SUSE update for SUSE Manager Server 4.1



Published: 2021-06-22
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-28657
CVE-2021-31607
CWE-ID CWE-835
CWE-77
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise Module for SUSE Manager Server
Operating systems & Components / Operating system

uyuni-config-modules
Operating systems & Components / Operating system package or component

tika-core
Operating systems & Components / Operating system package or component

susemanager-web-libs
Operating systems & Components / Operating system package or component

susemanager-sync-data
Operating systems & Components / Operating system package or component

susemanager-sls
Operating systems & Components / Operating system package or component

susemanager-schema
Operating systems & Components / Operating system package or component

susemanager-docs_en-pdf
Operating systems & Components / Operating system package or component

susemanager-docs_en
Operating systems & Components / Operating system package or component

susemanager-doc-indexes
Operating systems & Components / Operating system package or component

susemanager-build-keys-web
Operating systems & Components / Operating system package or component

susemanager-build-keys
Operating systems & Components / Operating system package or component

spacewalk-utils-extras
Operating systems & Components / Operating system package or component

spacewalk-utils
Operating systems & Components / Operating system package or component

spacewalk-taskomatic
Operating systems & Components / Operating system package or component

spacewalk-java-postgresql
Operating systems & Components / Operating system package or component

spacewalk-java-lib
Operating systems & Components / Operating system package or component

spacewalk-java-config
Operating systems & Components / Operating system package or component

spacewalk-java
Operating systems & Components / Operating system package or component

spacewalk-html
Operating systems & Components / Operating system package or component

spacewalk-certs-tools
Operating systems & Components / Operating system package or component

spacewalk-base-minimal-config
Operating systems & Components / Operating system package or component

spacewalk-base-minimal
Operating systems & Components / Operating system package or component

spacewalk-base
Operating systems & Components / Operating system package or component

spacewalk-backend-xmlrpc
Operating systems & Components / Operating system package or component

spacewalk-backend-xml-export-libs
Operating systems & Components / Operating system package or component

spacewalk-backend-tools
Operating systems & Components / Operating system package or component

spacewalk-backend-sql-postgresql
Operating systems & Components / Operating system package or component

spacewalk-backend-sql
Operating systems & Components / Operating system package or component

spacewalk-backend-server
Operating systems & Components / Operating system package or component

spacewalk-backend-package-push-server
Operating systems & Components / Operating system package or component

spacewalk-backend-iss-export
Operating systems & Components / Operating system package or component

spacewalk-backend-iss
Operating systems & Components / Operating system package or component

spacewalk-backend-config-files-tool
Operating systems & Components / Operating system package or component

spacewalk-backend-config-files-common
Operating systems & Components / Operating system package or component

spacewalk-backend-config-files
Operating systems & Components / Operating system package or component

spacewalk-backend-applet
Operating systems & Components / Operating system package or component

spacewalk-backend-app
Operating systems & Components / Operating system package or component

spacewalk-backend
Operating systems & Components / Operating system package or component

spacewalk-admin
Operating systems & Components / Operating system package or component

python3-spacewalk-certs-tools
Operating systems & Components / Operating system package or component

py27-compat-salt
Operating systems & Components / Operating system package or component

py26-compat-salt
Operating systems & Components / Operating system package or component

prometheus-exporters-formula
Operating systems & Components / Operating system package or component

grafana-formula
Operating systems & Components / Operating system package or component

susemanager-tools
Operating systems & Components / Operating system package or component

susemanager
Operating systems & Components / Operating system package or component

spacewalk-branding
Operating systems & Components / Operating system package or component

python3-uyuni-common-libs
Operating systems & Components / Operating system package or component

patterns-suma_server
Operating systems & Components / Operating system package or component

patterns-suma_retail
Operating systems & Components / Operating system package or component

golang-github-prometheus-node_exporter
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Infinite loop

EUVDB-ID: #VU51796

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-28657

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within MP3Parser component. A remote attacker can suply a specially crafted file, consume all available system resources and cause denial of service conditions.

Mitigation

Update the affected package SUSE Manager Server 4.1 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for SUSE Manager Server: 4.1

uyuni-config-modules: before 4.1.28-3.42.1

tika-core: before 1.26-3.5.2

susemanager-web-libs: before 4.1.26-3.24.8

susemanager-sync-data: before 4.1.14-3.23.2

susemanager-sls: before 4.1.28-3.42.1

susemanager-schema: before 4.1.21-3.30.6

susemanager-docs_en-pdf: before 4.1-11.34.2

susemanager-docs_en: before 4.1-11.34.2

susemanager-doc-indexes: before 4.1-11.34.8

susemanager-build-keys-web: before 15.2.4-3.17.1

susemanager-build-keys: before 15.2.4-3.17.1

spacewalk-utils-extras: before 4.1.16-3.18.2

spacewalk-utils: before 4.1.16-3.18.2

spacewalk-taskomatic: before 4.1.36-3.44.1

spacewalk-java-postgresql: before 4.1.36-3.44.1

spacewalk-java-lib: before 4.1.36-3.44.1

spacewalk-java-config: before 4.1.36-3.44.1

spacewalk-java: before 4.1.36-3.44.1

spacewalk-html: before 4.1.26-3.24.8

spacewalk-certs-tools: before 4.1.17-3.17.2

spacewalk-base-minimal-config: before 4.1.26-3.24.8

spacewalk-base-minimal: before 4.1.26-3.24.8

spacewalk-base: before 4.1.26-3.24.8

spacewalk-backend-xmlrpc: before 4.1.25-4.32.6

spacewalk-backend-xml-export-libs: before 4.1.25-4.32.6

spacewalk-backend-tools: before 4.1.25-4.32.6

spacewalk-backend-sql-postgresql: before 4.1.25-4.32.6

spacewalk-backend-sql: before 4.1.25-4.32.6

spacewalk-backend-server: before 4.1.25-4.32.6

spacewalk-backend-package-push-server: before 4.1.25-4.32.6

spacewalk-backend-iss-export: before 4.1.25-4.32.6

spacewalk-backend-iss: before 4.1.25-4.32.6

spacewalk-backend-config-files-tool: before 4.1.25-4.32.6

spacewalk-backend-config-files-common: before 4.1.25-4.32.6

spacewalk-backend-config-files: before 4.1.25-4.32.6

spacewalk-backend-applet: before 4.1.25-4.32.6

spacewalk-backend-app: before 4.1.25-4.32.6

spacewalk-backend: before 4.1.25-4.32.6

spacewalk-admin: before 4.1.9-3.12.2

python3-spacewalk-certs-tools: before 4.1.17-3.17.2

py27-compat-salt: before 3000.3-6.3.2

py26-compat-salt: before 2016.11.10-6.14.2

prometheus-exporters-formula: before 0.9.1-3.22.1

grafana-formula: before 0.4.1-3.9.2

susemanager-tools: before 4.1.26-3.25.1

susemanager: before 4.1.26-3.25.1

spacewalk-branding: before 4.1.12-3.12.2

python3-uyuni-common-libs: before 4.1.8-3.9.1

patterns-suma_server: before 4.1-6.9.2

patterns-suma_retail: before 4.1-6.9.2

golang-github-prometheus-node_exporter: before 1.1.2-3.6.5

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20212098-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Command Injection

EUVDB-ID: #VU58292

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-31607

CWE-ID: CWE-77 - Command injection

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to command injection in the snapper module. A local user can escalate privileges on a minion.

Mitigation

Update the affected package SUSE Manager Server 4.1 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for SUSE Manager Server: 4.1

uyuni-config-modules: before 4.1.28-3.42.1

tika-core: before 1.26-3.5.2

susemanager-web-libs: before 4.1.26-3.24.8

susemanager-sync-data: before 4.1.14-3.23.2

susemanager-sls: before 4.1.28-3.42.1

susemanager-schema: before 4.1.21-3.30.6

susemanager-docs_en-pdf: before 4.1-11.34.2

susemanager-docs_en: before 4.1-11.34.2

susemanager-doc-indexes: before 4.1-11.34.8

susemanager-build-keys-web: before 15.2.4-3.17.1

susemanager-build-keys: before 15.2.4-3.17.1

spacewalk-utils-extras: before 4.1.16-3.18.2

spacewalk-utils: before 4.1.16-3.18.2

spacewalk-taskomatic: before 4.1.36-3.44.1

spacewalk-java-postgresql: before 4.1.36-3.44.1

spacewalk-java-lib: before 4.1.36-3.44.1

spacewalk-java-config: before 4.1.36-3.44.1

spacewalk-java: before 4.1.36-3.44.1

spacewalk-html: before 4.1.26-3.24.8

spacewalk-certs-tools: before 4.1.17-3.17.2

spacewalk-base-minimal-config: before 4.1.26-3.24.8

spacewalk-base-minimal: before 4.1.26-3.24.8

spacewalk-base: before 4.1.26-3.24.8

spacewalk-backend-xmlrpc: before 4.1.25-4.32.6

spacewalk-backend-xml-export-libs: before 4.1.25-4.32.6

spacewalk-backend-tools: before 4.1.25-4.32.6

spacewalk-backend-sql-postgresql: before 4.1.25-4.32.6

spacewalk-backend-sql: before 4.1.25-4.32.6

spacewalk-backend-server: before 4.1.25-4.32.6

spacewalk-backend-package-push-server: before 4.1.25-4.32.6

spacewalk-backend-iss-export: before 4.1.25-4.32.6

spacewalk-backend-iss: before 4.1.25-4.32.6

spacewalk-backend-config-files-tool: before 4.1.25-4.32.6

spacewalk-backend-config-files-common: before 4.1.25-4.32.6

spacewalk-backend-config-files: before 4.1.25-4.32.6

spacewalk-backend-applet: before 4.1.25-4.32.6

spacewalk-backend-app: before 4.1.25-4.32.6

spacewalk-backend: before 4.1.25-4.32.6

spacewalk-admin: before 4.1.9-3.12.2

python3-spacewalk-certs-tools: before 4.1.17-3.17.2

py27-compat-salt: before 3000.3-6.3.2

py26-compat-salt: before 2016.11.10-6.14.2

prometheus-exporters-formula: before 0.9.1-3.22.1

grafana-formula: before 0.4.1-3.9.2

susemanager-tools: before 4.1.26-3.25.1

susemanager: before 4.1.26-3.25.1

spacewalk-branding: before 4.1.12-3.12.2

python3-uyuni-common-libs: before 4.1.8-3.9.1

patterns-suma_server: before 4.1-6.9.2

patterns-suma_retail: before 4.1-6.9.2

golang-github-prometheus-node_exporter: before 1.1.2-3.6.5

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20212098-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###