GHSA-f7qw-jj9c-rpq9

Suggest an improvement
Source
https://github.com/advisories/GHSA-f7qw-jj9c-rpq9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-f7qw-jj9c-rpq9/GHSA-f7qw-jj9c-rpq9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-f7qw-jj9c-rpq9
Aliases
Published
2023-05-31T23:38:28Z
Modified
2023-11-08T04:12:35.626775Z
Severity
  • 2.7 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N CVSS Calculator
Summary
In Lima, a malicious disk image could read a single file on the host filesystem as a qcow2/vmdk backing file
Details

Note

The official templates of Lima, and the well-known third party products (Colima, Rancher Desktop, and Finch) are unlikely to be affected by this issue.

Impact

A virtual machine instance with a malicious disk image could read a single file on the host filesystem, even when no filesystem is mounted from the host.

To exploit this issue, the attacker has to embed the target file path (an absolute or a relative path from the instance directory) in a malicious disk image, as the qcow2 (or vmdk) backing file path string. As Lima refuses to run as the root, it is practically impossible for the attacker to read the entire host disk via /dev/rdiskN. Also, practically, the attacker cannot read at least the first 512 bytes (MBR) of the target file.

Patches

Patched in Lima v0.16.0, by prohibiting using a backing file path in the VM base image.

Workarounds

Do not use an untrusted disk image.

References

Affected packages

Go / github.com/lima-vm/lima

Package

Name
github.com/lima-vm/lima
View open source insights on deps.dev
Purl
pkg:golang/github.com/lima-vm/lima

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.16.0