Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2021-21284 CVE-2021-21285 CVE-2021-21334 CVE-2021-30465 |
CWE-ID | CWE-264 CWE-400 CWE-399 CWE-254 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
SUSE Linux Enterprise Module for Containers Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Enterprise Storage Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing Operating systems & Components / Operating system SUSE CaaS Platform Operating systems & Components / Operating system SUSE MicroOS Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system containerd Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU50273
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-21284
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions when using the --userns-remap option. A remote authenticated attacker on the local network can send a specially crafted request and gain elevated privileges as root on the system.
MitigationUpdate the affected package containerd, docker, runc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Containers: 15-SP2 - 15-SP3
SUSE Manager Proxy: 4.0
SUSE Manager Retail Branch Server: 4.0
SUSE Manager Server: 4.0
SUSE Enterprise Storage: 6 - 7
SUSE Linux Enterprise Server for SAP: 15 - 15-SP1
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP1-LTSS
SUSE CaaS Platform: 4.0
SUSE MicroOS: 5.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
containerd: before 1.4.4-5.32.1
CPE2.3http://www.suse.com/support/update/announcement/2021/suse-su-20211954-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU50274
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-21285
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trick a victim to pull a specially crafted Docker image, trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationUpdate the affected package containerd, docker, runc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Containers: 15-SP2 - 15-SP3
SUSE Manager Proxy: 4.0
SUSE Manager Retail Branch Server: 4.0
SUSE Manager Server: 4.0
SUSE Enterprise Storage: 6 - 7
SUSE Linux Enterprise Server for SAP: 15 - 15-SP1
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP1-LTSS
SUSE CaaS Platform: 4.0
SUSE MicroOS: 5.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
containerd: before 1.4.4-5.32.1
CPE2.3http://www.suse.com/support/update/announcement/2021/suse-su-20211954-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51242
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-21334
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows an attacker to gain access to potentially sensitive information.
The vulnerability exists due to incorrect management of internal resources. Containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. MitigationUpdate the affected package containerd, docker, runc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Containers: 15-SP2 - 15-SP3
SUSE Manager Proxy: 4.0
SUSE Manager Retail Branch Server: 4.0
SUSE Manager Server: 4.0
SUSE Enterprise Storage: 6 - 7
SUSE Linux Enterprise Server for SAP: 15 - 15-SP1
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP1-LTSS
SUSE CaaS Platform: 4.0
SUSE MicroOS: 5.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
containerd: before 1.4.4-5.32.1
CPE2.3http://www.suse.com/support/update/announcement/2021/suse-su-20211954-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU53399
Risk: Low
CVSSv3.1: 6.6 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-30465
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the security features bypass issue. A remote authenticated attacker on the local network can perform a symlink exchange attack and host filesystem being bind-mounted into the container.
MitigationUpdate the affected package containerd, docker, runc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Containers: 15-SP2 - 15-SP3
SUSE Manager Proxy: 4.0
SUSE Manager Retail Branch Server: 4.0
SUSE Manager Server: 4.0
SUSE Enterprise Storage: 6 - 7
SUSE Linux Enterprise Server for SAP: 15 - 15-SP1
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP1-LTSS
SUSE CaaS Platform: 4.0
SUSE MicroOS: 5.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
containerd: before 1.4.4-5.32.1
CPE2.3http://www.suse.com/support/update/announcement/2021/suse-su-20211954-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.