Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID:
 <CH9PR21MB57635631DE20DA114CE28C628F0E2@CH9PR21MB5763.namprd21.prod.outlook.com>
Date: Thu, 21 May 2026 18:26:54 +0000
From: Aurelien Bombo <aurelien.bombo@...rosoft.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: CVE-2026-47243: Kata Containers runtime-rs 3.30: virtiofsd symlink
 escape

This vulnerability was fixed in Kata Containers 3.31.0:

https://github.com/kata-containers/kata-containers/releases/tag/3.31.0
https://github.com/kata-containers/kata-containers/commit/555b7738fe2f699af6d57712cf75330f012b4e3b

Description:

In the runtime-rs standalone virtio-fs path, Kata Containers runs virtiofsd
as root with --sandbox none --seccomp none.

If an attacker has root-equivalent execution inside the Kata guest VM,
they can send raw FUSE requests directly to the host virtiofsd.

Then, a raw FUSE_SYMLINK request whose new symlink name is
an absolute host path is honored outside the virtio-fs shared directory.

This lets guest root create host-root-owned symlinks in sensitive host paths.

CVE: CVE-2026-47243
GHSA: GHSA-2gv2-cffp-j227

Original report:
https://github.com/kata-containers/kata-containers/security/advisories/GHSA-2gv2-cffp-j227

---
Aurelien Bombo
Kata Containers Vulnerability Management Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.