runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
https://security.netapp.com/advisory/ntap-20210708-0003/
https://security.gentoo.org/glsa/202107-26
https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r
https://github.com/opencontainers/runc/releases
http://www.openwall.com/lists/oss-security/2021/05/19/2