First published: Mon Jul 19 2021(Updated: )
K3s in SUSE Rancher allows any user with direct access to the datastore, or a copy of a datastore backup, to extract the cluster's confidential keying material (cluster certificate authority private keys, secrets encryption configuration passphrase, etc.) and decrypt it, without having to know the token value. This issue affects: SUSE Rancher K3s version v1.19.12+k3s1, v1.20.8+k3s1, v1.21.2+k3s1 and prior versions; RKE2 version v1.19.12+rke2r1, v1.20.8+rke2r1, v1.21.2+rke2r1 and prior versions.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Rancher K3s | =1.19.12 | |
SUSE Rancher K3s | =1.20.8 | |
SUSE Rancher K3s | =1.21.2 | |
Suse Rancher Rke2 | =1.19.12 | |
Suse Rancher Rke2 | =1.20.8 | |
Suse Rancher Rke2 | =1.21.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-32001.
The severity of CVE-2021-32001 is medium.
CVE-2021-32001 affects SUSE Rancher K3s versions 1.19.12, 1.20.8, and 1.21.2, as well as Suse Rancher Rke2 versions 1.19.12, 1.20.8, and 1.21.2.
An attacker with direct access to the datastore or a copy of a datastore backup can extract the cluster's confidential keying material and decrypt it, gaining access to cluster certificate authority private keys and secrets encryption configuration passphrase.
Yes, it is recommended to update SUSE Rancher K3s and Suse Rancher Rke2 to the latest versions to fix CVE-2021-32001.