The VOLUME
directive in Dockerfiles, or the config.volumes
field in OCI image descriptors, indicates filesystem paths "where the process is likely to write data". While these paths have special semantics in Docker, they are only hints in the OCI spec and are not treated specially by Kubernetes. However, containered implements the specified conversion logic and adds a mount point if there is none set by Kubernetes.
Unfortunately, the specification leaves it open whether the mount point is populated with any and what data, so the runtime needs to be able to push arbitrary data to the Kata agent. However, this is almost always not what the user wants:
VOLUME
location is usually important to the app's core functionality, which is usually at odds with the data in that location being untrusted.VOLUME
declarations are often used by image vendors to indicate "mount your persistence here" to the user. They are rarely useful without a real volume mounted there.All of the following need to be true to be affected by this vulnerability:
If these are all true, the host is able to write arbitrary trees below that mount point.
Patched in v1.9.1 by disallowing this configuration in contrast generate
.
Explicitly mount an emptyDir
to all VOLUME
locations. If the initial data in these locations is needed by the application, the image needs to be modified to remove the config.volumes
entries.
{ "github_reviewed": true, "nvd_published_at": null, "cwe_ids": [ "CWE-552", "CWE-693" ], "github_reviewed_at": "2025-07-09T17:56:24Z", "severity": "LOW" }