Description
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3369-1 | runc security update |
EUVD |
EUVD-2021-1034 | runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition. |
Github GHSA |
GHSA-c3xm-pvg7-gh7r | mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs |
Ubuntu USN |
USN-4867-1 | runC vulnerabilities |
Ubuntu USN |
USN-4960-1 | runC vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T22:32:40.599Z
Reserved: 2021-04-08T00:00:00.000Z
Link: CVE-2021-30465
No data.
Status : Modified
Published: 2021-05-27T13:15:08.077
Modified: 2024-11-21T06:03:58.593
Link: CVE-2021-30465
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN