A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-0908 A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.
Github GHSA Github GHSA GHSA-877x-32pm-p28x Link Following in Kata Runtime
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-09-16T19:35:42.559Z

Reserved: 2019-12-04T00:00:00

Link: CVE-2020-2026

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-10T18:15:11.360

Modified: 2024-11-21T05:24:29.180

Link: CVE-2020-2026

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses