Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. kubevirt.io/kubevirt
  4. ›
  5. GMS-2022-4130

GMS-2022-4130: KubeVirt vulnerable to arbitrary file read on host

September 15, 2022 (updated April 11, 2023)

As part of a Kubevirt audit performed by NCC group, a finding dealing with systemic lack of path sanitization which leads to a path traversal was identified. Google tested the exploitability of the paths in the audit report and identified that when combined with another vulnerability one of the paths leads to an arbitrary file read on the host from the VM. The read operations are limited to files which are publicly readable or which are readable for UID 107 or GID 107. /proc/self/<> is not accessible.

References

  • github.com/advisories/GHSA-qv98-3369-g364
  • github.com/google/security-research/security/advisories/GHSA-cvx8-ppmc-78hm
  • github.com/kubevirt/kubevirt/pull/8198
  • github.com/kubevirt/kubevirt/pull/8268
  • github.com/kubevirt/kubevirt/security/advisories/GHSA-qv98-3369-g364

Code Behaviors & Features

Detect and mitigate GMS-2022-4130 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.20.0 before 0.55.1

Fixed versions

  • 0.55.1

Solution

Upgrade to version 0.55.1 or above.

Source file

go/kubevirt.io/kubevirt/GMS-2022-4130.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:01 +0000.