Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:3741-1

Опубликовано: 21 окт. 2024
Источник: suse-cvrf

Описание

Security update for podman

This update for podman fixes the following issues:

  • CVE-2024-9675: Fixed cache arbitrary directory mount (bsc#1231499).
  • CVE-2024-9407: Fixed improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (bsc#1231208).

The following non-security bug was fixed:

  • rootless ipv6 containers can't be started (bsc#1214612).

Список пакетов

Container suse/sle-micro/5.5:latest
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Server-5-0
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Server-5-0-Azure-llc
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Server-5-0-Azure-ltd
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Server-5-0-BYOS
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Server-5-0-EC2-llc
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Server-5-0-EC2-ltd
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Micro-5-5
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Micro-5-5-Azure
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Micro-5-5-BYOS
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Micro-5-5-BYOS-Azure
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Micro-5-5-BYOS-EC2
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Micro-5-5-BYOS-GCE
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Micro-5-5-EC2
podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Micro-5-5-GCE
podman-4.9.5-150500.3.25.1
SUSE Linux Enterprise Micro 5.5
podman-4.9.5-150500.3.25.1
podman-docker-4.9.5-150500.3.25.1
podman-remote-4.9.5-150500.3.25.1
podmansh-4.9.5-150500.3.25.1
SUSE Linux Enterprise Module for Containers 15 SP5
podman-4.9.5-150500.3.25.1
podman-docker-4.9.5-150500.3.25.1
podman-remote-4.9.5-150500.3.25.1
podmansh-4.9.5-150500.3.25.1
SUSE Linux Enterprise Module for Containers 15 SP6
podman-4.9.5-150500.3.25.1
podman-docker-4.9.5-150500.3.25.1
podman-remote-4.9.5-150500.3.25.1
podmansh-4.9.5-150500.3.25.1
openSUSE Leap 15.5
podman-4.9.5-150500.3.25.1
podman-docker-4.9.5-150500.3.25.1
podman-remote-4.9.5-150500.3.25.1
podmansh-4.9.5-150500.3.25.1
openSUSE Leap 15.6
podman-4.9.5-150500.3.25.1
podman-docker-4.9.5-150500.3.25.1
podman-remote-4.9.5-150500.3.25.1
podmansh-4.9.5-150500.3.25.1
openSUSE Leap Micro 5.5
podman-4.9.5-150500.3.25.1
podman-docker-4.9.5-150500.3.25.1
podman-remote-4.9.5-150500.3.25.1
podmansh-4.9.5-150500.3.25.1

Описание

A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.


Затронутые продукты
Container suse/sle-micro/5.5:latest:podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure:podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2:podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE:podman-4.9.5-150500.3.25.1

Ссылки

Описание

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.


Затронутые продукты
Container suse/sle-micro/5.5:latest:podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure:podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2:podman-4.9.5-150500.3.25.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE:podman-4.9.5-150500.3.25.1

Ссылки
Уязвимость SUSE-SU-2024:3741-1