[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-2026Date: (C)2020-06-11   (M)2024-02-01


A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.8CVSS Score : 4.6
Exploit Score: 2.0Exploit Score: 3.9
Impact Score: 6.0Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: CHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
FEDORA-2020-15a1bde727
FEDORA-2020-1af9cd8c87
FEDORA-2020-2f5879aeb6
FEDORA-2020-61fcf3ffc7
FEDORA-2020-7a0b6071a4
FEDORA-2020-c33083813d
https://github.com/kata-containers/runtime/issues/2712
https://github.com/kata-containers/runtime/pull/2713
https://github.com/kata-containers/runtime/releases/tag/1.10.5
https://github.com/kata-containers/runtime/releases/tag/1.11.1

CWE    1
CWE-59
OVAL    8
oval:org.secpod.oval:def:119003
oval:org.secpod.oval:def:118805
oval:org.secpod.oval:def:118802
oval:org.secpod.oval:def:119009
...

© SecPod Technologies