CVE-2021-30465

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
References
Link Resource
http://www.openwall.com/lists/oss-security/2021/05/19/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/05/19/2 Mailing List Third Party Advisory
https://bugzilla.opensuse.org/show_bug.cgi?id=1185405 Issue Tracking
https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f Patch Third Party Advisory
https://github.com/opencontainers/runc/releases Release Notes Third Party Advisory
https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35ZW6NBZSBH5PWIT7JU4HXOXGFVDCOHH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV/
https://security.gentoo.org/glsa/202107-26 Third Party Advisory
https://security.netapp.com/advisory/ntap-20210708-0003/ Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/05/19/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/05/19/2 Mailing List Third Party Advisory
https://bugzilla.opensuse.org/show_bug.cgi?id=1185405 Issue Tracking
https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f Patch Third Party Advisory
https://github.com/opencontainers/runc/releases Release Notes Third Party Advisory
https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35ZW6NBZSBH5PWIT7JU4HXOXGFVDCOHH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV/
https://security.gentoo.org/glsa/202107-26 Third Party Advisory
https://security.netapp.com/advisory/ntap-20210708-0003/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc10:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc9:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc90:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc91:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc92:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc93:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc94:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-05-27 13:15

Updated : 2024-11-21 06:03


NVD link : CVE-2021-30465

Mitre link : CVE-2021-30465

CVE.ORG link : CVE-2021-30465


JSON object : View

Products Affected

linuxfoundation

  • runc

fedoraproject

  • fedora
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')