SUSE Security Update: Security update for cni-plugins
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:4151-1
Rating:             important
References:         #1172410 #1181961 
Cross-References:   CVE-2020-10749 CVE-2021-20206
CVSS scores:
                    CVE-2020-10749 (NVD) : 6 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
                    CVE-2020-10749 (SUSE): 6 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
                    CVE-2021-20206 (NVD) : 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-20206 (SUSE): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE Linux Enterprise High Performance Computing 15
                    SUSE Linux Enterprise Module for Public Cloud 15
                    SUSE Linux Enterprise Server 15
                    SUSE Linux Enterprise Server for SAP Applications 15
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   This update for cni-plugins fixes the following issues:

   - CVE-2021-20206: Fixed arbitrary path injection via type field in CNI
     configuration (bsc#1181961).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Public Cloud 15:

      zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-2022-4151=1



Package List:

   - SUSE Linux Enterprise Module for Public Cloud 15 (x86_64):

      cni-plugins-0.8.6-150000.1.7.1


References:

   https://www.suse.com/security/cve/CVE-2020-10749.html
   https://www.suse.com/security/cve/CVE-2021-20206.html
   https://bugzilla.suse.com/1172410
   https://bugzilla.suse.com/1181961

SUSE: 2022:4151-1 important: cni-plugins

November 21, 2022
An update that fixes two vulnerabilities is now available

Summary

This update for cni-plugins fixes the following issues: - CVE-2021-20206: Fixed arbitrary path injection via type field in CNI configuration (bsc#1181961). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Public Cloud 15: zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-2022-4151=1 Package List: - SUSE Linux Enterprise Module for Public Cloud 15 (x86_64): cni-plugins-0.8.6-150000.1.7.1

References

#1172410 #1181961

Cross- CVE-2020-10749 CVE-2021-20206

CVSS scores:

CVE-2020-10749 (NVD) : 6 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L

CVE-2020-10749 (SUSE): 6 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L

CVE-2021-20206 (NVD) : 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-20206 (SUSE): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Affected Products:

SUSE Linux Enterprise High Performance Computing 15

SUSE Linux Enterprise Module for Public Cloud 15

SUSE Linux Enterprise Server 15

SUSE Linux Enterprise Server for SAP Applications 15

https://www.suse.com/security/cve/CVE-2020-10749.html

https://www.suse.com/security/cve/CVE-2021-20206.html

https://bugzilla.suse.com/1172410

https://bugzilla.suse.com/1181961

Severity
Announcement ID: SUSE-SU-2022:4151-1
Rating: important

Related News