A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: palo_alto
Published: 2020-06-10T17:27:46.151024Z
Updated: 2024-09-16T19:35:42.559Z
Reserved: 2019-12-04T00:00:00
Link: CVE-2020-2026
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-06-10T18:15:11.360
Modified: 2024-11-21T05:24:29.180
Link: CVE-2020-2026
Redhat
No data.