CVE-2021-30465 log
| Source |
|
| Severity | High |
| Remote | No |
| Type | Sandbox escape |
| Description | runc 1.0.0-rc94 and earlier are vulnerable to a symlink exchange attack where an attacker with the ability to start containers using a custom volume configuration can request a seemingly-innocuous container configuration that results in the host filesystem being bind-mounted into the container (allowing for a container escape). |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-1972 | runc | 1.0.0rc94-1 | 1.0.0rc95-1 | High | Fixed |
| Date | Advisory | Group | Package | Severity | Type |
|---|---|---|---|---|---|
| 25 May 2021 | ASA-202105-17 | AVG-1972 | runc | High | sandbox escape |
| References |
|---|
https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f |
| Notes |
|---|
Workaround ========== Container hardening mechanisms such as LSMs (AppArmor/SELinux) and user namespaces can restrict the amount of damage an attacker could do but they do not block this attack outright. |