Bug 1181961 - (CVE-2021-20206) VUL-0: CVE-2021-20206: cni,podman,cni-plugins: Arbitrary path injection via type field in CNI configuration
(CVE-2021-20206)
VUL-0: CVE-2021-20206: cni,podman,cni-plugins: Arbitrary path injection via t...
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Containers Team
Security Team bot
https://smash.suse.de/issue/277299/
CVSSv3.1:SUSE:CVE-2021-20206:7.2:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-02-08 17:27 UTC by Gianluca Gabrielli
Modified: 2023-01-27 14:25 UTC (History)
11 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gianluca Gabrielli 2021-02-08 17:27:24 UTC
CVE-2021-20206

A flaw was found in libcni. A user may  be able to change the "type:" field in a CNI configuration to an arbitrary path and could execute arbitrary binaries on a host.

Upstream patch:

https://github.com/containernetworking/cni/pull/808

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1919391
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20206
Comment 2 Gianluca Gabrielli 2021-02-08 17:33:32 UTC
An improper limitation of path name vulnerability was found in containernetworking/cni. When specifying the plugin to load in the `type` field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. An attacker can use this to execute other existing binaries other than the cni plugins/types such as `reboot`.
Comment 6 Vincent Moutoussamy 2022-08-25 09:05:06 UTC
@Aleksa, please take a look at this one.
Comment 7 Vincent Moutoussamy 2022-09-19 09:15:04 UTC
@Aleksa ping?
Comment 9 Aleksa Sarai 2022-09-21 01:03:00 UTC
Podman 3.1.0 and later have a fix for this, but the simplest solution (which will help with some other podman fixes) is to update podman and its dependencies in SLES to the latest versions.
Comment 10 Vincent Moutoussamy 2022-09-27 07:52:41 UTC
(In reply to Aleksa Sarai from comment #9)
> Podman 3.1.0 and later have a fix for this, but the simplest solution (which
> will help with some other podman fixes) is to update podman and its
> dependencies in SLES to the latest versions.

@Aleksa, I feel like we deserve to at least update podman to the latest 2.x release for 15GA and 15SP1, we are providing 2.1.1 and the latest is https://github.com/containers/podman/releases/tag/v2.2.1. And would that provide a fix for this CVE?
Comment 11 Vincent Moutoussamy 2022-09-27 08:09:49 UTC
well we will update podman to 3.4.7 for SLE15SP1 https://maintenance.suse.de/request/278583/
Comment 14 Swamp Workflow Management 2022-09-30 16:21:20 UTC
SUSE-SU-2022:3480-1: An update that solves three vulnerabilities and has two fixes is now available.

Category: security (important)
Bug References: 1167864,1181961,1183043,1192999,1197870
CVE References: CVE-2020-10696,CVE-2021-20206,CVE-2022-27651
JIRA References: 
Sources used:
SUSE Manager Server 4.1 (src):    buildah-1.25.1-150100.3.13.12
SUSE Manager Retail Branch Server 4.1 (src):    buildah-1.25.1-150100.3.13.12
SUSE Manager Proxy 4.1 (src):    buildah-1.25.1-150100.3.13.12
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    buildah-1.25.1-150100.3.13.12
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    buildah-1.25.1-150100.3.13.12
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    buildah-1.25.1-150100.3.13.12
SUSE Linux Enterprise Server 15-SP2-BCL (src):    buildah-1.25.1-150100.3.13.12
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    buildah-1.25.1-150100.3.13.12
SUSE Linux Enterprise Server 15-SP1-BCL (src):    buildah-1.25.1-150100.3.13.12
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    buildah-1.25.1-150100.3.13.12
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    buildah-1.25.1-150100.3.13.12
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    buildah-1.25.1-150100.3.13.12
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    buildah-1.25.1-150100.3.13.12
SUSE Enterprise Storage 7 (src):    buildah-1.25.1-150100.3.13.12
SUSE Enterprise Storage 6 (src):    buildah-1.25.1-150100.3.13.12
SUSE CaaS Platform 4.0 (src):    buildah-1.25.1-150100.3.13.12

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Swamp Workflow Management 2022-10-19 16:25:59 UTC
SUSE-SU-2022:3655-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1167864,1181961,1202812
CVE References: CVE-2020-10696,CVE-2021-20206,CVE-2022-2990
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    buildah-1.27.1-150400.3.8.1
SUSE Linux Enterprise Module for Containers 15-SP4 (src):    buildah-1.27.1-150400.3.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 17 Swamp Workflow Management 2022-10-26 13:47:23 UTC
SUSE-SU-2022:3766-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1167864,1181961,1202812
CVE References: CVE-2020-10696,CVE-2021-20206,CVE-2022-2990
JIRA References: 
Sources used:
openSUSE Leap Micro 5.2 (src):    libgpg-error-1.42-150300.9.3.1
openSUSE Leap 15.3 (src):    buildah-1.27.1-150300.8.11.1, libgpg-error-1.42-150300.9.3.1
SUSE Linux Enterprise Module for Containers 15-SP3 (src):    buildah-1.27.1-150300.8.11.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    libgpg-error-1.42-150300.9.3.1
SUSE Linux Enterprise Micro 5.2 (src):    libgpg-error-1.42-150300.9.3.1
SUSE Linux Enterprise Micro 5.1 (src):    libgpg-error-1.42-150300.9.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 24 Swamp Workflow Management 2022-11-21 17:21:48 UTC
SUSE-SU-2022:4151-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 1172410,1181961
CVE References: CVE-2020-10749,CVE-2021-20206
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Public Cloud 15 (src):    cni-plugins-0.8.6-150000.1.7.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 25 Swamp Workflow Management 2022-11-21 17:23:08 UTC
SUSE-SU-2022:4150-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1181961
CVE References: CVE-2021-20206
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Public Cloud 15 (src):    cni-0.7.1-150000.1.7.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 28 Vincent Moutoussamy 2022-12-05 10:00:00 UTC
I believe this can be closed now after the recent SRs.
Comment 30 Swamp Workflow Management 2022-12-20 20:23:31 UTC
SUSE-SU-2022:4593-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1181961
CVE References: CVE-2021-20206
JIRA References: 
Sources used:
openSUSE Leap Micro 5.3 (src):    cni-plugins-0.8.6-150100.3.11.1
openSUSE Leap Micro 5.2 (src):    cni-plugins-0.8.6-150100.3.11.1
openSUSE Leap 15.4 (src):    cni-plugins-0.8.6-150100.3.11.1
openSUSE Leap 15.3 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Manager Server 4.1 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Manager Retail Branch Server 4.1 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Manager Proxy 4.1 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Module for Public Cloud 15-SP2 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Module for Public Cloud 15-SP1 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Module for Containers 15-SP4 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Module for Containers 15-SP3 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Micro 5.3 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Micro 5.2 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise Micro 5.1 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Enterprise Storage 7.1 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Enterprise Storage 7 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE Enterprise Storage 6 (src):    cni-plugins-0.8.6-150100.3.11.1
SUSE CaaS Platform 4.0 (src):    cni-plugins-0.8.6-150100.3.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 31 Swamp Workflow Management 2022-12-20 20:27:07 UTC
SUSE-SU-2022:4592-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1181961
CVE References: CVE-2021-20206
JIRA References: 
Sources used:
openSUSE Leap Micro 5.3 (src):    cni-0.7.1-150100.3.8.1
openSUSE Leap Micro 5.2 (src):    cni-0.7.1-150100.3.8.1
openSUSE Leap 15.4 (src):    cni-0.7.1-150100.3.8.1
openSUSE Leap 15.3 (src):    cni-0.7.1-150100.3.8.1
SUSE Manager Server 4.1 (src):    cni-0.7.1-150100.3.8.1
SUSE Manager Retail Branch Server 4.1 (src):    cni-0.7.1-150100.3.8.1
SUSE Manager Proxy 4.1 (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Module for Public Cloud 15-SP2 (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Module for Public Cloud 15-SP1 (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Module for Containers 15-SP4 (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Module for Containers 15-SP3 (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Micro 5.3 (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Micro 5.2 (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise Micro 5.1 (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    cni-0.7.1-150100.3.8.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    cni-0.7.1-150100.3.8.1
SUSE Enterprise Storage 7.1 (src):    cni-0.7.1-150100.3.8.1
SUSE Enterprise Storage 7 (src):    cni-0.7.1-150100.3.8.1
SUSE Enterprise Storage 6 (src):    cni-0.7.1-150100.3.8.1
SUSE CaaS Platform 4.0 (src):    cni-0.7.1-150100.3.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 32 Swamp Workflow Management 2023-01-27 14:25:58 UTC
SUSE-SU-2023:0187-1: An update that solves 6 vulnerabilities, contains one feature and has one errata is now available.

Category: security (important)
Bug References: 1181640,1181961,1193166,1193273,1197672,1199790,1202809
CVE References: CVE-2021-20199,CVE-2021-20206,CVE-2021-4024,CVE-2021-41190,CVE-2022-27649,CVE-2022-2989
JIRA References: PED-2771
Sources used:
openSUSE Leap Micro 5.3 (src):    podman-4.3.1-150400.4.11.1
openSUSE Leap 15.4 (src):    podman-4.3.1-150400.4.11.1
SUSE Linux Enterprise Module for Containers 15-SP4 (src):    podman-4.3.1-150400.4.11.1
SUSE Linux Enterprise Micro 5.3 (src):    podman-4.3.1-150400.4.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.