Filtered by vendor Kubevirt
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-1798 | 1 Kubevirt | 1 Kubevirt | 2022-09-19 | N/A | 6.5 MEDIUM |
A path traversal vulnerability in KubeVirt versions up to 0.56 (and 0.55.1) on all platforms allows a user able to configure the kubevirt to read arbitrary files on the host filesystem which are publicly readable or which are readable for UID 107 or GID 107. /proc/self/<> is not accessible. | |||||
CVE-2020-14316 | 2 Kubevirt, Redhat | 2 Kubevirt, Openshift Virtualization | 2021-07-21 | 6.5 MEDIUM | 9.9 CRITICAL |
A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | |||||
CVE-2020-1701 | 1 Kubevirt | 1 Kubevirt | 2021-06-10 | 4.0 MEDIUM | 6.5 MEDIUM |
A flaw was found in the KubeVirt main virt-handler versions before 0.26.0 regarding the access permissions of virt-handler. An attacker with access to create VMs could attach any secret within their namespace, allowing them to read the contents of that secret. | |||||
CVE-2019-10175 | 1 Kubevirt | 1 Containerized-data-importer | 2020-10-01 | 4.0 MEDIUM | 6.5 MEDIUM |
A flaw was found in the containerized-data-importer in virt-cdi-cloner, version 1.4, where the host-assisted cloning feature does not determine whether the requesting user has permission to access the Persistent Volume Claim (PVC) in the source namespace. This could allow users to clone any PVC in the cluster into their own namespace, effectively allowing access to other user's data. | |||||
CVE-2019-3841 | 1 Kubevirt | 1 Containerized Data Importer | 2019-10-09 | 4.9 MEDIUM | 6.8 MEDIUM |
Kubevirt/virt-cdi-importer, versions 1.4.0 to 1.5.3 inclusive, were reported to disable TLS certificate validation when importing data into PVCs from container registries. This could enable man-in-the-middle attacks between a container registry and the virt-cdi-component, leading to possible undetected tampering of trusted container image content. |