Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; and Kata Containers 1.9 and earlier versions.
{ "nvd_published_at": "2020-06-10T18:15:00Z", "github_reviewed_at": "2021-05-13T19:41:22Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-250", "CWE-269" ] }