Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/runc@1.0.0~rc93%2Bds1-5?distro=trixie
Typedeb
Namespacedebian
Namerunc
Version1.0.0~rc93+ds1-5
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.0.0~rc93+ds1-5+deb11u2
Latest_non_vulnerable_version1.3.5+ds1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9mdg-3961-cybf
vulnerability_id VCID-9mdg-3961-cybf
summary
mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs
### Summary

runc 1.0.0-rc94 and earlier are vulnerable to a symlink exchange attack whereby
an attacker can request a seemingly-innocuous container configuration that
actually results in the host filesystem being bind-mounted into the container
(allowing for a container escape). CVE-2021-30465 has been assigned for this
issue.

An attacker must have the ability to start containers using some kind of custom
volume configuration, and while recommended container hardening mechanisms such
as LSMs (AppArmor/SELinux) and user namespaces will restrict the amount of
damage an attacker could do, they do not block this attack outright. We have a
reproducer using Kubernetes (and the below description mentions
Kubernetes-specific paths), but this is not a Kubernetes-specific issue.

The now-released [runc v1.0.0-rc95][release] contains a fix for this issue, we
recommend users update as soon as possible.

[release]: https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc95

### Details

In circumstances where a container is being started, and runc is mounting
inside a volume shared with another container (which is conducting a
symlink-exchange attack), runc can be tricked into mounting outside of the
container rootfs by swapping the target of a mount with a symlink due to a
time-of-check-to-time-of-use (TOCTTOU) flaw. This is fairly similar in style to
previous TOCTTOU attacks (and is a problem we are working on solving with
libpathrs).

However, this alone is not useful because this happens inside a mount namespace
with `MS_SLAVE` propagation applied to `/` (meaning that the mount doesn't
appear on the host -- it's only a "host-side mount" inside the container's
namespace). To exploit this, you must have additional mount entries in the
configuration that use some subpath of the mounted-over host path as a source
for a subsequent mount.

However, it turns out with some container orchestrators (such as Kubernetes --
though it is very likely that other downstream users of runc could have similar
behaviour be accessible to untrusted users), the existence of additional volume
management infrastructure allows this attack to be applied to gain access to
the host filesystem without requiring the attacker to have completely arbitrary
control over container configuration.

In the case of Kubernetes, this is exploitable by creating a symlink in a
volume to the top-level (well-known) directory where volumes are sourced from
(for instance,
`/var/lib/kubelet/pods/$MY_POD_UID/volumes/kubernetes.io~empty-dir`), and then
using that symlink as the target of a mount. The source of the mount is an
attacker controlled directory, and thus the source directory from which
subsequent mounts will occur is an attacker-controlled directory. Thus the
attacker can first place a symlink to `/` in their malicious source directory
with the name of a volume, and a subsequent mount in the container will
bind-mount `/` into the container.

Applying this attack requires the attacker to start containers with a slightly
peculiar volume configuration (though not explicitly malicious-looking such as
bind-mounting `/` into the container explicitly), and be able to run malicious
code in a container that shares volumes with said volume configuration. It
helps the attacker if the host paths used for volume management are well known,
though this is not a hard requirement.

### Patches
This has been patched in runc 1.0.0-rc95, and users should upgrade as soon as
possible. The patch itself can be found [here](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f).

### Workarounds

There are no known workarounds for this issue.

However, users who enforce running containers with more confined security
profiles (such as reduced capabilities, not running code as root in the
container, user namespaces, AppArmor/SELinux, and seccomp) will restrict what
an attacker can do in the case of a container breakout -- we recommend users
make use of strict security profiles if possible (most notably user namespaces
-- which can massively restrict the impact a container breakout can have on the
host system).

### References
* [commit](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f)
* [seclists public disclosure](https://www.openwall.com/lists/oss-security/2021/05/19/2)

### Credit

Thanks to Etienne Champetier for discovering and disclosing this vulnerability,
to Noah Meyerhans for writing the first draft of this patch, and to Samuel Karp
for testing it.

### For more information

If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencontainers/runc/issues).
* Email us at <security@opencontainers.org>.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30465.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30465.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30465
reference_id
reference_type
scores
0
value 0.01473
scoring_system epss
scoring_elements 0.80881
published_at 2026-04-01T12:55:00Z
1
value 0.01473
scoring_system epss
scoring_elements 0.80913
published_at 2026-04-04T12:55:00Z
2
value 0.01473
scoring_system epss
scoring_elements 0.8089
published_at 2026-04-02T12:55:00Z
3
value 0.02175
scoring_system epss
scoring_elements 0.84354
published_at 2026-04-18T12:55:00Z
4
value 0.02175
scoring_system epss
scoring_elements 0.84353
published_at 2026-04-16T12:55:00Z
5
value 0.02175
scoring_system epss
scoring_elements 0.84357
published_at 2026-04-21T12:55:00Z
6
value 0.02358
scoring_system epss
scoring_elements 0.8492
published_at 2026-04-13T12:55:00Z
7
value 0.02358
scoring_system epss
scoring_elements 0.84879
published_at 2026-04-07T12:55:00Z
8
value 0.02358
scoring_system epss
scoring_elements 0.84902
published_at 2026-04-08T12:55:00Z
9
value 0.02358
scoring_system epss
scoring_elements 0.84909
published_at 2026-04-09T12:55:00Z
10
value 0.02358
scoring_system epss
scoring_elements 0.84927
published_at 2026-04-11T12:55:00Z
11
value 0.02358
scoring_system epss
scoring_elements 0.84926
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30465
2
reference_url https://bugzilla.opensuse.org/show_bug.cgi?id=1185405
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.opensuse.org/show_bug.cgi?id=1185405
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30465
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f
6
reference_url https://github.com/opencontainers/runc/releases
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/releases
7
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r
8
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35ZW6NBZSBH5PWIT7JU4HXOXGFVDCOHH
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35ZW6NBZSBH5PWIT7JU4HXOXGFVDCOHH
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-30465
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-30465
12
reference_url https://security.gentoo.org/glsa/202107-26
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202107-26
13
reference_url https://security.netapp.com/advisory/ntap-20210708-0003
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20210708-0003
14
reference_url http://www.openwall.com/lists/oss-security/2021/05/19/2
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2021/05/19/2
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1954736
reference_id 1954736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1954736
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988768
reference_id 988768
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988768
17
reference_url https://security.archlinux.org/ASA-202105-17
reference_id ASA-202105-17
reference_type
scores
url https://security.archlinux.org/ASA-202105-17
18
reference_url https://security.archlinux.org/AVG-1972
reference_id AVG-1972
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1972
19
reference_url https://access.redhat.com/errata/RHSA-2021:1562
reference_id RHSA-2021:1562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1562
20
reference_url https://access.redhat.com/errata/RHSA-2021:1566
reference_id RHSA-2021:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1566
21
reference_url https://access.redhat.com/errata/RHSA-2021:2057
reference_id RHSA-2021:2057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2057
22
reference_url https://access.redhat.com/errata/RHSA-2021:2144
reference_id RHSA-2021:2144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2144
23
reference_url https://access.redhat.com/errata/RHSA-2021:2145
reference_id RHSA-2021:2145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2145
24
reference_url https://access.redhat.com/errata/RHSA-2021:2150
reference_id RHSA-2021:2150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2150
25
reference_url https://access.redhat.com/errata/RHSA-2021:2291
reference_id RHSA-2021:2291
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2291
26
reference_url https://access.redhat.com/errata/RHSA-2021:2292
reference_id RHSA-2021:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2292
27
reference_url https://access.redhat.com/errata/RHSA-2021:2370
reference_id RHSA-2021:2370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2370
28
reference_url https://access.redhat.com/errata/RHSA-2021:2371
reference_id RHSA-2021:2371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2371
29
reference_url https://usn.ubuntu.com/4960-1/
reference_id USN-4960-1
reference_type
scores
url https://usn.ubuntu.com/4960-1/
30
reference_url https://usn.ubuntu.com/USN-4867-1/
reference_id USN-USN-4867-1
reference_type
scores
url https://usn.ubuntu.com/USN-4867-1/
fixed_packages
0
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2021-30465, GHSA-c3xm-pvg7-gh7r
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mdg-3961-cybf
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%3Fdistro=trixie