CVE-2025-31133 (CNNVD-202511-518)
中文标题:
runc 安全漏洞
英文标题:
runc container escape via "masked path" abuse due to mount race conditions
漏洞描述
中文描述:
runc是Open Container Initiative开源的一款用于根据OCI规范生成和运行容器的CLI(命令行界面)工具。 runc 1.2.7及之前版本、1.3.0-rc.1版本至1.3.1版本、1.4.0-rc.1版本和1.4.0-rc.2版本存在安全漏洞,该漏洞源于未充分验证绑定挂载源的真实性,可能导致主机信息泄露、主机拒绝服务、容器逃逸或绕过maskedPaths。
英文描述:
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| opencontainers | runc | < 1.2.8 | - | - |
cpe:2.3:a:opencontainers:runc:<_1.2.8:*:*:*:*:*:*:*
|
| opencontainers | runc | >= 1.3.0-rc.1, < 1.3.3 | - | - |
cpe:2.3:a:opencontainers:runc:>=_1.3.0-rc.1,_<_1.3.3:*:*:*:*:*:*:*
|
| opencontainers | runc | >= 1.4.0-rc.1, <= 1.4.0-rc.3 | - | - |
cpe:2.3:a:opencontainers:runc:>=_1.4.0-rc.1,_<=_1.4.0-rc.3:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
4.0 (cna)
HIGHCVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-31133 |
2025-11-11 15:23:15 | 2025-11-11 07:40:22 |
| NVD | nvd_CVE-2025-31133 |
2025-11-11 15:01:08 | 2025-11-11 07:48:12 |
| CNNVD | cnnvd_CNNVD-202511-518 |
2025-11-11 15:13:01 | 2025-11-11 08:00:22 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202511-518
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']