First published: Thu May 27 2021(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Runc | <=0.1.1 | |
Linuxfoundation Runc | =1.0.0-rc1 | |
Linuxfoundation Runc | =1.0.0-rc10 | |
Linuxfoundation Runc | =1.0.0-rc2 | |
Linuxfoundation Runc | =1.0.0-rc3 | |
Linuxfoundation Runc | =1.0.0-rc4 | |
Linuxfoundation Runc | =1.0.0-rc5 | |
Linuxfoundation Runc | =1.0.0-rc6 | |
Linuxfoundation Runc | =1.0.0-rc7 | |
Linuxfoundation Runc | =1.0.0-rc8 | |
Linuxfoundation Runc | =1.0.0-rc9 | |
Linuxfoundation Runc | =1.0.0-rc90 | |
Linuxfoundation Runc | =1.0.0-rc91 | |
Linuxfoundation Runc | =1.0.0-rc92 | |
Linuxfoundation Runc | =1.0.0-rc93 | |
Linuxfoundation Runc | =1.0.0-rc94 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
debian/runc | 1.0.0~rc93+ds1-5+deb11u5 1.0.0~rc93+ds1-5+deb11u3 1.1.5+ds1-1+deb12u1 1.1.15+ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-30465 is a vulnerability in runc before version 1.0.0-rc95 that allows a container filesystem breakout via directory traversal.
CVE-2021-30465 has a severity rating of 8.5 (high).
To exploit CVE-2021-30465, an attacker must be able to create multiple containers with a specific mount configuration and perform a symlink-exchange attack that relies on a race condition.
runc versions before 1.0.0-rc95 are affected by CVE-2021-30465.
Yes, upgrading to runc version 1.0.0-rc95 or later will fix CVE-2021-30465.