An open API service providing package, version and dependency metadata of many open source software ecosystems and registries.

Top 0.2% on proxy.golang.org
Top 0.1% dependent packages on proxy.golang.org
Top 0.1% dependent repos on proxy.golang.org
Top 0.5% forks on proxy.golang.org
Top 0.1% docker downloads on proxy.golang.org

proxy.golang.org : github.com/opencontainers/runc

CLI tool for spawning and running containers according to the OCI specification

Registry - Source - Documentation - JSON - codemeta.json
purl: pkg:golang/github.com/opencontainers/runc
Keywords: containers , docker , oci
License: Apache-2.0
Latest release: 1 day ago
First release: over 10 years ago
Namespace: github.com/opencontainers
Dependent packages: 7,425
Dependent repositories: 27,022
Stars: 12,577 on GitHub
Forks: 2,207 on GitHub
Docker dependents: 8,531
Docker downloads: 63,937,613,025
Total Commits: 4412
Committers: 459
Average commits per author: 9.612
Development Distribution Score (DDS): 0.743
More commit stats: commits.ecosyste.ms
See more repository details: repos.ecosyste.ms
Last synced: about 13 hours ago

High
GSA_kwCzR0hTQS1jNXBqLW1xZmgtcnZjM84AA7Uo
Withdrawn: Runc allows an arbitrary systemd property to be injected
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: over 1 year ago
Withdrawn: over 1 year ago
High
MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWMzeG0tcHZnNy1naDdy
mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: over 4 years ago
High
GSA_kwCzR0hTQS1xdzl4LWNxcjMtd2M3cs4ABOOc
runc container escape with malicious config due to /dev/console mount and related races
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: 1 day ago
Low
MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWc1NGgtbTM5My1jcHdx
devices resource list treated as a blacklist by default
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: almost 4 years ago
High
GSA_kwCzR0hTQS12cHZtLTN3cTItMnd2bc4AAx7I
Opencontainers runc Incorrect Authorization vulnerability
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: over 2 years ago
Moderate
GSA_kwCzR0hTQS1qZnZwLTd4NnAtaDJwds4AA_QD
runc can be confused to create empty files/directories on the host
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: about 1 year ago
High
GSA_kwCzR0hTQS1jZ3J4LW1jOGYtMnBybc4ABOO6
runc container escape and denial of service due to arbitrary write gadgets and procfs write redirects
Ecosystems: go
Packages: github.com/opencontainers/runc, github.com/opencontainers/selinux
Source: github
Published: 1 day ago
High
GSA_kwCzR0hTQS05NDkzLWgyOXAtcmZtMs4ABOOb
runc container escape via "masked path" abuse due to mount race conditions
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: 1 day ago
Moderate
MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWZoNzQtaG02OS1ycWp3
opencontainers runc contains procfs race condition with a shared volume mount
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: over 4 years ago
Moderate
GSA_kwCzR0hTQS1nMmo2LTU3djctZ204Y84AAydu
runc AppArmor bypass with symlinked /proc
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: over 2 years ago
Moderate
GSA_kwCzR0hTQS1mM2ZwLWdjOGctdnc2Ns4AAm9H
Default inheritable capabilities for linux container should be empty
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: over 3 years ago
High
MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXEzajUtMzJtNS01OGMy
Privilege Elevation in runc
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: almost 4 years ago
Moderate
MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWdwNGotdzN2ai03Mjk5
Information Exposure in RunC
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: almost 4 years ago
High
GSA_kwCzR0hTQS14cjdyLWY4eHEtdmZ2ds4AA4-u
runc vulnerable to container breakout through process.cwd trickery and leaked fds
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: almost 2 years ago
Low
GSA_kwCzR0hTQS1tOGNnLXhjMnAtcjNmY84AAydr
rootless: `/sys/fs/cgroup` is writable when cgroupns isn't unshared in runc
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: over 2 years ago
High
GSA_kwCzR0hTQS1mZ3Y4LXZqNWMtMnBwcc0uIA
Incorrect Authorization in runc
Ecosystems: go
Packages: github.com/opencontainers/selinux, github.com/opencontainers/runc
Source: github
Published: over 3 years ago
Moderate
GSA_kwCzR0hTQS12OTVjLXA1aG0teHE4Zs0ZQA
Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC
Ecosystems: go
Packages: github.com/opencontainers/runc
Source: github
Published: almost 4 years ago