A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges.
To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
References
| Link | Resource |
|---|---|
| https://aws.amazon.com/security/security-bulletins/2026-003-AWS/ | Vendor Advisory |
| https://github.com/firecracker-microvm/firecracker/releases/tag/v1.13.2 | Release Notes Product |
| https://github.com/firecracker-microvm/firecracker/releases/tag/v1.14.1 | Release Notes Product |
| https://github.com/firecracker-microvm/firecracker/security/advisories/GHSA-36j2-f825-qvgc | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-01-23 21:15
Updated : 2026-01-30 16:57
NVD link : CVE-2026-1386
Mitre link : CVE-2026-1386
CVE.ORG link : CVE-2026-1386
JSON object : View
Products Affected
amazon
- firecracker
CWE
CWE-61
UNIX Symbolic Link (Symlink) Following
