VYPR

Go modules package

github.com/opencontainers/runc

pkg:golang/github.com/opencontainers/runc

Vulnerabilities (15)

  • CVE-2025-52881Nov 6, 2025
    affected < 1.2.8fixed 1.2.8

    runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have

  • CVE-2025-52565Nov 6, 2025
    affected >= 1.0.0-rc3, < 1.2.8fixed 1.2.8

    runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the conta

  • CVE-2025-31133Nov 6, 2025
    affected < 1.2.8fixed 1.2.8

    runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container

  • CVE-2024-45310Sep 3, 2024
    affected < 1.1.14fixed 1.1.14

    runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between

  • CVE-2024-21626Jan 31, 2024
    affected >= 1.0.0-rc93, < 1.1.12fixed 1.1.12

    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the h

  • CVE-2023-25809Mar 29, 2023
    affected < 1.1.5fixed 1.1.5

    runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does n

  • CVE-2023-28642Mar 29, 2023
    affected < 1.1.5fixed 1.1.5

    runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibitin

  • CVE-2023-27561Mar 3, 2023
    affected >= 1.0.0-rc95, < 1.1.5fixed 1.1.5

    runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this is

  • CVE-2022-29162May 17, 2022
    affected < 1.1.2fixed 1.1.2

    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environme

  • CVE-2021-43784Dec 6, 2021
    affected < 1.0.3fixed 1.0.3

    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespac

  • CVE-2021-30465May 27, 2021
    affected < 1.0.0-rc95fixed 1.0.0-rc95

    runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on

  • CVE-2019-19921Feb 12, 2020
    affected < 1.0.0-rc9.0.20200122160610-2fc03cc11c77fixed 1.0.0-rc9.0.20200122160610-2fc03cc11c77

    runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vul

  • CVE-2019-16884Sep 25, 2019
    affected < 1.0.0-rc8.0.20190930145003-cad42f6e0932fixed 1.0.0-rc8.0.20190930145003-cad42f6e0932

    runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

  • CVE-2016-9962MedJan 31, 2017
    affected < 1.0.0-rc3fixed 1.0.0-rc3

    RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to conta

  • CVE-2016-3697HigJun 1, 2016
    affected < 0.1.0fixed 0.1.0

    libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.