CVE-2025-52881
- EPSS 0.02%
- Veröffentlicht 06.11.2025 20:23:36
- Zuletzt bearbeitet 03.12.2025 18:37:17
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing contain...
CVE-2025-52565
- EPSS 0.02%
- Veröffentlicht 06.11.2025 20:15:49
- Zuletzt bearbeitet 03.12.2025 18:33:33
runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `...
CVE-2025-31133
- EPSS 0.02%
- Veröffentlicht 06.11.2025 18:47:47
- Zuletzt bearbeitet 03.12.2025 18:30:15
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the b...
CVE-2024-45310
- EPSS 0.15%
- Veröffentlicht 03.09.2024 19:15:15
- Zuletzt bearbeitet 25.11.2025 14:07:27
runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesyste...
CVE-2024-21626
- EPSS 3.83%
- Veröffentlicht 31.01.2024 22:15:53
- Zuletzt bearbeitet 21.11.2024 08:54:45
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to hav...
CVE-2023-25809
- EPSS 0.03%
- Veröffentlicht 29.03.2023 19:15:22
- Zuletzt bearbeitet 21.11.2024 07:50:14
runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace...
CVE-2023-28642
- EPSS 0.01%
- Veröffentlicht 29.03.2023 19:15:22
- Zuletzt bearbeitet 06.12.2024 14:15:19
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in run...
- EPSS 0.12%
- Veröffentlicht 03.03.2023 19:15:11
- Zuletzt bearbeitet 06.12.2024 14:15:19
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to ru...
CVE-2022-29162
- EPSS 0.14%
- Veröffentlicht 17.05.2022 21:15:08
- Zuletzt bearbeitet 21.11.2024 06:58:36
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creati...
CVE-2022-24769
- EPSS 0.09%
- Veröffentlicht 24.03.2022 20:15:09
- Zuletzt bearbeitet 21.11.2024 06:51:03
Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process ...