Описание
Security update for buildah
This update for buildah fixes the following issues:
Update to version 1.35.4:
- Bump to Buildah v1.35.4
- CVE-2024-3727 updates (bsc#1224117)
- integration test: handle new labels in 'bud and test --unsetlabel'
- Bump go-jose CVE-2024-28180
- Bump ocicrypt and go-jose CVE-2024-28180
Update to version 1.35.3:
- correctly configure /etc/hosts and resolv.conf
- buildah: refactor resolv/hosts setup.
- CVE-2024-24786 protobuf to 1.33
Update to version 1.35.1:
- CVE-2024-1753 container escape fix (bsc#1221677)
-
Buildah dropped cni support, require netavark instead (bsc#1221243)
-
Remove obsolete requires libcontainers-image & libcontainers-storage
-
Require passt for rootless networking (poo#156955) Buildah moved to passt/pasta for rootless networking from slirp4netns (https://github.com/containers/common/pull/1846)
Update to version 1.35.0:
- Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0
- conformance tests: don't break on trailing zeroes in layer blobs
- Add a conformance test for copying to a mounted prior stage
- cgroups: reuse version check from c/common
- Update vendor of containers/(common,image)
- manifest add: complain if we get artifact flags without --artifact
- Use retry logic from containers/common
- Vendor in containers/(storage,image,common)
- Update module golang.org/x/crypto to v0.20.0
- Add comment re: Total Success task name
- tests: skip_if_no_unshare(): check for --setuid
- Properly handle build --pull=false
- [skip-ci] Update tim-actions/get-pr-commits action to v1.3.1
- Update module go.etcd.io/bbolt to v1.3.9
- Revert 'Reduce official image size'
- Update module github.com/opencontainers/image-spec to v1.1.0
- Reduce official image size
- Build with CNI support on FreeBSD
- build --all-platforms: skip some base 'image' platforms
- Bump main to v1.35.0-dev
- Vendor in latest containers/(storage,image,common)
- Split up error messages for missing --sbom related flags
buildah manifest
: add artifact-related options- cmd/buildah/manifest.go: lock lists before adding/annotating/pushing
- cmd/buildah/manifest.go: don't make struct declarations aliases
- Use golang.org/x/exp/slices.Contains
- Disable loong64 again
- Fix a couple of typos in one-line comments
- egrep is obsolescent; use grep -E
- Try Cirrus with a newer VM version
- Set CONTAINERS_CONF in the chroot-mount-flags integration test
- Update to match dependency API update
- Update github.com/openshift/imagebuilder and containers/common
- docs: correct default authfile path
- tests: retrofit test for heredoc summary
- build, heredoc: show heredoc summary in build output
- manifest, push: add support for --retry and --retry-delay
- imagebuildah: fix crash with empty RUN
- Make buildah match podman for handling of ulimits
- docs: move footnotes to where they're applicable
- Allow users to specify no-dereference
- docs: use reversed logo for dark theme in README
- build,commit: add --sbom to scan and produce SBOMs when committing
- commit: force omitHistory if the parent has layers but no history
- docs: fix a couple of typos
- internal/mkcw.Archive(): handle extra image content
- stage_executor,heredoc: honor interpreter in heredoc
- stage_executor,layers: burst cache if heredoc content is changed
- Replace map[K]bool with map[K]struct{} where it makes sense
- Replace strings.SplitN with strings.Cut
- Document use of containers-transports values in buildah
- manifest: addCompression use default from containers.conf
- commit: add a --add-file flag
- mkcw: populate the rootfs using an overlay
- Ignore errors if label.Relabel returns ENOSUP
Список пакетов
SUSE Linux Enterprise Module for Containers 15 SP5
SUSE Linux Enterprise Module for Containers 15 SP6
openSUSE Leap 15.5
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2024:3151-1
- E-Mail link for SUSE-SU-2024:3151-1
- SUSE Security Ratings
- SUSE Bug 1221243
- SUSE Bug 1221677
- SUSE Bug 1224117
- SUSE CVE CVE-2024-1753 page
- SUSE CVE CVE-2024-24786 page
- SUSE CVE CVE-2024-28180 page
- SUSE CVE CVE-2024-3727 page
Описание
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
Затронутые продукты
Ссылки
- CVE-2024-1753
- SUSE Bug 1221677
Описание
The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.
Затронутые продукты
Ссылки
- CVE-2024-24786
- SUSE Bug 1226136
Описание
Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.
Затронутые продукты
Ссылки
- CVE-2024-28180
- SUSE Bug 1234984
Описание
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
Затронутые продукты
Ссылки
- CVE-2024-3727
- SUSE Bug 1224112