CVE-2021-30465
27.05.2021, 13:15
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
| Vendor | Product | Version |
|---|---|---|
| linuxfoundation | runc | 𝑥 ≤ 0.1.1 |
| linuxfoundation | runc | 1.0.0:rc1 |
| linuxfoundation | runc | 1.0.0:rc10 |
| linuxfoundation | runc | 1.0.0:rc2 |
| linuxfoundation | runc | 1.0.0:rc3 |
| linuxfoundation | runc | 1.0.0:rc4 |
| linuxfoundation | runc | 1.0.0:rc5 |
| linuxfoundation | runc | 1.0.0:rc6 |
| linuxfoundation | runc | 1.0.0:rc7 |
| linuxfoundation | runc | 1.0.0:rc8 |
| linuxfoundation | runc | 1.0.0:rc9 |
| linuxfoundation | runc | 1.0.0:rc90 |
| linuxfoundation | runc | 1.0.0:rc91 |
| linuxfoundation | runc | 1.0.0:rc92 |
| linuxfoundation | runc | 1.0.0:rc93 |
| linuxfoundation | runc | 1.0.0:rc94 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| runc |
|
References