Bugzilla – Bug 1181961
VUL-0: CVE-2021-20206: cni,podman,cni-plugins: Arbitrary path injection via type field in CNI configuration
Last modified: 2023-01-27 14:25:58 UTC
CVE-2021-20206 A flaw was found in libcni. A user may be able to change the "type:" field in a CNI configuration to an arbitrary path and could execute arbitrary binaries on a host. Upstream patch: https://github.com/containernetworking/cni/pull/808 References: https://bugzilla.redhat.com/show_bug.cgi?id=1919391 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20206
Upstream patch: https://github.com/containernetworking/cni/commit/ada67263b12ff0c65f1256e120f6d9f7f0277388.patch
An improper limitation of path name vulnerability was found in containernetworking/cni. When specifying the plugin to load in the `type` field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. An attacker can use this to execute other existing binaries other than the cni plugins/types such as `reboot`.
@Aleksa, please take a look at this one.
@Aleksa ping?
Podman 3.1.0 and later have a fix for this, but the simplest solution (which will help with some other podman fixes) is to update podman and its dependencies in SLES to the latest versions.
(In reply to Aleksa Sarai from comment #9) > Podman 3.1.0 and later have a fix for this, but the simplest solution (which > will help with some other podman fixes) is to update podman and its > dependencies in SLES to the latest versions. @Aleksa, I feel like we deserve to at least update podman to the latest 2.x release for 15GA and 15SP1, we are providing 2.1.1 and the latest is https://github.com/containers/podman/releases/tag/v2.2.1. And would that provide a fix for this CVE?
well we will update podman to 3.4.7 for SLE15SP1 https://maintenance.suse.de/request/278583/
SUSE-SU-2022:3480-1: An update that solves three vulnerabilities and has two fixes is now available. Category: security (important) Bug References: 1167864,1181961,1183043,1192999,1197870 CVE References: CVE-2020-10696,CVE-2021-20206,CVE-2022-27651 JIRA References: Sources used: SUSE Manager Server 4.1 (src): buildah-1.25.1-150100.3.13.12 SUSE Manager Retail Branch Server 4.1 (src): buildah-1.25.1-150100.3.13.12 SUSE Manager Proxy 4.1 (src): buildah-1.25.1-150100.3.13.12 SUSE Linux Enterprise Server for SAP 15-SP2 (src): buildah-1.25.1-150100.3.13.12 SUSE Linux Enterprise Server for SAP 15-SP1 (src): buildah-1.25.1-150100.3.13.12 SUSE Linux Enterprise Server 15-SP2-LTSS (src): buildah-1.25.1-150100.3.13.12 SUSE Linux Enterprise Server 15-SP2-BCL (src): buildah-1.25.1-150100.3.13.12 SUSE Linux Enterprise Server 15-SP1-LTSS (src): buildah-1.25.1-150100.3.13.12 SUSE Linux Enterprise Server 15-SP1-BCL (src): buildah-1.25.1-150100.3.13.12 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): buildah-1.25.1-150100.3.13.12 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): buildah-1.25.1-150100.3.13.12 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): buildah-1.25.1-150100.3.13.12 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): buildah-1.25.1-150100.3.13.12 SUSE Enterprise Storage 7 (src): buildah-1.25.1-150100.3.13.12 SUSE Enterprise Storage 6 (src): buildah-1.25.1-150100.3.13.12 SUSE CaaS Platform 4.0 (src): buildah-1.25.1-150100.3.13.12 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3655-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1167864,1181961,1202812 CVE References: CVE-2020-10696,CVE-2021-20206,CVE-2022-2990 JIRA References: Sources used: openSUSE Leap 15.4 (src): buildah-1.27.1-150400.3.8.1 SUSE Linux Enterprise Module for Containers 15-SP4 (src): buildah-1.27.1-150400.3.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3766-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1167864,1181961,1202812 CVE References: CVE-2020-10696,CVE-2021-20206,CVE-2022-2990 JIRA References: Sources used: openSUSE Leap Micro 5.2 (src): libgpg-error-1.42-150300.9.3.1 openSUSE Leap 15.3 (src): buildah-1.27.1-150300.8.11.1, libgpg-error-1.42-150300.9.3.1 SUSE Linux Enterprise Module for Containers 15-SP3 (src): buildah-1.27.1-150300.8.11.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): libgpg-error-1.42-150300.9.3.1 SUSE Linux Enterprise Micro 5.2 (src): libgpg-error-1.42-150300.9.3.1 SUSE Linux Enterprise Micro 5.1 (src): libgpg-error-1.42-150300.9.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4151-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1172410,1181961 CVE References: CVE-2020-10749,CVE-2021-20206 JIRA References: Sources used: SUSE Linux Enterprise Module for Public Cloud 15 (src): cni-plugins-0.8.6-150000.1.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4150-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1181961 CVE References: CVE-2021-20206 JIRA References: Sources used: SUSE Linux Enterprise Module for Public Cloud 15 (src): cni-0.7.1-150000.1.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
I believe this can be closed now after the recent SRs.
SUSE-SU-2022:4593-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1181961 CVE References: CVE-2021-20206 JIRA References: Sources used: openSUSE Leap Micro 5.3 (src): cni-plugins-0.8.6-150100.3.11.1 openSUSE Leap Micro 5.2 (src): cni-plugins-0.8.6-150100.3.11.1 openSUSE Leap 15.4 (src): cni-plugins-0.8.6-150100.3.11.1 openSUSE Leap 15.3 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Manager Server 4.1 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Manager Retail Branch Server 4.1 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Manager Proxy 4.1 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Module for Public Cloud 15-SP2 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Module for Public Cloud 15-SP1 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Module for Containers 15-SP4 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Module for Containers 15-SP3 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Micro 5.3 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Micro 5.2 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise Micro 5.1 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Enterprise Storage 7.1 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Enterprise Storage 7 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE Enterprise Storage 6 (src): cni-plugins-0.8.6-150100.3.11.1 SUSE CaaS Platform 4.0 (src): cni-plugins-0.8.6-150100.3.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4592-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1181961 CVE References: CVE-2021-20206 JIRA References: Sources used: openSUSE Leap Micro 5.3 (src): cni-0.7.1-150100.3.8.1 openSUSE Leap Micro 5.2 (src): cni-0.7.1-150100.3.8.1 openSUSE Leap 15.4 (src): cni-0.7.1-150100.3.8.1 openSUSE Leap 15.3 (src): cni-0.7.1-150100.3.8.1 SUSE Manager Server 4.1 (src): cni-0.7.1-150100.3.8.1 SUSE Manager Retail Branch Server 4.1 (src): cni-0.7.1-150100.3.8.1 SUSE Manager Proxy 4.1 (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Module for Public Cloud 15-SP2 (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Module for Public Cloud 15-SP1 (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Module for Containers 15-SP4 (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Module for Containers 15-SP3 (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Micro 5.3 (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Micro 5.2 (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise Micro 5.1 (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): cni-0.7.1-150100.3.8.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): cni-0.7.1-150100.3.8.1 SUSE Enterprise Storage 7.1 (src): cni-0.7.1-150100.3.8.1 SUSE Enterprise Storage 7 (src): cni-0.7.1-150100.3.8.1 SUSE Enterprise Storage 6 (src): cni-0.7.1-150100.3.8.1 SUSE CaaS Platform 4.0 (src): cni-0.7.1-150100.3.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:0187-1: An update that solves 6 vulnerabilities, contains one feature and has one errata is now available. Category: security (important) Bug References: 1181640,1181961,1193166,1193273,1197672,1199790,1202809 CVE References: CVE-2021-20199,CVE-2021-20206,CVE-2021-4024,CVE-2021-41190,CVE-2022-27649,CVE-2022-2989 JIRA References: PED-2771 Sources used: openSUSE Leap Micro 5.3 (src): podman-4.3.1-150400.4.11.1 openSUSE Leap 15.4 (src): podman-4.3.1-150400.4.11.1 SUSE Linux Enterprise Module for Containers 15-SP4 (src): podman-4.3.1-150400.4.11.1 SUSE Linux Enterprise Micro 5.3 (src): podman-4.3.1-150400.4.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.