Kata Containers before 1.11.0 on Cloud Hypervisor persists guest filesystem changes to the underlying image file on the host. A malicious guest can overwrite the image file to gain control of all subsequent guest VMs. Since Kata Containers uses the same VM image file with all VMMs, this issue may also affect QEMU and Firecracker based guests.
References
Link | Resource |
---|---|
https://github.com/kata-containers/runtime/pull/2487 | Patch Third Party Advisory |
https://github.com/kata-containers/runtime/pull/2487 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kata-containers/runtime/pull/2487 - Patch, Third Party Advisory |
Information
Published : 2020-05-19 21:15
Updated : 2024-11-21 05:24
NVD link : CVE-2020-2025
Mitre link : CVE-2020-2025
CVE.ORG link : CVE-2020-2025
JSON object : View
Products Affected
katacontainers
- runtime