Описание
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1.0.0~rc93-0ubuntu1~18.04.2 |
devel | released | 1.0.0~rc93-0ubuntu2 |
esm-apps/bionic | released | 1.0.0~rc93-0ubuntu1~18.04.2 |
esm-apps/xenial | released | 1.0.0~rc7+git20190403.029124da-0ubuntu1~16.04.4+esm2 |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | not-affected | 1.0.0~rc93-0ubuntu1~20.04.2 |
focal | released | 1.0.0~rc93-0ubuntu1~20.04.2 |
groovy | released | 1.0.0~rc93-0ubuntu1~20.10.2 |
hirsute | released | 1.0.0~rc93-0ubuntu1.1 |
impish | released | 1.0.0~rc93-0ubuntu2 |
Показывать по
EPSS
6 Medium
CVSS2
8.5 High
CVSS3
Связанные уязвимости
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Dire ...
EPSS
6 Medium
CVSS2
8.5 High
CVSS3