SUSE-SU-2021:1455-1: important: Security update for cifs-utils

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Apr 30 13:17:11 UTC 2021


   SUSE Security Update: Security update for cifs-utils
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:1455-1
Rating:             important
References:         #1152930 #1174477 #1183239 #1184815 
Cross-References:   CVE-2020-14342 CVE-2021-20208
CVSS scores:
                    CVE-2020-14342 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-14342 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
                    CVE-2021-20208 (NVD) : 6.1 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N
                    CVE-2021-20208 (SUSE): 6.1 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N

Affected Products:
                    SUSE Linux Enterprise Server for SAP 15
                    SUSE Linux Enterprise Server 15-LTSS
                    SUSE Linux Enterprise High Performance Computing 15-LTSS
                    SUSE Linux Enterprise High Performance Computing 15-ESPOS
______________________________________________________________________________

   An update that solves two vulnerabilities and has two fixes
   is now available.

Description:


   This update for cifs-utils fixes the following security issues:

   - CVE-2021-20208: Fixed a potential kerberos auth leak escaping from
     container. (bsc#1183239)
   - CVE-2020-14342: Fixed a shell command injection vulnerability in
     mount.cifs. (bsc#1174477)

   This update for cifs-utils fixes the following issues:

   - Solve invalid directory mounting. When attempting to change the current
     working directory into non-existing directories, mount.cifs crashes.
     (bsc#1152930)

   - Fixed a bug where it was no longer possible to mount CIFS filesystem
     after the last maintenance update. (bsc#1184815)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for SAP 15:

      zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2021-1455=1

   - SUSE Linux Enterprise Server 15-LTSS:

      zypper in -t patch SUSE-SLE-Product-SLES-15-2021-1455=1

   - SUSE Linux Enterprise High Performance Computing 15-LTSS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-2021-1455=1

   - SUSE Linux Enterprise High Performance Computing 15-ESPOS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-2021-1455=1



Package List:

   - SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):

      cifs-utils-6.9-3.14.1
      cifs-utils-debuginfo-6.9-3.14.1
      cifs-utils-debugsource-6.9-3.14.1
      cifs-utils-devel-6.9-3.14.1

   - SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):

      cifs-utils-6.9-3.14.1
      cifs-utils-debuginfo-6.9-3.14.1
      cifs-utils-debugsource-6.9-3.14.1
      cifs-utils-devel-6.9-3.14.1

   - SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):

      cifs-utils-6.9-3.14.1
      cifs-utils-debuginfo-6.9-3.14.1
      cifs-utils-debugsource-6.9-3.14.1
      cifs-utils-devel-6.9-3.14.1

   - SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):

      cifs-utils-6.9-3.14.1
      cifs-utils-debuginfo-6.9-3.14.1
      cifs-utils-debugsource-6.9-3.14.1
      cifs-utils-devel-6.9-3.14.1


References:

   https://www.suse.com/security/cve/CVE-2020-14342.html
   https://www.suse.com/security/cve/CVE-2021-20208.html
   https://bugzilla.suse.com/1152930
   https://bugzilla.suse.com/1174477
   https://bugzilla.suse.com/1183239
   https://bugzilla.suse.com/1184815



More information about the sle-updates mailing list