#VU33996 Link following in Kata Containers


Published: 2020-08-05

Vulnerability identifier: #VU33996

Vulnerability risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-2024

CWE-ID: CWE-59

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Kata Containers
Server applications / Virtualization software

Vendor: Kata Containers

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

An improper link resolution vulnerability affects Kata Containers versions prior to 1.11.0. Upon container teardown, a malicious guest can trick the kata-runtime into unmounting any mount point on the host and all mount points underneath it, potentiality resulting in a host DoS.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Kata Containers: 1.9.3 - 1.10.6


External links
http://github.com/kata-containers/runtime/issues/2474
http://github.com/kata-containers/runtime/pull/2475


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability