Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-30465
HistoryMay 19, 2021 - 12:00 a.m.

CVE-2021-30465

2021-05-1900:00:00
ubuntu.com
ubuntu.com
20

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

58.2%

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory
Traversal. To exploit the vulnerability, an attacker must be able to create
multiple containers with a fairly specific mount configuration. The problem
occurs via a symlink-exchange attack that relies on a race condition.

Notes

Author Note
mdeslaur 1.0.0-rc94 is also affected
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchrunc<ย 1.0.0~rc93-0ubuntu1~18.04.2UNKNOWN
ubuntu20.04noarchrunc<ย 1.0.0~rc93-0ubuntu1~20.04.2UNKNOWN
ubuntu20.10noarchrunc<ย 1.0.0~rc93-0ubuntu1~20.10.2UNKNOWN
ubuntu21.04noarchrunc<ย 1.0.0~rc93-0ubuntu1.1UNKNOWN
ubuntu21.10noarchrunc<ย 1.0.0~rc93-0ubuntu2UNKNOWN
ubuntu22.04noarchrunc<ย 1.0.0~rc93-0ubuntu2UNKNOWN
ubuntu16.04noarchrunc<ย 1.0.0~rc7+git20190403.029124da-0ubuntu1~16.04.4+esm2UNKNOWN

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

58.2%