Risk | High |
Patch available | YES |
Number of vulnerabilities | 8 |
CVE-ID | CVE-2021-20199 CVE-2021-20206 CVE-2021-4024 CVE-2021-41190 CVE-2022-21698 CVE-2022-27191 CVE-2022-27649 CVE-2022-2989 |
CWE-ID | CWE-346 CWE-424 CWE-200 CWE-843 CWE-20 CWE-327 CWE-264 CWE-863 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openSUSE Leap Micro Operating systems & Components / Operating system SUSE Linux Enterprise Micro Operating systems & Components / Operating system SUSE Linux Enterprise Module for Containers Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing Operating systems & Components / Operating system podman-docker Operating systems & Components / Operating system package or component podman-remote-debuginfo Operating systems & Components / Operating system package or component podman-remote Operating systems & Components / Operating system package or component podman-cni-config Operating systems & Components / Operating system package or component podman-debuginfo Operating systems & Components / Operating system package or component podman Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 8 vulnerabilities.
EUVDB-ID: #VU50275
Risk: High
CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-20199
CWE-ID:
CWE-346 - Origin Validation Error
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions.
The vulnerability exists due to missing authentication when connecting from all sources. A remote attacker can send a specially crafted request and bypass access restrictions to containerized applications.
MitigationUpdate the affected package podman to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.3
SUSE Linux Enterprise Micro: 5.3
SUSE Linux Enterprise Module for Containers: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
podman-docker: before 4.3.1-150400.4.11.1
podman-remote-debuginfo: before 4.3.1-150400.4.11.1
podman-remote: before 4.3.1-150400.4.11.1
podman-cni-config: before 4.3.1-150400.4.11.1
podman-debuginfo: before 4.3.1-150400.4.11.1
podman: before 4.3.1-150400.4.11.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230187-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55590
Risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-20206
CWE-ID:
CWE-424 - Improper Protection of Alternate Path
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the affected system.
the vulnerability exists due to improper input validation. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows a remote user to execute other existing binaries other than the cni plugins/types, such as 'reboot'.
MitigationUpdate the affected package podman to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.3
SUSE Linux Enterprise Micro: 5.3
SUSE Linux Enterprise Module for Containers: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
podman-docker: before 4.3.1-150400.4.11.1
podman-remote-debuginfo: before 4.3.1-150400.4.11.1
podman-remote: before 4.3.1-150400.4.11.1
podman-cni-config: before 4.3.1-150400.4.11.1
podman-debuginfo: before 4.3.1-150400.4.11.1
podman: before 4.3.1-150400.4.11.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230187-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58668
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-4024
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the "podman machine" function. A remote attacker can gain unauthorized access to sensitive information on the system.
MitigationUpdate the affected package podman to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.3
SUSE Linux Enterprise Micro: 5.3
SUSE Linux Enterprise Module for Containers: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
podman-docker: before 4.3.1-150400.4.11.1
podman-remote-debuginfo: before 4.3.1-150400.4.11.1
podman-remote: before 4.3.1-150400.4.11.1
podman-cni-config: before 4.3.1-150400.4.11.1
podman-debuginfo: before 4.3.1-150400.4.11.1
podman: before 4.3.1-150400.4.11.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230187-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58229
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-41190
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the system.
The vulnerability exists due to a type confusion error. A remote authenticated attacker can pass specially crafted data to the application, trigger a type confusion error and interpret the resulting content differently.
MitigationUpdate the affected package podman to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.3
SUSE Linux Enterprise Micro: 5.3
SUSE Linux Enterprise Module for Containers: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
podman-docker: before 4.3.1-150400.4.11.1
podman-remote-debuginfo: before 4.3.1-150400.4.11.1
podman-remote: before 4.3.1-150400.4.11.1
podman-cni-config: before 4.3.1-150400.4.11.1
podman-debuginfo: before 4.3.1-150400.4.11.1
podman: before 4.3.1-150400.4.11.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230187-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61599
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-21698
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within method label cardinality. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package podman to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.3
SUSE Linux Enterprise Micro: 5.3
SUSE Linux Enterprise Module for Containers: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
podman-docker: before 4.3.1-150400.4.11.1
podman-remote-debuginfo: before 4.3.1-150400.4.11.1
podman-remote: before 4.3.1-150400.4.11.1
podman-cni-config: before 4.3.1-150400.4.11.1
podman-debuginfo: before 4.3.1-150400.4.11.1
podman: before 4.3.1-150400.4.11.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230187-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62039
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-27191
CWE-ID:
CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error in golang.org/x/crypto/ssh before 0.0.0-20220314234659-1baeb1ce4c0b, as used in Go programming language. A remote attacker can crash a server in certain circumstances involving AddHostKey.
MitigationUpdate the affected package podman to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.3
SUSE Linux Enterprise Micro: 5.3
SUSE Linux Enterprise Module for Containers: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
podman-docker: before 4.3.1-150400.4.11.1
podman-remote-debuginfo: before 4.3.1-150400.4.11.1
podman-remote: before 4.3.1-150400.4.11.1
podman-cni-config: before 4.3.1-150400.4.11.1
podman-debuginfo: before 4.3.1-150400.4.11.1
podman: before 4.3.1-150400.4.11.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230187-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61829
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-27649
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to excess inheritable capabilities set, which leads to security restrictions bypass and privilege escalation.
MitigationUpdate the affected package podman to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.3
SUSE Linux Enterprise Micro: 5.3
SUSE Linux Enterprise Module for Containers: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
podman-docker: before 4.3.1-150400.4.11.1
podman-remote-debuginfo: before 4.3.1-150400.4.11.1
podman-remote: before 4.3.1-150400.4.11.1
podman-cni-config: before 4.3.1-150400.4.11.1
podman-debuginfo: before 4.3.1-150400.4.11.1
podman: before 4.3.1-150400.4.11.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230187-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69290
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-2989
CWE-ID:
CWE-863 - Incorrect Authorization
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect handling of the supplementary groups in the Podman container engine. A local user with direct access to the affected container where supplementary groups are used can set access permissions and execute a binary code in that container.
Update the affected package podman to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.3
SUSE Linux Enterprise Micro: 5.3
SUSE Linux Enterprise Module for Containers: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
podman-docker: before 4.3.1-150400.4.11.1
podman-remote-debuginfo: before 4.3.1-150400.4.11.1
podman-remote: before 4.3.1-150400.4.11.1
podman-cni-config: before 4.3.1-150400.4.11.1
podman-debuginfo: before 4.3.1-150400.4.11.1
podman: before 4.3.1-150400.4.11.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230187-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.