296,379
Total vulnerabilities in the database
A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.
Software | From | Fixed in |
---|---|---|
katacontainers / runtime | 1.10 | 1.10.5 |
katacontainers / runtime | 1.11 | 1.11.1 |
katacontainers / runtime | - | 1.9.x |
fedoraproject / fedora | 31 | 31.x |
![]() |
- | 1.9.1 |
![]() |
1.10.0 | 1.10.6 |
![]() |
1.11.0 | 1.11.0.x |
![]() |
1.11.0 | 1.11.1 |