Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-30465


runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.


Published

2021-05-27T13:15:08.077

Last Modified

2024-11-21T06:03:58.593

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.5 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

6.8

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-362

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application linuxfoundation runc ≤ 0.1.1 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Application linuxfoundation runc 1.0.0 Yes
Operating System fedoraproject fedora 33 Yes
Operating System fedoraproject fedora 34 Yes

References