl pkg:golang/github.com/opencontainers/runc@1.2.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/opencontainers/runc@1.2.8
86
url pkg:golang/github.com/opencontainers/runc@1.3.3
purl pkg:golang/github.com/opencontainers/runc@1.3.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/opencontainers/runc@1.3.3
87
url pkg:golang/github.com/opencontainers/runc@1.4.0-rc.3
purl pkg:golang/github.com/opencontainers/runc@1.4.0-rc.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/opencontainers/runc@1.4.0-rc.3
88
url pkg:golang/github.com/opencontainers/selinux@1.13.0
purl pkg:golang/github.com/opencontainers/selinux@1.13.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/opencontainers/selinux@1.13.0
Affected_packages
0
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1
3
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.1.15%2Bds1-2
purl pkg:deb/debian/runc@1.1.15%2Bds1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2
5
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
6
url pkg:rpm/redhat/buildah@1:1.26.9-1.el9_0?arch=3
purl pkg:rpm/redhat/buildah@1:1.26.9-1.el9_0?arch=3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mvsr-c2yh-mbdq
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.26.9-1.el9_0%3Farch=3
7
url pkg:rpm/redhat/buildah@1:1.29.5-1.el9_2?arch=2
purl pkg:rpm/redhat/buildah@1:1.29.5-1.el9_2?arch=2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mvsr-c2yh-mbdq
2
vulnerability VCID-sty6-gwh1-hbcy
3
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.29.5-1.el9_2%3Farch=2
8
url pkg:rpm/redhat/buildah@2:1.33.12-2.rhaos4.18?arch=el9
purl pkg:rpm/redhat/buildah@2:1.33.12-2.rhaos4.18?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.33.12-2.rhaos4.18%3Farch=el9
9
url pkg:rpm/redhat/buildah@2:1.33.12-3.rhaos4.17?arch=el8
purl pkg:rpm/redhat/buildah@2:1.33.12-3.rhaos4.17?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.33.12-3.rhaos4.17%3Farch=el8
10
url pkg:rpm/redhat/buildah@2:1.33.12-4.rhaos4.19?arch=el9
purl pkg:rpm/redhat/buildah@2:1.33.12-4.rhaos4.19?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.33.12-4.rhaos4.19%3Farch=el9
11
url pkg:rpm/redhat/buildah@2:1.33.13-2.el9_4?arch=1
purl pkg:rpm/redhat/buildah@2:1.33.13-2.el9_4?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mvsr-c2yh-mbdq
1
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.33.13-2.el9_4%3Farch=1
12
url pkg:rpm/redhat/buildah@2:1.39.5-1?arch=el10_0
purl pkg:rpm/redhat/buildah@2:1.39.5-1?arch=el10_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.39.5-1%3Farch=el10_0
13
url pkg:rpm/redhat/buildah@2:1.39.5-1?arch=el9_6
purl pkg:rpm/redhat/buildah@2:1.39.5-1?arch=el9_6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.39.5-1%3Farch=el9_6
14
url pkg:rpm/redhat/buildah@2:1.41.6-1?arch=el9_7
purl pkg:rpm/redhat/buildah@2:1.41.6-1?arch=el9_7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mvsr-c2yh-mbdq
1
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.41.6-1%3Farch=el9_7
15
url pkg:rpm/redhat/buildah@2:1.41.6-1?arch=el10_1
purl pkg:rpm/redhat/buildah@2:1.41.6-1?arch=el10_1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mvsr-c2yh-mbdq
1
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.41.6-1%3Farch=el10_1
16
url pkg:rpm/redhat/podman@2:4.2.0-6.el9_0?arch=6
purl pkg:rpm/redhat/podman@2:4.2.0-6.el9_0?arch=6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mvsr-c2yh-mbdq
2
vulnerability VCID-sty6-gwh1-hbcy
3
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.2.0-6.el9_0%3Farch=6
17
url pkg:rpm/redhat/podman@2:4.4.1-22.el9_2?arch=5
purl pkg:rpm/redhat/podman@2:4.4.1-22.el9_2?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mvsr-c2yh-mbdq
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.4.1-22.el9_2%3Farch=5
18
url pkg:rpm/redhat/podman@4:4.9.4-19.el9_4?arch=5
purl pkg:rpm/redhat/podman@4:4.9.4-19.el9_4?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mvsr-c2yh-mbdq
1
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@4:4.9.4-19.el9_4%3Farch=5
19
url pkg:rpm/redhat/podman@5:5.4.0-15?arch=el9_6
purl pkg:rpm/redhat/podman@5:5.4.0-15?arch=el9_6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mvsr-c2yh-mbdq
1
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@5:5.4.0-15%3Farch=el9_6
20
url pkg:rpm/redhat/podman@6:5.4.0-14?arch=el10_0
purl pkg:rpm/redhat/podman@6:5.4.0-14?arch=el10_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mvsr-c2yh-mbdq
1
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@6:5.4.0-14%3Farch=el10_0
21
url pkg:rpm/redhat/podman@6:5.6.0-7?arch=el9_7
purl pkg:rpm/redhat/podman@6:5.6.0-7?arch=el9_7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@6:5.6.0-7%3Farch=el9_7
22
url pkg:rpm/redhat/podman@7:5.6.0-6?arch=el10_1
purl pkg:rpm/redhat/podman@7:5.6.0-6?arch=el10_1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@7:5.6.0-6%3Farch=el10_1
23
url pkg:rpm/redhat/runc@4:1.2.5-3?arch=el9_6
purl pkg:rpm/redhat/runc@4:1.2.5-3?arch=el9_6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.5-3%3Farch=el9_6
24
url pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_0
purl pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mt76-ah1b-s3gc
2
vulnerability VCID-vk37-s4p6-fufm
3
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1%3Farch=el9_0
25
url pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_4
purl pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mt76-ah1b-s3gc
2
vulnerability VCID-vk37-s4p6-fufm
3
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1%3Farch=el9_4
26
url pkg:rpm/redhat/runc@4:1.2.9-1.el9_2?arch=1
purl pkg:rpm/redhat/runc@4:1.2.9-1.el9_2?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mt76-ah1b-s3gc
2
vulnerability VCID-vk37-s4p6-fufm
3
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.el9_2%3Farch=1
27
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.16?arch=el8
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.16?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.16%3Farch=el8
28
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el8
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17%3Farch=el8
29
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el9
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17%3Farch=el9
30
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.18?arch=el8
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.18?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.18%3Farch=el8
31
url pkg:rpm/redhat/runc@4:1.3.0-4?arch=el9_7
purl pkg:rpm/redhat/runc@4:1.3.0-4?arch=el9_7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.3.0-4%3Farch=el9_7
References
0
reference_url http://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url http://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322
1
reference_url http://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url http://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52881.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52881.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-52881
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03374
published_at 2026-04-09T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03354
published_at 2026-04-08T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03349
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03341
published_at 2026-04-04T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03284
published_at 2026-04-13T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03306
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03335
published_at 2026-04-11T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03123
published_at 2026-04-18T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03243
published_at 2026-04-21T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.0447
published_at 2026-04-16T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09595
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-52881
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52881
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
7
reference_url https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md
8
reference_url https://github.com/opencontainers/runc/commit/3f925525b44d247e390e529e772a0dc0c0bc3557
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/3f925525b44d247e390e529e772a0dc0c0bc3557
9
reference_url https://github.com/opencontainers/runc/commit/435cc81be6b79cdec73b4002c0dae549b2f6ae6d
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/435cc81be6b79cdec73b4002c0dae549b2f6ae6d
10
reference_url https://github.com/opencontainers/runc/commit/44a0fcf685db051c80b8c269812bb177f5802c58
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/44a0fcf685db051c80b8c269812bb177f5802c58
11
reference_url https://github.com/opencontainers/runc/commit/4b37cd93f86e72feac866442988b549b5b7bf3e6
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/4b37cd93f86e72feac866442988b549b5b7bf3e6
12
reference_url https://github.com/opencontainers/runc/commit/6fc191449109ea14bb7d61238f24a33fe08c651f
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/6fc191449109ea14bb7d61238f24a33fe08c651f
13
reference_url https://github.com/opencontainers/runc/commit/77889b56db939c323d29d1130f28f9aea2edb544
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/77889b56db939c323d29d1130f28f9aea2edb544
14
reference_url https://github.com/opencontainers/runc/commit/77d217c7c3775d8ca5af89e477e81568ef4572db
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/77d217c7c3775d8ca5af89e477e81568ef4572db
15
reference_url https://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322
16
reference_url https://github.com/opencontainers/runc/commit/b3dd1bc562ed9996d1a0f249e056c16624046d28
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/b3dd1bc562ed9996d1a0f249e056c16624046d28
17
reference_url https://github.com/opencontainers/runc/commit/d40b3439a9614a86e87b81a94c6811ec6fa2d7d2
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/d40b3439a9614a86e87b81a94c6811ec6fa2d7d2
18
reference_url https://github.com/opencontainers/runc/commit/d61fd29d854b416feaaf128bf650325cd2182165
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/d61fd29d854b416feaaf128bf650325cd2182165
19
reference_url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
20
reference_url https://github.com/opencontainers/runc/commit/ed6b1693b8b3ae7eb0250a7e76fc888cdacf98c1
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/ed6b1693b8b3ae7eb0250a7e76fc888cdacf98c1
21
reference_url https://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3
22
reference_url https://github.com/opencontainers/runc/commit/ff6fe1324663538167eca8b3d3eec61e1bd4fa51
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/ff6fe1324663538167eca8b3d3eec61e1bd4fa51
23
reference_url https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480
24
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
25
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
26
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-fh74-hm69-rqjw
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/security/advisories/GHSA-fh74-hm69-rqjw
27
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
28
reference_url https://github.com/opencontainers/selinux/pull/237
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/selinux/pull/237
29
reference_url https://github.com/opencontainers/selinux/releases/tag/v1.13.0
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/selinux/releases/tag/v1.13.0
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-52881
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-52881
31
reference_url https://pkg.go.dev/github.com/cyphar/filepath-securejoin/pathrs-lite/procfs
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/github.com/cyphar/filepath-securejoin/pathrs-lite/procfs
32
reference_url https://youtu.be/tGseJW_uBB8
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://youtu.be/tGseJW_uBB8
33
reference_url https://youtu.be/y1PaBzxwRWQ
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://youtu.be/y1PaBzxwRWQ
34
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
reference_id 1120140
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2404715
reference_id 2404715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2404715
36
reference_url https://access.redhat.com/errata/RHSA-2025:19927
reference_id RHSA-2025:19927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19927
37
reference_url https://access.redhat.com/errata/RHSA-2025:20957
reference_id RHSA-2025:20957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20957
38
reference_url https://access.redhat.com/errata/RHSA-2025:21220
reference_id RHSA-2025:21220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21220
39
reference_url https://access.redhat.com/errata/RHSA-2025:21232
reference_id RHSA-2025:21232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21232
40
reference_url https://access.redhat.com/errata/RHSA-2025:21633
reference_id RHSA-2025:21633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21633
41
reference_url https://access.redhat.com/errata/RHSA-2025:21634
reference_id RHSA-2025:21634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21634
42
reference_url https://access.redhat.com/errata/RHSA-2025:21702
reference_id RHSA-2025:21702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21702
43
reference_url https://access.redhat.com/errata/RHSA-2025:21795
reference_id RHSA-2025:21795
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21795
44
reference_url https://access.redhat.com/errata/RHSA-2025:21824
reference_id RHSA-2025:21824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21824
45
reference_url https://access.redhat.com/errata/RHSA-2025:22011
reference_id RHSA-2025:22011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22011
46
reference_url https://access.redhat.com/errata/RHSA-2025:22012
reference_id RHSA-2025:22012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22012
47
reference_url https://access.redhat.com/errata/RHSA-2025:22030
reference_id RHSA-2025:22030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22030
48
reference_url https://access.redhat.com/errata/RHSA-2025:23347
reference_id RHSA-2025:23347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23347
49
reference_url https://access.redhat.com/errata/RHSA-2025:23543
reference_id RHSA-2025:23543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23543
50
reference_url https://access.redhat.com/errata/RHSA-2026:0050
reference_id RHSA-2026:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0050
51
reference_url https://access.redhat.com/errata/RHSA-2026:0315
reference_id RHSA-2026:0315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0315
52
reference_url https://access.redhat.com/errata/RHSA-2026:0331
reference_id RHSA-2026:0331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0331
53
reference_url https://access.redhat.com/errata/RHSA-2026:0418
reference_id RHSA-2026:0418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0418
54
reference_url https://access.redhat.com/errata/RHSA-2026:0424
reference_id RHSA-2026:0424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0424
55
reference_url https://access.redhat.com/errata/RHSA-2026:0425
reference_id RHSA-2026:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0425
56
reference_url https://access.redhat.com/errata/RHSA-2026:0426
reference_id RHSA-2026:0426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0426
57
reference_url https://access.redhat.com/errata/RHSA-2026:0676
reference_id RHSA-2026:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0676
58
reference_url https://access.redhat.com/errata/RHSA-2026:0701
reference_id RHSA-2026:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0701
59
reference_url https://access.redhat.com/errata/RHSA-2026:0995
reference_id RHSA-2026:0995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0995
60
reference_url https://access.redhat.com/errata/RHSA-2026:1540
reference_id RHSA-2026:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1540
61
reference_url https://access.redhat.com/errata/RHSA-2026:1730
reference_id RHSA-2026:1730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1730
62
reference_url https://access.redhat.com/errata/RHSA-2026:1942
reference_id RHSA-2026:1942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1942
63
reference_url https://access.redhat.com/errata/RHSA-2026:2034
reference_id RHSA-2026:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2034
64
reference_url https://access.redhat.com/errata/RHSA-2026:2106
reference_id RHSA-2026:2106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2106
65
reference_url https://access.redhat.com/errata/RHSA-2026:2343
reference_id RHSA-2026:2343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2343
66
reference_url https://access.redhat.com/errata/RHSA-2026:2456
reference_id RHSA-2026:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2456
67
reference_url https://access.redhat.com/errata/RHSA-2026:2681
reference_id RHSA-2026:2681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2681
68
reference_url https://access.redhat.com/errata/RHSA-2026:2695
reference_id RHSA-2026:2695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2695
69
reference_url https://access.redhat.com/errata/RHSA-2026:2754
reference_id RHSA-2026:2754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2754
70
reference_url https://access.redhat.com/errata/RHSA-2026:2762
reference_id RHSA-2026:2762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2762
71
reference_url https://access.redhat.com/errata/RHSA-2026:2900
reference_id RHSA-2026:2900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2900
72
reference_url https://access.redhat.com/errata/RHSA-2026:2951
reference_id RHSA-2026:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2951
73
reference_url https://access.redhat.com/errata/RHSA-2026:2975
reference_id RHSA-2026:2975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2975
74
reference_url https://access.redhat.com/errata/RHSA-2026:3391
reference_id RHSA-2026:3391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3391
75
reference_url https://access.redhat.com/errata/RHSA-2026:3416
reference_id RHSA-2026:3416
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3416
76
reference_url https://access.redhat.com/errata/RHSA-2026:3713
reference_id RHSA-2026:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3713
77
reference_url https://access.redhat.com/errata/RHSA-2026:4185
reference_id RHSA-2026:4185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4185
78
reference_url https://access.redhat.com/errata/RHSA-2026:4215
reference_id RHSA-2026:4215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4215
79
reference_url https://access.redhat.com/errata/RHSA-2026:4531
reference_id RHSA-2026:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4531
80
reference_url https://access.redhat.com/errata/RHSA-2026:4532
reference_id RHSA-2026:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4532
81
reference_url https://access.redhat.com/errata/RHSA-2026:4533
reference_id RHSA-2026:4533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4533
82
reference_url https://access.redhat.com/errata/RHSA-2026:4693
reference_id RHSA-2026:4693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4693
83
reference_url https://access.redhat.com/errata/RHSA-2026:8325
reference_id RHSA-2026:8325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8325
84
reference_url https://access.redhat.com/errata/RHSA-2026:8433
reference_id RHSA-2026:8433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8433
85
reference_url https://usn.ubuntu.com/7851-1/
reference_id USN-7851-1
reference_type
scores
url https://usn.ubuntu.com/7851-1/
Weaknesses
0
cwe_id 363
name Race Condition Enabling Link Following
description The product checks the status of a file or directory before accessing it, which produces a race condition in which the file can be replaced with a link before the access is performed, causing the product to access the wrong file.
1
cwe_id 61
name UNIX Symbolic Link (Symlink) Following
description The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.
2
cwe_id 59
name Improper Link Resolution Before File Access ('Link Following')
description The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-wxsf-mu1t-aqa4