runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2021-30465 - High Severity Vulnerability
Vulnerable Library - github.com/Docker/docker-v20.10.7+incompatible
Moby Project - a collaborative project for the container ecosystem to assemble container-based systems
Library home page: https://proxy.golang.org/github.com/docker/docker/@v/v20.10.7+incompatible.zip
Dependency Hierarchy: - github.com/hyperledger-labs/fabric-smart-client (Root Library) - :x: **github.com/Docker/docker-v20.10.7+incompatible** (Vulnerable Library)
Found in HEAD commit: 999f5d255a183e22a067e6411929924a0bacd65f
Found in base branch: main
Vulnerability Details
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
Publish Date: 2021-05-27
URL: CVE-2021-30465
CVSS 3 Score Details (8.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r
Release Date: 2021-05-27
Fix Resolution: v1.0.0-rc95
Step up your Open Source Security Game with Mend here