Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mN3F3LWpqOWMtcnBxOc4AAzkQ
In Lima, a malicious disk image could read a single file on the host filesystem as a qcow2/vmdk backing file
Note
The official templates of Lima, and the well-known third party products (Colima, Rancher Desktop, and Finch) are unlikely to be affected by this issue.
Impact
A virtual machine instance with a malicious disk image could read a single file on the host filesystem, even when no filesystem is mounted from the host.
To exploit this issue, the attacker has to embed the target file path (an absolute or a relative path from the instance directory) in a malicious disk image, as the qcow2 (or vmdk) backing file path string.
As Lima refuses to run as the root, it is practically impossible for the attacker to read the entire host disk via /dev/rdiskN
.
Also, practically, the attacker cannot read at least the first 512 bytes (MBR) of the target file.
Patches
Patched in Lima v0.16.0, by prohibiting using a backing file path in the VM base image.
Workarounds
Do not use an untrusted disk image.
Permalink: https://github.com/advisories/GHSA-f7qw-jj9c-rpq9JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mN3F3LWpqOWMtcnBxOc4AAzkQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 11 months ago
Updated: 6 months ago
CVSS Score: 2.7
CVSS vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
Identifiers: GHSA-f7qw-jj9c-rpq9, CVE-2023-32684
References:
- https://github.com/lima-vm/lima/security/advisories/GHSA-f7qw-jj9c-rpq9
- https://nvd.nist.gov/vuln/detail/CVE-2023-32684
- https://github.com/lima-vm/lima/commit/01dbd4d9cabe692afa4517be3995771f0ebb38a5
- https://github.com/lima-vm/lima/releases/tag/v0.16.0
- https://github.com/advisories/GHSA-f7qw-jj9c-rpq9
Blast Radius: 3.8
Affected Packages
go:github.com/lima-vm/lima
Dependent packages: 9Dependent repositories: 25
Downloads:
Affected Version Ranges: < 0.16.0
Fixed in: 0.16.0
All affected versions: 0.1.0, 0.1.1, 0.1.2, 0.2.0, 0.2.1, 0.3.0, 0.4.0, 0.5.0, 0.6.0, 0.6.1, 0.6.2, 0.6.3, 0.6.4, 0.7.0, 0.7.1, 0.7.2, 0.7.3, 0.7.4, 0.8.0, 0.8.1, 0.8.2, 0.8.3, 0.9.0, 0.9.1, 0.9.2, 0.10.0, 0.11.0, 0.11.1, 0.11.2, 0.11.3, 0.12.0, 0.13.0, 0.14.0, 0.14.1, 0.14.2, 0.15.0, 0.15.1
All unaffected versions: 0.16.0, 0.17.0, 0.17.1, 0.17.2, 0.18.0, 0.19.0, 0.19.1, 0.20.0, 0.20.1, 0.20.2, 0.21.0