Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; and Kata Containers 1.9 and earlier versions.
| Software | From | Fixed in |
|---|---|---|
| katacontainers / runtime | 1.10 | 1.10.5 |
| katacontainers / runtime | 1.11 | 1.11.1 |
| katacontainers / runtime | - | 1.9.x |
github.com/kata-containers/agent
|
- | 1.9.1 |
github.com/kata-containers/agent
|
1.10.0 | 1.10.5 |
github.com/kata-containers/agent
|
1.11.0 | 1.11.1 |
github.com/kata-containers/runtime
|
- | 1.9.1 |
github.com/kata-containers/runtime
|
1.10.0 | 1.10.5 |
github.com/kata-containers/runtime
|
1.11.0 | 1.11.1 |