Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-877x-32pm-p28x

Опубликовано: 15 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

Link Following in Kata Runtime

A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.

Пакеты

Наименование

github.com/kata-containers/runtime

go
Затронутые версииВерсия исправления

<= 1.9

1.9.1

Наименование

github.com/kata-containers/runtime

go
Затронутые версииВерсия исправления

>= 1.10.0, <= 1.10.5

1.10.6

Наименование

github.com/kata-containers/runtime

go
Затронутые версииВерсия исправления

= 1.11.0

1.11.1

EPSS

Процентиль: 44%
0.00211
Низкий

8.8 High

CVSS3

Дефекты

CWE-59

Связанные уязвимости

CVSS3: 7.8
nvd
около 5 лет назад

A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.

oracle-oval
почти 5 лет назад

ELSA-2020-5766: Unbreakable Enterprise kernel-container kata-image kata-runtime kata kubernetes olcne security update (IMPORTANT)

oracle-oval
почти 5 лет назад

ELSA-2020-5765: Unbreakable Enterprise kernel-container kata-image kata-runtime kata kubernetes kubernetes istio olcne security update (IMPORTANT)

EPSS

Процентиль: 44%
0.00211
Низкий

8.8 High

CVSS3

Дефекты

CWE-59