This is core component of Kata Container, to make it work, you need a isulad/docker engine.
Security Fix(es):
An improper file permissions vulnerability affects Kata Containers prior to 1.11.5. When using a Kubernetes hostPath volume and mounting either a file or directory into a container as readonly, the file/directory is mounted as readOnly inside the container, but is still writable inside the guest. For a container breakout situation, a malicious guest can potentially modify or delete files/directories expected to be read-only.(CVE-2020-28914)
{
"severity": "High"
}{
"x86_64": [
"kata-containers-v1.11.1-8.oe1.x86_64.rpm",
"kata-containers-v1.11.1-8.oe1.x86_64.rpm"
],
"aarch64": [
"kata-containers-v1.11.1-8.oe1.aarch64.rpm",
"kata-containers-v1.11.1-8.oe1.aarch64.rpm"
],
"src": [
"kata-containers-v1.11.1-8.oe1.src.rpm",
"kata-containers-v1.11.1-8.oe1.src.rpm"
]
}