runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
2021-05-27T13:15:08.077
2024-11-21T06:03:58.593
Modified
CVSSv3.1: 8.5 (HIGH)
AV:N/AC:M/Au:S/C:P/I:P/A:P
6.8
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | linuxfoundation | runc | ≤ 0.1.1 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Application | linuxfoundation | runc | 1.0.0 | Yes |
Operating System | fedoraproject | fedora | 33 | Yes |
Operating System | fedoraproject | fedora | 34 | Yes |