logo

CVE-2020-2026 github.com/kata-containers/runtime

Package

Manager: go
Name: github.com/kata-containers/runtime
Vulnerable Version: >=0 <1.9.1 || >=1.10.0 <1.10.6 || =1.11.0 || >=1.11.0 <1.11.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.00211 pctl0.43642

Details

Link Following in Kata Runtime A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.

Metadata

Created: 2022-02-15T01:57:18Z
Modified: 2021-05-13T19:28:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-877x-32pm-p28x/GHSA-877x-32pm-p28x.json
CWE IDs: ["CWE-59"]
Alternative ID: GHSA-877x-32pm-p28x
Finding: F076
Auto approve: 1