Количество 53
Количество 53
openSUSE-SU-2025:20072-1
Security update for runc
SUSE-SU-2025:4081-1
Security update for podman
SUSE-SU-2025:4080-1
Security update for podman
SUSE-SU-2025:4079-1
Security update for podman
SUSE-SU-2025:4077-1
Security update for runc
SUSE-SU-2025:4073-2
Security update for runc
SUSE-SU-2025:4073-1
Security update for runc
SUSE-SU-2025:3951-1
Security update for runc
SUSE-SU-2025:3950-1
Security update for runc
RLSA-2025:21232
Important: container-tools:rhel8 security update
RLSA-2025:20957
Important: runc security update
ELSA-2025-21232
ELSA-2025-21232: container-tools:rhel8 security update (IMPORTANT)
ELSA-2025-20957
ELSA-2025-20957: runc security update (IMPORTANT)
ELSA-2025-19927
ELSA-2025-19927: runc security update (IMPORTANT)
openSUSE-SU-2026:20140-1
Security update for alloy
openSUSE-SU-2026:20072-1
Security update for podman
SUSE-SU-2026:0327-1
Security update for alloy
openSUSE-SU-2026:20080-1
Security update for buildah
CVE-2025-31133
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
CVE-2025-31133
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
openSUSE-SU-2025:20072-1 Security update for runc | 3 месяца назад | |||
SUSE-SU-2025:4081-1 Security update for podman | 3 месяца назад | |||
SUSE-SU-2025:4080-1 Security update for podman | 3 месяца назад | |||
SUSE-SU-2025:4079-1 Security update for podman | 3 месяца назад | |||
SUSE-SU-2025:4077-1 Security update for runc | 3 месяца назад | |||
SUSE-SU-2025:4073-2 Security update for runc | 3 месяца назад | |||
SUSE-SU-2025:4073-1 Security update for runc | 3 месяца назад | |||
SUSE-SU-2025:3951-1 Security update for runc | 3 месяца назад | |||
SUSE-SU-2025:3950-1 Security update for runc | 3 месяца назад | |||
RLSA-2025:21232 Important: container-tools:rhel8 security update | 2 месяца назад | |||
RLSA-2025:20957 Important: runc security update | 3 месяца назад | |||
ELSA-2025-21232 ELSA-2025-21232: container-tools:rhel8 security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-20957 ELSA-2025-20957: runc security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-19927 ELSA-2025-19927: runc security update (IMPORTANT) | 3 месяца назад | |||
openSUSE-SU-2026:20140-1 Security update for alloy | 11 дней назад | |||
openSUSE-SU-2026:20072-1 Security update for podman | 20 дней назад | |||
SUSE-SU-2026:0327-1 Security update for alloy | 13 дней назад | |||
openSUSE-SU-2026:20080-1 Security update for buildah | 19 дней назад | |||
CVE-2025-31133 runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3. | CVSS3: 7.8 | 0% Низкий | 3 месяца назад | |
CVE-2025-31133 runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3. | CVSS3: 7.8 | 0% Низкий | 3 месяца назад |
Уязвимостей на страницу