Description
A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.
Published: 2020-06-10
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-0908 A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.
Github GHSA Github GHSA GHSA-877x-32pm-p28x Link Following in Kata Runtime
History

No history.

Subscriptions

Fedoraproject Fedora
Katacontainers Runtime
cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-09-16T19:35:42.559Z

Reserved: 2019-12-04T00:00:00.000Z

Link: CVE-2020-2026

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-10T18:15:11.360

Modified: 2024-11-21T05:24:29.180

Link: CVE-2020-2026

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses