8.5

CVE-2021-30465

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

Data is provided by the National Vulnerability Database (NVD)
LinuxfoundationRunc Version <= 0.1.1
LinuxfoundationRunc Version1.0.0 Updaterc1
LinuxfoundationRunc Version1.0.0 Updaterc10
LinuxfoundationRunc Version1.0.0 Updaterc2
LinuxfoundationRunc Version1.0.0 Updaterc3
LinuxfoundationRunc Version1.0.0 Updaterc4
LinuxfoundationRunc Version1.0.0 Updaterc5
LinuxfoundationRunc Version1.0.0 Updaterc6
LinuxfoundationRunc Version1.0.0 Updaterc7
LinuxfoundationRunc Version1.0.0 Updaterc8
LinuxfoundationRunc Version1.0.0 Updaterc9
LinuxfoundationRunc Version1.0.0 Updaterc90
LinuxfoundationRunc Version1.0.0 Updaterc91
LinuxfoundationRunc Version1.0.0 Updaterc92
LinuxfoundationRunc Version1.0.0 Updaterc93
LinuxfoundationRunc Version1.0.0 Updaterc94
FedoraprojectFedora Version33
FedoraprojectFedora Version34
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.36% 0.844
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.5 1.8 6
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
nvd@nist.gov 6 6.8 6.4
AV:N/AC:M/Au:S/C:P/I:P/A:P
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.