Linuxfoundation

Runc

12 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 3.88%
  • Published 31.01.2024 22:15:53
  • Last modified 21.11.2024 08:54:45

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to hav...

Exploit
  • EPSS 0.03%
  • Published 29.03.2023 19:15:22
  • Last modified 21.11.2024 07:50:14

runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace...

  • EPSS 0.01%
  • Published 29.03.2023 19:15:22
  • Last modified 06.12.2024 14:15:19

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in run...

Exploit
  • EPSS 0.12%
  • Published 03.03.2023 19:15:11
  • Last modified 06.12.2024 14:15:19

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to ru...

  • EPSS 0.14%
  • Published 17.05.2022 21:15:08
  • Last modified 21.11.2024 06:58:36

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creati...

  • EPSS 0.09%
  • Published 24.03.2022 20:15:09
  • Last modified 21.11.2024 06:51:03

Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process ...

Exploit
  • EPSS 0.12%
  • Published 06.12.2021 18:15:08
  • Last modified 21.11.2024 06:29:46

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (resp...

  • EPSS 2.36%
  • Published 27.05.2021 13:15:08
  • Last modified 21.11.2024 06:03:58

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-e...

  • EPSS 0.24%
  • Published 12.02.2020 15:15:12
  • Last modified 21.11.2024 04:35:40

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able t...

Exploit
  • EPSS 0.28%
  • Published 25.09.2019 18:15:13
  • Last modified 21.11.2024 04:31:16

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc direct...