漏洞标题
在 Lima,一个恶意的磁盘映像可以读取主机文件系统的单个文件作为qcow2/vmdk备份文件
漏洞描述信息
在利马,恶意的磁盘映像可以将主机文件系统上的单个文件读取为qcow2 / vmdk后端文件。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
漏洞类别
对路径名的限制不恰当(路径遍历)
漏洞标题
In Lima, a malicious disk image could read a single file on the host filesystem as a qcow2/vmdk backing file
漏洞描述信息
Lima launches Linux virtual machines, typically on macOS, for running containerd. Prior to version 0.16.0, a virtual machine instance with a malicious disk image could read a single file on the host filesystem, even when no filesystem is mounted from the host. The official templates of Lima and the well-known third party products (Colima, Rancher Desktop, and Finch) are unlikely to be affected by this issue. To exploit this issue, the attacker has to embed the target file path (an absolute or a relative path from the instance directory) in a malicious disk image, as the qcow2 (or vmdk) backing file path string. As Lima refuses to run as the root, it is practically impossible for the attacker to read the entire host disk via `/dev/rdiskN`. Also, practically, the attacker cannot read at least the first 512 bytes (MBR) of the target file. The issue has been patched in Lima in version 0.16.0 by prohibiting using a backing file path in the VM base image.
CVSS信息
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
漏洞类别
对外部实体的文件或目录可访问
漏洞标题
Lima 安全漏洞
漏洞描述信息
github lima是一个应用软件。Linux虚拟机,在macOS(又名“Linux-on-Mac”,“macOS子系统为Linux”,“Mac containerd”,非正式) Lima 0.16.0 之前版本存在安全漏洞,该漏洞源于具有恶意磁盘镜像的虚拟机实例可以读取主机文件系统上的单个文件,即使没有从主机挂载文件系统。
CVSS信息
N/A
漏洞类别
其他