Kata Containers before 1.11.0 on Cloud Hypervisor persists guest filesystem changes to the underlying image file on the host. A malicious guest can overwrite the image file to gain control of all subsequent guest VMs. Since Kata Containers uses the same VM image file with all VMMs, this issue may also affect QEMU and Firecracker based guests.
References
Link | Resource |
---|---|
https://github.com/kata-containers/runtime/pull/2487 | Patch Third Party Advisory |
Configurations
Information
Published : 2020-05-19 14:15
Updated : 2020-05-21 10:02
NVD link : CVE-2020-2025
Mitre link : CVE-2020-2025
JSON object : View
CWE
CWE-281
Improper Preservation of Permissions
Products Affected
katacontainers
- runtime