Linuxfoundation

Runc

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.11%
  • Veröffentlicht 06.12.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:29:46

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (resp...

  • EPSS 2.36%
  • Veröffentlicht 27.05.2021 13:15:08
  • Zuletzt bearbeitet 21.11.2024 06:03:58

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-e...

  • EPSS 0.12%
  • Veröffentlicht 12.02.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:40

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able t...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 25.09.2019 18:15:13
  • Zuletzt bearbeitet 21.11.2024 04:31:16

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc direct...

Exploit
  • EPSS 55.57%
  • Veröffentlicht 11.02.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:24

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types ...

  • EPSS 0.09%
  • Veröffentlicht 01.06.2016 20:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.