First published: Wed May 19 2021(Updated: )
Etienne Champetier discovered that runC incorrectly checked mount targets. An attacker with a malicious container image could possibly mount the host filesystem into the container and escalate privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/runc | <1.0.0~rc93-0ubuntu1.1 | 1.0.0~rc93-0ubuntu1.1 |
=21.04 | ||
All of | ||
ubuntu/runc | <1.0.0~rc93-0ubuntu1~20.10.2 | 1.0.0~rc93-0ubuntu1~20.10.2 |
=20.10 | ||
All of | ||
ubuntu/runc | <1.0.0~rc93-0ubuntu1~20.04.2 | 1.0.0~rc93-0ubuntu1~20.04.2 |
=20.04 | ||
All of | ||
ubuntu/runc | <1.0.0~rc93-0ubuntu1~18.04.2 | 1.0.0~rc93-0ubuntu1~18.04.2 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is USN-4960-1.
The title of this vulnerability is USN-4960-1: runC vulnerability.
Etienne Champetier discovered this vulnerability.
An attacker with a malicious container image could possibly mount the host filesystem into the container and escalate privileges.
The affected software versions are runc 1.0.0~rc93-0ubuntu1.1 on Ubuntu 21.04, runc 1.0.0~rc93-0ubuntu1~20.10.2 on Ubuntu 20.10, runc 1.0.0~rc93-0ubuntu1~20.04.2 on Ubuntu 20.04, and runc 1.0.0~rc93-0ubuntu1~18.04.2 on Ubuntu 18.04.