SUSE update for Includes a kubernetes update to 1.18.20 including a backport for CVE-2021-25741



Published: 2021-09-16
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-25741
CVE-2021-3121
CWE-ID CWE-264
CWE-129
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
SUSE CaaS Platform
Operating systems & Components / Operating system

skuba-update
Operating systems & Components / Operating system package or component

release-notes-caasp
Operating systems & Components / Operating system package or component

skuba
Operating systems & Components / Operating system package or component

kubernetes-1.18-kubelet
Operating systems & Components / Operating system package or component

kubernetes-1.18-kubeadm
Operating systems & Components / Operating system package or component

caasp-release
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Security restrictions bypass

EUVDB-ID: #VU56902

Risk: Medium

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2021-25741

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a remote user to bypass implemented security restrictions.

The vulnerability exists due to application does not properly impose security restrictions by allowing hostPath-like access without use of the hostPath feature. A remote user can create a container with subpath volume mounts to access files and directories outside of the volume, including on the host filesystem.

Mitigation

Update the affected package Includes a kubernetes update to 1.18.20 including a backport for CVE-2021-25741 to the latest version.

Vulnerable software versions

SUSE CaaS Platform: 4.5

skuba-update: before 2.1.15-3.15.13.2

release-notes-caasp: before 4.5.20210907-3.22.3

skuba: before 2.1.15-3.15.13.2

kubernetes-1.18-kubelet: before 1.18.20-4.11.3

kubernetes-1.18-kubeadm: before 1.18.20-4.11.3

caasp-release: before 4.5.5-1.19.3

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213049-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Improper Validation of Array Index

EUVDB-ID: #VU52902

Risk: High

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3121

CWE-ID: CWE-129 - Improper Validation of Array Index

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to improper validation of index array in plugin/unmarshal/unmarshal.go. A remote attacker can pass specially crafted data to the application and bypass implemented security restrictions, possibly leading to remote code execution.

Mitigation

Update the affected package Includes a kubernetes update to 1.18.20 including a backport for CVE-2021-25741 to the latest version.

Vulnerable software versions

SUSE CaaS Platform: 4.5

skuba-update: before 2.1.15-3.15.13.2

release-notes-caasp: before 4.5.20210907-3.22.3

skuba: before 2.1.15-3.15.13.2

kubernetes-1.18-kubelet: before 1.18.20-4.11.3

kubernetes-1.18-kubeadm: before 1.18.20-4.11.3

caasp-release: before 4.5.5-1.19.3

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213049-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###