Open mend-for-github-com[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2021-30465 - High Severity Vulnerability
Vulnerable Libraries - github.com/containerd/cri-v1.11.1-0.20200601160732-d7ce093d63d0, github.com/containerd/containerd-6312b52de5ad8fa5637e6d1a24954b68448303a9, github.com/opencontainers/runc-v1.0.0-rc10
github.com/containerd/cri-v1.11.1-0.20200601160732-d7ce093d63d0
Moved to https://github.com/containerd/containerd/tree/master/pkg/cri . If you wish to submit issues/PRs, please submit to https://github.com/containerd/containerd
Library home page: https://proxy.golang.org/github.com/containerd/cri/@v/v1.11.1-0.20200601160732-d7ce093d63d0.zip
Dependency Hierarchy: - :x: **github.com/containerd/cri-v1.11.1-0.20200601160732-d7ce093d63d0** (Vulnerable Library)
github.com/containerd/containerd-6312b52de5ad8fa5637e6d1a24954b68448303a9
An open and reliable container runtime
Library home page: https://proxy.golang.org/github.com/containerd/containerd/@v/v1.4.0-beta.0.0.20200515000003-6312b52de5ad.zip
Dependency Hierarchy: - :x: **github.com/containerd/containerd-6312b52de5ad8fa5637e6d1a24954b68448303a9** (Vulnerable Library)
github.com/opencontainers/runc-v1.0.0-rc10
CLI tool for spawning and running containers according to the OCI specification
Library home page: https://proxy.golang.org/github.com/opencontainers/runc/@v/v1.0.0-rc10.zip
Dependency Hierarchy: - :x: **github.com/opencontainers/runc-v1.0.0-rc10** (Vulnerable Library)
Found in HEAD commit: d176fc163fbd69f1a628cf9b7ea217423ee02d31
Found in base branch: master
Vulnerability Details
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
Publish Date: 2021-05-27
URL: CVE-2021-30465
CVSS 3 Score Details (8.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r
Release Date: 2021-05-27
Fix Resolution: v1.0.0-rc95