runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "0.1.1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc10"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc4"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc5"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc6"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc7"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc8"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc9"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc90"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc91"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc92"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc93"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc94"
}
]
}