Link Following in Kata Runtime
High severity
GitHub Reviewed
Published
Feb 15, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Package
Affected versions
<= 1.9
>= 1.10.0, <= 1.10.5
= 1.11.0
Patched versions
1.9.1
1.10.6
1.11.1
Description
Published by the National Vulnerability Database
Jun 10, 2020
Reviewed
May 13, 2021
Published to the GitHub Advisory Database
Feb 15, 2022
Last updated
Feb 1, 2023
A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.
References