Kata Containers - Guests can trick the kata-runtime into mounting the container image on any host path
CVE-2020-2026

7.8HIGH

Key Information:

Vendor
CVE Published:
10 June 2020

What is CVE-2020-2026?

A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.

Affected Version(s)

Kata Containers 1.11 < 1.11.1

Kata Containers 1.10 < 1.10.5

Kata Containers 1 <= 1.9

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Yuval Avrahami, Palo Alto Networks
.