Search CVE reports
1 – 10 of 13 results
CVE-2024-45310
Low priorityrunc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations...
2 affected packages
runc, runc-app
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
runc | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
runc-app | Vulnerable | Vulnerable | Vulnerable | — | — |
CVE-2024-21626
High prioritySome fixes available 4 of 5
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process...
1 affected packages
runc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
runc | Not affected | Fixed | Fixed | Fixed | Not affected |
CVE-2023-28642
Medium priorityrunc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue...
1 affected packages
runc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
runc | — | Fixed | Fixed | Fixed | Fixed |
CVE-2023-25809
Medium priorityrunc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is...
1 affected packages
runc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
runc | — | Fixed | Fixed | Fixed | Fixed |
CVE-2023-27561
Medium priorityrunc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom...
1 affected packages
runc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
runc | — | Fixed | Fixed | Fixed | Fixed |
CVE-2022-29162
Low prioritySome fixes available 5 of 6
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process...
1 affected packages
runc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
runc | — | Fixed | Fixed | Not affected | Fixed |
CVE-2021-43784
Low prioritySome fixes available 1 of 4
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C`...
1 affected packages
runc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
runc | Not affected | Not affected | Not affected | Vulnerable | Fixed |
CVE-2021-30465
High priorityrunc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The...
1 affected packages
runc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
runc | — | Fixed | Fixed | Fixed | Fixed |
CVE-2019-19921
Medium prioritySome fixes available 10 of 11
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom...
1 affected packages
runc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
runc | — | Fixed | Fixed | Fixed | Fixed |
CVE-2019-16884
Medium prioritySome fixes available 8 of 9
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount...
1 affected packages
runc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
runc | — | Fixed | Fixed | Fixed | Fixed |