
CVE-2020-27151
https://notcve.org/view.php?id=CVE-2020-27151
07 Dec 2020 — An issue was discovered in Kata Containers through 1.11.3 and 2.x through 2.0-rc1. The runtime will execute binaries given using annotations without any kind of validation. Someone who is granted access rights to a cluster will be able to have kata-runtime execute arbitrary binaries as root on the worker nodes. Se detectó un problema en Kata Containers versiones hasta 1.11.3 y versiones 2.x hasta 2.0-rc1. El tiempo de ejecución ejecutará los binarios proporcionados mediante anotaciones sin ningún tipo de va... • https://bugs.launchpad.net/katacontainers.io/+bug/1878234 •

CVE-2020-28914
https://notcve.org/view.php?id=CVE-2020-28914
17 Nov 2020 — An improper file permissions vulnerability affects Kata Containers prior to 1.11.5. When using a Kubernetes hostPath volume and mounting either a file or directory into a container as readonly, the file/directory is mounted as readOnly inside the container, but is still writable inside the guest. For a container breakout situation, a malicious guest can potentially modify or delete files/directories expected to be read-only. Una vulnerabilidad de permisos de archivo inapropiados afecta a Kata Containers ver... • https://github.com/kata-containers/kata-containers/pull/1062 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2020-2023 – Kata Containers - Containers have access to the guest root filesystem device
https://notcve.org/view.php?id=CVE-2020-2023
10 Jun 2020 — Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; and Kata Containers 1.9 and earlier versions. Kata Containers no restringe el acceso de los contenedores al dispositivo del sistema de archivos root del invitado. Los contenedores malicios... • https://github.com/ssst0n3/kata-cve-2020-2023-poc • CWE-250: Execution with Unnecessary Privileges •

CVE-2020-2026 – Kata Containers - Guests can trick the kata-runtime into mounting the container image on any host path
https://notcve.org/view.php?id=CVE-2020-2026
10 Jun 2020 — A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions. Un invitado malicioso comprometido antes de la creación de un contenedor ... • https://github.com/kata-containers/runtime/issues/2712 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2020-2025 – Kata Containers - Cloud Hypervisor guests persist filesystem changes to the underlying host image file
https://notcve.org/view.php?id=CVE-2020-2025
19 May 2020 — Kata Containers before 1.11.0 on Cloud Hypervisor persists guest filesystem changes to the underlying image file on the host. A malicious guest can overwrite the image file to gain control of all subsequent guest VMs. Since Kata Containers uses the same VM image file with all VMMs, this issue may also affect QEMU and Firecracker based guests. Kata Containers versiones anteriores a 1.11.0, en Cloud Hypervisor persisten cambios del sistema de archivos invitado en el archivo de imagen subyacente en el host. Un... • https://github.com/kata-containers/runtime/pull/2487 • CWE-281: Improper Preservation of Permissions CWE-284: Improper Access Control •

CVE-2020-2024 – Kata Containers - Guests can trick the kata-runtime into unmounting any mount point on the host
https://notcve.org/view.php?id=CVE-2020-2024
19 May 2020 — An improper link resolution vulnerability affects Kata Containers versions prior to 1.11.0. Upon container teardown, a malicious guest can trick the kata-runtime into unmounting any mount point on the host and all mount points underneath it, potentiality resulting in a host DoS. Una vulnerabilidad de resolución de enlace inapropiada afecta a Kata Containers versiones anteriores a 1.11.0. Tras el desmontaje del contenedor, un invitado malicioso puede engañar al kata-runtime para que desmonte cualquier punto ... • https://github.com/kata-containers/runtime/issues/2474 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •