A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0908 | A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions. |
Github GHSA |
GHSA-877x-32pm-p28x | Link Following in Kata Runtime |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-16T19:35:42.559Z
Reserved: 2019-12-04T00:00:00
Link: CVE-2020-2026
No data.
Status : Modified
Published: 2020-06-10T18:15:11.360
Modified: 2024-11-21T05:24:29.180
Link: CVE-2020-2026
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA