Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-30465

Опубликовано: 27 мая 2021
Источник: nvd
CVSS3: 8.5
CVSS2: 6
EPSS Низкий

Описание

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
Версия до 0.1.1 (включая)
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc10:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc9:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc90:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc91:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc92:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc93:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc94:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

EPSS

Процентиль: 84%
0.02358
Низкий

8.5 High

CVSS3

6 Medium

CVSS2

Дефекты

CWE-362

Связанные уязвимости

CVSS3: 8.5
ubuntu
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 7.5
redhat
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 8.5
debian
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Dire ...

suse-cvrf
около 4 лет назад

Security update for runc

rocky
около 4 лет назад

Important: container-tools:rhel8 security update

EPSS

Процентиль: 84%
0.02358
Низкий

8.5 High

CVSS3

6 Medium

CVSS2

Дефекты

CWE-362