Логотип exploitDog
bind:"CVE-2025-31133" OR bind:"CVE-2025-52565" OR bind:"CVE-2025-52881"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-31133" OR bind:"CVE-2025-52565" OR bind:"CVE-2025-52881"

Количество 53

Количество 53

suse-cvrf логотип

openSUSE-SU-2025:20072-1

3 месяца назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4081-1

3 месяца назад

Security update for podman

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4080-1

3 месяца назад

Security update for podman

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4079-1

3 месяца назад

Security update for podman

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4077-1

3 месяца назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4073-2

3 месяца назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4073-1

3 месяца назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3951-1

3 месяца назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3950-1

3 месяца назад

Security update for runc

EPSS: Низкий
rocky логотип

RLSA-2025:21232

2 месяца назад

Important: container-tools:rhel8 security update

EPSS: Низкий
rocky логотип

RLSA-2025:20957

3 месяца назад

Important: runc security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21232

3 месяца назад

ELSA-2025-21232: container-tools:rhel8 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20957

3 месяца назад

ELSA-2025-20957: runc security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19927

3 месяца назад

ELSA-2025-19927: runc security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20140-1

11 дней назад

Security update for alloy

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20072-1

20 дней назад

Security update for podman

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0327-1

13 дней назад

Security update for alloy

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20080-1

19 дней назад

Security update for buildah

EPSS: Низкий
ubuntu логотип

CVE-2025-31133

3 месяца назад

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2025-31133

3 месяца назад

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
openSUSE-SU-2025:20072-1

Security update for runc

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4081-1

Security update for podman

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4080-1

Security update for podman

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4079-1

Security update for podman

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4077-1

Security update for runc

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4073-2

Security update for runc

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4073-1

Security update for runc

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:3951-1

Security update for runc

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:3950-1

Security update for runc

3 месяца назад
rocky логотип
RLSA-2025:21232

Important: container-tools:rhel8 security update

2 месяца назад
rocky логотип
RLSA-2025:20957

Important: runc security update

3 месяца назад
oracle-oval логотип
ELSA-2025-21232

ELSA-2025-21232: container-tools:rhel8 security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-20957

ELSA-2025-20957: runc security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-19927

ELSA-2025-19927: runc security update (IMPORTANT)

3 месяца назад
suse-cvrf логотип
openSUSE-SU-2026:20140-1

Security update for alloy

11 дней назад
suse-cvrf логотип
openSUSE-SU-2026:20072-1

Security update for podman

20 дней назад
suse-cvrf логотип
SUSE-SU-2026:0327-1

Security update for alloy

13 дней назад
suse-cvrf логотип
openSUSE-SU-2026:20080-1

Security update for buildah

19 дней назад
ubuntu логотип
CVE-2025-31133

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

CVSS3: 7.8
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-31133

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

CVSS3: 7.8
0%
Низкий
3 месяца назад

Уязвимостей на страницу