logo

CVE-2023-32684 github.com/lima-vm/lima

Package

Manager: go
Name: github.com/lima-vm/lima
Vulnerable Version: >=0 <0.16.0

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00076 pctl0.23409

Details

In Lima, a malicious disk image could read a single file on the host filesystem as a qcow2/vmdk backing file > **Note** > > The official templates of Lima, and the well-known third party products (Colima, Rancher Desktop, and Finch) are *unlikely* to be affected by this issue. ### Impact A virtual machine instance with a malicious disk image could read a single file on the host filesystem, even when no filesystem is mounted from the host. To exploit this issue, the attacker has to embed the target file path (an absolute or a relative path from the instance directory) in a malicious disk image, as the [qcow2 (or vmdk) backing file path string](https://gitlab.com/qemu-project/qemu/-/blob/v8.0.0/docs/interop/qcow2.txt#L23-L34). As Lima refuses to run as the root, it is practically impossible for the attacker to read the entire host disk via `/dev/rdiskN`. Also, practically, the attacker cannot read at least the first 512 bytes (MBR) of the target file. ### Patches Patched in Lima v0.16.0, by prohibiting using a backing file path in the VM base image. ### Workarounds Do not use an untrusted disk image.

Metadata

Created: 2023-05-31T23:38:28Z
Modified: 2023-05-31T23:38:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-f7qw-jj9c-rpq9/GHSA-f7qw-jj9c-rpq9.json
CWE IDs: ["CWE-552"]
Alternative ID: GHSA-f7qw-jj9c-rpq9
Finding: F123
Auto approve: 1