Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-23651 (GCVE-0-2024-23651)
Vulnerability from cvelistv5
Published
2024-01-31 21:49
Modified
2025-05-29 15:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.
References
► | URL | Tags | |
---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:06:25.341Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv" }, { "name": "https://github.com/moby/buildkit/pull/4604", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/buildkit/pull/4604" }, { "name": "https://github.com/moby/buildkit/releases/tag/v0.12.5", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-23651", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-08T15:46:26.378151Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-29T15:03:12.436Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "buildkit", "vendor": "moby", "versions": [ { "status": "affected", "version": "\u003c 0.12.5" } ] } ], "descriptions": [ { "lang": "en", "value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-31T22:00:36.755Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv" }, { "name": "https://github.com/moby/buildkit/pull/4604", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/buildkit/pull/4604" }, { "name": "https://github.com/moby/buildkit/releases/tag/v0.12.5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5" } ], "source": { "advisory": "GHSA-m3r6-h7wv-7xxv", "discovery": "UNKNOWN" }, "title": "BuildKit possible race condition with accessing subpaths from cache mounts" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-23651", "datePublished": "2024-01-31T21:49:18.041Z", "dateReserved": "2024-01-19T00:18:53.234Z", "dateUpdated": "2025-05-29T15:03:12.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-23651\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-01-31T22:15:54.183\",\"lastModified\":\"2024-11-21T08:58:05.560\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\\n\"},{\"lang\":\"es\",\"value\":\"BuildKit es un conjunto de herramientas para convertir c\u00f3digo fuente para crear artefactos de manera eficiente, expresiva y repetible. Dos pasos de compilaci\u00f3n maliciosos que se ejecutan en paralelo y comparten los mismos montajes de cach\u00e9 con subrutas podr\u00edan causar una condici\u00f3n de ejecuci\u00f3n que puede hacer que los archivos del sistema host sean accesibles al contenedor de compilaci\u00f3n. El problema se solucion\u00f3 en v0.12.5. Los workarounds incluyen evitar el uso de la interfaz de BuildKit desde una fuente que no es de confianza o crear un Dockerfile que no sea de confianza que contenga montajes de cach\u00e9 con las opciones --mount=type=cache,source=....\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":5.8},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mobyproject:buildkit:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.12.5\",\"matchCriteriaId\":\"0AAE2F08-4E4D-4B85-8230-8D5BA7788D3D\"}]}]}],\"references\":[{\"url\":\"https://github.com/moby/buildkit/pull/4604\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/moby/buildkit/releases/tag/v0.12.5\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Release Notes\"]},{\"url\":\"https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/moby/buildkit/pull/4604\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/moby/buildkit/releases/tag/v0.12.5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Release Notes\"]},{\"url\":\"https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv\", \"name\": \"https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/buildkit/pull/4604\", \"name\": \"https://github.com/moby/buildkit/pull/4604\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/buildkit/releases/tag/v0.12.5\", \"name\": \"https://github.com/moby/buildkit/releases/tag/v0.12.5\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T23:06:25.341Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-23651\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-08T15:46:26.378151Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-08T15:46:27.984Z\"}}], \"cna\": {\"title\": \"BuildKit possible race condition with accessing subpaths from cache mounts\", \"source\": {\"advisory\": \"GHSA-m3r6-h7wv-7xxv\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"moby\", \"product\": \"buildkit\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 0.12.5\"}]}], \"references\": [{\"url\": \"https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv\", \"name\": \"https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/moby/buildkit/pull/4604\", \"name\": \"https://github.com/moby/buildkit/pull/4604\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/moby/buildkit/releases/tag/v0.12.5\", \"name\": \"https://github.com/moby/buildkit/releases/tag/v0.12.5\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\\n\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-362\", \"description\": \"CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-01-31T22:00:36.755Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-23651\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-29T15:03:12.436Z\", \"dateReserved\": \"2024-01-19T00:18:53.234Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-01-31T21:49:18.041Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
fkie_cve-2024-23651
Vulnerability from fkie_nvd
Published
2024-01-31 22:15
Modified
2024-11-21 08:58
Severity ?
8.7 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Summary
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mobyproject | buildkit | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mobyproject:buildkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AAE2F08-4E4D-4B85-8230-8D5BA7788D3D", "versionEndExcluding": "0.12.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n" }, { "lang": "es", "value": "BuildKit es un conjunto de herramientas para convertir c\u00f3digo fuente para crear artefactos de manera eficiente, expresiva y repetible. Dos pasos de compilaci\u00f3n maliciosos que se ejecutan en paralelo y comparten los mismos montajes de cach\u00e9 con subrutas podr\u00edan causar una condici\u00f3n de ejecuci\u00f3n que puede hacer que los archivos del sistema host sean accesibles al contenedor de compilaci\u00f3n. El problema se solucion\u00f3 en v0.12.5. Los workarounds incluyen evitar el uso de la interfaz de BuildKit desde una fuente que no es de confianza o crear un Dockerfile que no sea de confianza que contenga montajes de cach\u00e9 con las opciones --mount=type=cache,source=...." } ], "id": "CVE-2024-23651", "lastModified": "2024-11-21T08:58:05.560", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.8, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-31T22:15:54.183", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/moby/buildkit/pull/4604" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Release Notes" ], "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/moby/buildkit/pull/4604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes" ], "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
wid-sec-w-2024-3377
Vulnerability from csaf_certbund
Published
2024-11-07 23:00
Modified
2025-08-04 22:00
Summary
Dell PowerProtect Data Domain: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell PowerProtect Data Domain Appliances sind speziell für Backup und Daten-Deduplizierung ausgelegte Systeme.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erhöhen, Informationen offenzulegen und um nicht näher beschriebene Auswirkungen zu erzielen.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen und um nicht n\u00e4her beschriebene Auswirkungen zu erzielen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3377 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3377.json" }, { "category": "self", "summary": "WID-SEC-2024-3377 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3377" }, { "category": "external", "summary": "Dell Security Update", "url": "https://www.dell.com/support/kbdoc/de-de/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability" }, { "category": "external", "summary": "Security Update for Dell PowerProtect Data Domain", "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities" } ], "source_lang": "en-US", "title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-08-04T22:00:00.000+00:00", "generator": { "date": "2025-08-05T07:21:01.974+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-3377", "initial_release_date": "2024-11-07T23:00:00.000+00:00", "revision_history": [ { "date": "2024-11-07T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c8.1.0.0", "product": { "name": "Dell PowerProtect Data Domain \u003c8.1.0.0", "product_id": "T038861" } }, { "category": "product_version", "name": "8.1.0.0", "product": { "name": "Dell PowerProtect Data Domain 8.1.0.0", "product_id": "T038861-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:8.1.0.0" } } }, { "category": "product_version_range", "name": "\u003c7.13.1.10", "product": { "name": "Dell PowerProtect Data Domain \u003c7.13.1.10", "product_id": "T038862" } }, { "category": "product_version", "name": "7.13.1.10", "product": { "name": "Dell PowerProtect Data Domain 7.13.1.10", "product_id": "T038862-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.10" } } }, { "category": "product_version_range", "name": "\u003c7.10.1.40", "product": { "name": "Dell PowerProtect Data Domain \u003c7.10.1.40", "product_id": "T038863" } }, { "category": "product_version", "name": "7.10.1.40", "product": { "name": "Dell PowerProtect Data Domain 7.10.1.40", "product_id": "T038863-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.40" } } }, { "category": "product_version_range", "name": "\u003c7.7.5.50", "product": { "name": "Dell PowerProtect Data Domain \u003c7.7.5.50", "product_id": "T038864" } }, { "category": "product_version", "name": "7.7.5.50", "product": { "name": "Dell PowerProtect Data Domain 7.7.5.50", "product_id": "T038864-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:7.7.5.50" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain", "product": { "name": "Dell PowerProtect Data Domain", "product_id": "T045852", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:-" } } } ], "category": "product_name", "name": "PowerProtect Data Domain" }, { "category": "product_name", "name": "Dell PowerProtect Data Domain Management Center", "product": { "name": "Dell PowerProtect Data Domain Management Center", "product_id": "T045853", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain OS", "product": { "name": "Dell PowerProtect Data Domain OS", "product_id": "T045854", "product_identification_helper": { "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-" } } } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45759", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-45759" }, { "cve": "CVE-2024-48010", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-48010" }, { "cve": "CVE-2024-48011", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-48011" }, { "cve": "CVE-2017-16829", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2017-16829" }, { "cve": "CVE-2017-5849", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2017-5849" }, { "cve": "CVE-2018-7208", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2018-7208" }, { "cve": "CVE-2019-14889", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2019-14889" }, { "cve": "CVE-2020-12912", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2020-12912" }, { "cve": "CVE-2020-16135", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2020-16135" }, { "cve": "CVE-2020-1730", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2020-1730" }, { "cve": "CVE-2020-24455", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2020-24455" }, { "cve": "CVE-2020-8694", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2020-8694" }, { "cve": "CVE-2020-8695", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2020-8695" }, { "cve": "CVE-2021-27219", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2021-27219" }, { "cve": "CVE-2021-3565", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2021-3565" }, { "cve": "CVE-2021-3634", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2021-3634" }, { "cve": "CVE-2022-1210", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-1210" }, { "cve": "CVE-2022-1622", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-1622" }, { "cve": "CVE-2022-1996", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-1996" }, { "cve": "CVE-2022-22576", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-25313", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-27774", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27781", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-29361", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-29361" }, { "cve": "CVE-2022-32205", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-35252", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-40023", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40090", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-40090" }, { "cve": "CVE-2022-42915", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-4603", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-4603" }, { "cve": "CVE-2022-48064", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-48064" }, { "cve": "CVE-2022-48624", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2022-48624" }, { "cve": "CVE-2023-0461", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-0461" }, { "cve": "CVE-2023-1667", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-1667" }, { "cve": "CVE-2023-1916", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-1916" }, { "cve": "CVE-2023-20592", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-20592" }, { "cve": "CVE-2023-2137", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-2137" }, { "cve": "CVE-2023-22745", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-22745" }, { "cve": "CVE-2023-2283", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-2283" }, { "cve": "CVE-2023-23914", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23934", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-23934" }, { "cve": "CVE-2023-25577", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-25577" }, { "cve": "CVE-2023-26965", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-26965" }, { "cve": "CVE-2023-27043", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-27043" }, { "cve": "CVE-2023-2731", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-2731" }, { "cve": "CVE-2023-27533", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-28319", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-28319" }, { "cve": "CVE-2023-28320", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-31083", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-31083" }, { "cve": "CVE-2023-34055", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-34055" }, { "cve": "CVE-2023-35116", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-38286", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-38286" }, { "cve": "CVE-2023-38469", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-38469" }, { "cve": "CVE-2023-38471", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-38471" }, { "cve": "CVE-2023-38472", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-38472" }, { "cve": "CVE-2023-38545", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-38545" }, { "cve": "CVE-2023-38546", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-38546" }, { "cve": "CVE-2023-39197", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-39197" }, { "cve": "CVE-2023-39198", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-39198" }, { "cve": "CVE-2023-39804", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-39804" }, { "cve": "CVE-2023-40217", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-42465", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-42465" }, { "cve": "CVE-2023-4255", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-4255" }, { "cve": "CVE-2023-45139", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-45139" }, { "cve": "CVE-2023-45322", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-45322" }, { "cve": "CVE-2023-45863", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-45863" }, { "cve": "CVE-2023-45871", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-45871" }, { "cve": "CVE-2023-46136", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-46136" }, { "cve": "CVE-2023-46218", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46219", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-46219" }, { "cve": "CVE-2023-46751", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-46751" }, { "cve": "CVE-2023-48795", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-49083", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-49083" }, { "cve": "CVE-2023-50447", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-50447" }, { "cve": "CVE-2023-5049", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-5049" }, { "cve": "CVE-2023-50495", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-50495" }, { "cve": "CVE-2023-50782", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-50782" }, { "cve": "CVE-2023-51257", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-51257" }, { "cve": "CVE-2023-52425", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-52426" }, { "cve": "CVE-2023-5678", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5717", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-5717" }, { "cve": "CVE-2023-5752", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-5752" }, { "cve": "CVE-2023-6004", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-6004" }, { "cve": "CVE-2023-6597", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-6597" }, { "cve": "CVE-2023-6918", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-6918" }, { "cve": "CVE-2023-7207", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2023-7207" }, { "cve": "CVE-2024-0450", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-0450" }, { "cve": "CVE-2024-0727", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-0727" }, { "cve": "CVE-2024-0985", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-0985" }, { "cve": "CVE-2024-21626", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-21626" }, { "cve": "CVE-2024-22195", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-22195" }, { "cve": "CVE-2024-22365", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-22365" }, { "cve": "CVE-2024-23651", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-23652" }, { "cve": "CVE-2024-23653", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-23653" }, { "cve": "CVE-2024-23672", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-23672" }, { "cve": "CVE-2024-24549", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-25062" }, { "cve": "CVE-2024-26130", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26458", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-26458" }, { "cve": "CVE-2024-26461", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-26461" }, { "cve": "CVE-2024-28085", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-28085" }, { "cve": "CVE-2024-28182", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28219", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-28219" }, { "cve": "CVE-2024-28757", "product_status": { "known_affected": [ "T045853", "T045852", "T045854", "T038864", "T038863", "T038862", "T038861" ] }, "release_date": "2024-11-07T23:00:00.000+00:00", "title": "CVE-2024-28757" } ] }
wid-sec-w-2024-0272
Vulnerability from csaf_certbund
Published
2024-01-31 23:00
Modified
2025-06-22 22:00
Summary
docker: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Docker ist eine Open-Source-Software, die dazu verwendet werden kann, Anwendungen mithilfe von Betriebssystemvirtualisierung in Containern zu isolieren.
Angriff
Ein entfernter Angreifer kann mehrere Schwachstellen in Docker ausnutzen, um seine Privilegien zu erhöhen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen oder Dateien zu manipulieren.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Docker ist eine Open-Source-Software, die dazu verwendet werden kann, Anwendungen mithilfe von Betriebssystemvirtualisierung in Containern zu isolieren.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Docker ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0272 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0272.json" }, { "category": "self", "summary": "WID-SEC-2024-0272 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0272" }, { "category": "external", "summary": "Docker Security Advisory vom 2024-01-31", "url": "https://www.docker.com/blog/docker-security-advisory-multiple-vulnerabilities-in-runc-buildkit-and-moby/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0295-1 vom 2024-02-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017833.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0294-1 vom 2024-02-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017834.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-900DC7F6FF vom 2024-02-01", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-900dc7f6ff" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-9044C9EEFA vom 2024-02-01", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-9044c9eefa" }, { "category": "external", "summary": "Debian Security Advisory DSA-5615 vom 2024-02-04", "url": "https://lists.debian.org/debian-security-announce/2024/msg00022.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0670 vom 2024-02-02", "url": "https://access.redhat.com/errata/RHSA-2024:0670" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0670 vom 2024-02-06", "url": "http://linux.oracle.com/errata/ELSA-2024-0670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0328-1 vom 2024-02-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017865.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0717 vom 2024-02-07", "url": "https://access.redhat.com/errata/RHSA-2024:0717" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0752 vom 2024-02-08", "url": "https://access.redhat.com/errata/RHSA-2024:0752" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0756 vom 2024-02-08", "url": "https://access.redhat.com/errata/RHSA-2024:0756" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0764 vom 2024-02-08", "url": "https://access.redhat.com/errata/RHSA-2024:0764" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0757 vom 2024-02-08", "url": "https://access.redhat.com/errata/RHSA-2024:0757" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0759 vom 2024-02-08", "url": "https://access.redhat.com/errata/RHSA-2024:0759" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0666 vom 2024-02-08", "url": "https://access.redhat.com/errata/RHSA-2024:0666" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0645 vom 2024-02-07", "url": "https://access.redhat.com/errata/RHSA-2024:0645" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0682 vom 2024-02-08", "url": "https://access.redhat.com/errata/RHSA-2024:0682" }, { "category": "external", "summary": "Docker Desktop release notes vom 2024-02-08", "url": "https://docs.docker.com/desktop/release-notes/#4272" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0760 vom 2024-02-08", "url": "https://access.redhat.com/errata/RHSA-2024:0760" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0662 vom 2024-02-07", "url": "https://access.redhat.com/errata/RHSA-2024:0662" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0748 vom 2024-02-08", "url": "https://access.redhat.com/errata/RHSA-2024:0748" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0758 vom 2024-02-08", "url": "https://access.redhat.com/errata/RHSA-2024:0758" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0755 vom 2024-02-09", "url": "https://access.redhat.com/errata/RHSA-2024:0755" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0684 vom 2024-02-09", "url": "https://access.redhat.com/errata/RHSA-2024:0684" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-17931 vom 2024-02-10", "url": "https://linux.oracle.com/errata/ELSA-2024-17931.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12148 vom 2024-02-10", "url": "https://linux.oracle.com/errata/ELSA-2024-12148.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:0752 vom 2024-02-12", "url": "https://errata.build.resf.org/RLSA-2024:0752" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0459-1 vom 2024-02-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017910.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0748 vom 2024-02-15", "url": "https://linux.oracle.com/errata/ELSA-2024-0748.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0752 vom 2024-02-14", "url": "https://linux.oracle.com/errata/ELSA-2024-0752.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3735 vom 2024-02-19", "url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html" }, { "category": "external", "summary": "Palo Alto Networks Security Advisory PAN-SA-2024-0002 vom 2024-02-22", "url": "https://security.paloaltonetworks.com/PAN-SA-2024-0002" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0586-1 vom 2024-02-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017990.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0587-1 vom 2024-02-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017989.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7201 vom 2024-02-28", "url": "https://access.redhat.com/errata/RHSA-2023:7201" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASNITRO-ENCLAVES-2024-039 vom 2024-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASNITRO-ENCLAVES-2024-039.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASDOCKER-2024-039 vom 2024-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASDOCKER-2024-039.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1270 vom 2024-03-12", "url": "https://access.redhat.com/errata/RHSA-2024:1270" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0586-2 vom 2024-04-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018256.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-164 vom 2024-04-05", "url": "https://www.dell.com/support/kbdoc/000223801/dsa-2024-=" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1469-1 vom 2024-04-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018439.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2988 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2988" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202407-12 vom 2024-07-05", "url": "https://security.gentoo.org/glsa/202407-12" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202407-25 vom 2024-07-10", "url": "https://security.gentoo.org/glsa/202407-25" }, { "category": "external", "summary": "IBM Security Bulletin 7162077 vom 2024-07-31", "url": "https://www.ibm.com/support/pages/node/7162077" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2801-1 vom 2024-08-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019134.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2801-2 vom 2024-08-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019136.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202408-25 vom 2024-08-11", "url": "https://security.gentoo.org/glsa/202408-25" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASDOCKER-2024-044 vom 2024-08-29", "url": "https://alas.aws.amazon.com/AL2/ALASDOCKER-2024-044.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASNITRO-ENCLAVES-2024-045 vom 2024-08-29", "url": "https://alas.aws.amazon.com/AL2/ALASNITRO-ENCLAVES-2024-045.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3120-1 vom 2024-09-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019345.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASECS-2024-041 vom 2024-09-03", "url": "https://alas.aws.amazon.com/AL2/ALASECS-2024-041.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202409-29 vom 2024-09-28", "url": "https://security.gentoo.org/glsa/202409-29" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2024-0282083260 vom 2024-10-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-0282083260" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-1CAB90A9E7 vom 2024-10-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1cab90a9e7" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-28E375F8CA vom 2024-10-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-28e375f8ca" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-1068D5C32B vom 2024-10-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1068d5c32b" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-AFA796A751 vom 2024-10-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-afa796a751" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-EE9F0F22B6 vom 2024-10-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-ee9f0f22b6" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-69528C0BA6 vom 2024-10-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-69528c0ba6" }, { "category": "external", "summary": "Brocade Security Advisory BSA-2024-2749 vom 2024-11-02", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25074" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10147 vom 2024-11-27", "url": "https://access.redhat.com/errata/RHSA-2024:10149" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10520 vom 2024-12-03", "url": "https://access.redhat.com/errata/RHSA-2024:10520" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10525 vom 2024-12-05", "url": "https://access.redhat.com/errata/RHSA-2024:10525" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10841 vom 2024-12-12", "url": "https://access.redhat.com/errata/RHSA-2024:10841" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14571-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6XZ7QNLFOMP7ZODQGCLQFRNRPEWZELNY/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:0115 vom 2025-01-14", "url": "https://access.redhat.com/errata/RHSA-2025:0115" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0226-1 vom 2025-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020191.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:0650 vom 2025-01-29", "url": "https://access.redhat.com/errata/RHSA-2025:0650" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:0074-1 vom 2025-02-24", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MFFSKUX256PEK52RLQGT33MIN3ZQO27D/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1711 vom 2025-02-27", "url": "https://access.redhat.com/errata/RHSA-2025:1711" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2441 vom 2025-03-13", "url": "https://access.redhat.com/errata/RHSA-2025:2441" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2710 vom 2025-03-20", "url": "https://access.redhat.com/errata/RHSA-2025:2710" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2701 vom 2025-03-20", "url": "https://access.redhat.com/errata/RHSA-2025:2701" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1102-1 vom 2025-04-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020639.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7474-1 vom 2025-05-01", "url": "https://ubuntu.com/security/notices/USN-7474-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20107-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021214.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20056-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021311.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9340 vom 2025-06-23", "url": "https://access.redhat.com/errata/RHSA-2025:9340" } ], "source_lang": "en-US", "title": "docker: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-06-22T22:00:00.000+00:00", "generator": { "date": "2025-06-23T07:15:14.327+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2024-0272", "initial_release_date": "2024-01-31T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-31T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-02-01T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-02-04T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian und Red Hat aufgenommen" }, { "date": "2024-02-05T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2024-02-07T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-02-08T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-02-11T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-02-12T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-02-13T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-02-14T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-02-18T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-02-21T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Palo Alto Networks aufgenommen" }, { "date": "2024-02-22T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-02-27T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-05T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-03-12T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-04-04T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE und Dell aufgenommen" }, { "date": "2024-04-29T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-07-04T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-07-09T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-07-31T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-08-06T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-07T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-11T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-08-29T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-09-03T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-10-20T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von BROCADE aufgenommen" }, { "date": "2024-11-26T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-04T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-01-23T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-28T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-02-24T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-02-26T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-13T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-19T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-04-02T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-01T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-22T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "48" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.3.1a", "product": { "name": "Broadcom Brocade SANnav \u003c2.3.1a", "product_id": "T038317" } }, { "category": "product_version", "name": "2.3.1a", "product": { "name": "Broadcom Brocade SANnav 2.3.1a", "product_id": "T038317-fixed", "product_identification_helper": { "cpe": "cpe:/a:broadcom:brocade_sannav:2.3.1a" } } } ], "category": "product_name", "name": "Brocade SANnav" } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c19.10.0.2", "product": { "name": "Dell NetWorker \u003c19.10.0.2", "product_id": "T033910" } }, { "category": "product_version", "name": "19.10.0.2", "product": { "name": "Dell NetWorker 19.10.0.2", "product_id": "T033910-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.10.0.2" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "runc \u003c1.1.12", "product": { "name": "Open Source docker runc \u003c1.1.12", "product_id": "T032453" } }, { "category": "product_version", "name": "runc 1.1.12", "product": { "name": "Open Source docker runc 1.1.12", "product_id": "T032453-fixed", "product_identification_helper": { "cpe": "cpe:/a:docker:docker:runc__1.1.12" } } }, { "category": "product_version_range", "name": "BuildKit \u003c0.12.5", "product": { "name": "Open Source docker BuildKit \u003c0.12.5", "product_id": "T032454" } }, { "category": "product_version", "name": "BuildKit 0.12.5", "product": { "name": "Open Source docker BuildKit 0.12.5", "product_id": "T032454-fixed", "product_identification_helper": { "cpe": "cpe:/a:docker:docker:buildkit__0.12.5" } } }, { "category": "product_version_range", "name": "Moby \u003c25.0.2", "product": { "name": "Open Source docker Moby \u003c25.0.2", "product_id": "T032455" } }, { "category": "product_version", "name": "Moby 25.0.2", "product": { "name": "Open Source docker Moby 25.0.2", "product_id": "T032455-fixed", "product_identification_helper": { "cpe": "cpe:/a:docker:docker:moby__25.0.2" } } }, { "category": "product_version_range", "name": "Moby \u003c24.0.9", "product": { "name": "Open Source docker Moby \u003c24.0.9", "product_id": "T032456" } }, { "category": "product_version", "name": "Moby 24.0.9", "product": { "name": "Open Source docker Moby 24.0.9", "product_id": "T032456-fixed", "product_identification_helper": { "cpe": "cpe:/a:docker:docker:moby__24.0.9" } } }, { "category": "product_version_range", "name": "Desktop \u003c4.27.1", "product": { "name": "Open Source docker Desktop \u003c4.27.1", "product_id": "T032457" } }, { "category": "product_version", "name": "Desktop 4.27.1", "product": { "name": "Open Source docker Desktop 4.27.1", "product_id": "T032457-fixed", "product_identification_helper": { "cpe": "cpe:/a:docker:docker:desktop__4.27.1" } } }, { "category": "product_version_range", "name": "Desktop \u003c4.27.2", "product": { "name": "Open Source docker Desktop \u003c4.27.2", "product_id": "T032605" } }, { "category": "product_version", "name": "Desktop 4.27.2", "product": { "name": "Open Source docker Desktop 4.27.2", "product_id": "T032605-fixed", "product_identification_helper": { "cpe": "cpe:/a:docker:docker:desktop__4.27.2" } } } ], "category": "product_name", "name": "docker" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "PaloAlto Networks Cortex XSOAR", "product": { "name": "PaloAlto Networks Cortex XSOAR", "product_id": "T033043", "product_identification_helper": { "cpe": "cpe:/a:paloaltonetworks:cortex_xsoar:-" } } } ], "category": "vendor", "name": "PaloAlto Networks" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "Container Platform \u003c4.14.11", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.11", "product_id": "T032600" } }, { "category": "product_version", "name": "Container Platform 4.14.11", "product": { "name": "Red Hat OpenShift Container Platform 4.14.11", "product_id": "T032600-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.11" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.13.32", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.13.32", "product_id": "T032601" } }, { "category": "product_version", "name": "Container Platform 4.13.32", "product": { "name": "Red Hat OpenShift Container Platform 4.13.32", "product_id": "T032601-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.32" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.12.49", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.49", "product_id": "T032602" } }, { "category": "product_version", "name": "Container Platform 4.12.49", "product": { "name": "Red Hat OpenShift Container Platform 4.12.49", "product_id": "T032602-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.49" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.11.58", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.11.58", "product_id": "T032603" } }, { "category": "product_version", "name": "Container Platform 4.11.58", "product": { "name": "Red Hat OpenShift Container Platform 4.11.58", "product_id": "T032603-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.11.58" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.15.46", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.15.46", "product_id": "T041462" } }, { "category": "product_version", "name": "Container Platform 4.15.46", "product": { "name": "Red Hat OpenShift Container Platform 4.15.46", "product_id": "T041462-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.15.46" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.12.74", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.74", "product_id": "T041814" } }, { "category": "product_version", "name": "Container Platform 4.12.74", "product": { "name": "Red Hat OpenShift Container Platform 4.12.74", "product_id": "T041814-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.74" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.13.56", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.13.56", "product_id": "T042009" } }, { "category": "product_version", "name": "Container Platform 4.13.56", "product": { "name": "Red Hat OpenShift Container Platform 4.13.56", "product_id": "T042009-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.56" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.49", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.49", "product_id": "T042010" } }, { "category": "product_version", "name": "Container Platform 4.14.49", "product": { "name": "Red Hat OpenShift Container Platform 4.14.49", "product_id": "T042010-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.49" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-21626", "product_status": { "known_affected": [ "T032600", "T032603", "T038317", "67646", "T041814", "T032601", "T033910", "T032602", "T033043", "T012167", "T004914", "T032255", "T032453", "74185", "T041462", "2951", "T002207", "T000126", "T042009", "T027843", "398363", "T032605", "T042010" ] }, "release_date": "2024-01-31T23:00:00.000+00:00", "title": "CVE-2024-21626" }, { "cve": "CVE-2024-23651", "product_status": { "known_affected": [ "T032600", "T032454", "T032603", "T038317", "67646", "T041814", "T032601", "T033910", "T032602", "T033043", "T012167", "T004914", "T032255", "74185", "T041462", "2951", "T002207", "T000126", "T042009", "T027843", "398363", "T032605", "T042010" ] }, "release_date": "2024-01-31T23:00:00.000+00:00", "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "product_status": { "known_affected": [ "T032600", "T032454", "T032603", "T038317", "67646", "T041814", "T032601", "T033910", "T032602", "T033043", "T012167", "T004914", "T032255", "74185", "T041462", "2951", "T002207", "T000126", "T042009", "T027843", "398363", "T032605", "T042010" ] }, "release_date": "2024-01-31T23:00:00.000+00:00", "title": "CVE-2024-23652" }, { "cve": "CVE-2024-23653", "product_status": { "known_affected": [ "T032600", "T032454", "T032603", "T038317", "67646", "T041814", "T032601", "T033910", "T032602", "T033043", "T012167", "T004914", "T032255", "74185", "T041462", "2951", "T002207", "T000126", "T042009", "T027843", "398363", "T032605", "T042010" ] }, "release_date": "2024-01-31T23:00:00.000+00:00", "title": "CVE-2024-23653" }, { "cve": "CVE-2024-23650", "product_status": { "known_affected": [ "T032600", "T032454", "T032603", "T038317", "67646", "T041814", "T032601", "T033910", "T032602", "T033043", "T012167", "T004914", "T032255", "74185", "T041462", "2951", "T002207", "T000126", "T042009", "T027843", "398363", "T032605", "T042010" ] }, "release_date": "2024-01-31T23:00:00.000+00:00", "title": "CVE-2024-23650" }, { "cve": "CVE-2024-24557", "product_status": { "known_affected": [ "T032600", "T032455", "T032603", "T038317", "67646", "T041814", "T032601", "T033910", "T032602", "T033043", "T012167", "T004914", "T032255", "74185", "T041462", "2951", "T002207", "T000126", "T042009", "T027843", "398363", "T032605", "T042010" ] }, "release_date": "2024-01-31T23:00:00.000+00:00", "title": "CVE-2024-24557" } ] }
suse-su-2024:0587-1
Vulnerability from csaf_suse
Published
2024-02-22 08:55
Modified
2024-02-22 08:55
Summary
Security update for docker
Notes
Title of the patch
Security update for docker
Description of the patch
This update for docker fixes the following issues:
Vendor latest buildkit v0.11 including bugfixes for the following:
* CVE-2024-23653: BuildKit API doesn't validate entitlement on container creation (bsc#1219438).
* CVE-2024-23652: Fixed arbitrary deletion of files (bsc#1219268).
* CVE-2024-23651: Fixed race condition in mount (bsc#1219267).
Patchnames
SUSE-2024-587,SUSE-SLE-Module-Containers-12-2024-587
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for docker", "title": "Title of the patch" }, { "category": "description", "text": "This update for docker fixes the following issues:\n\nVendor latest buildkit v0.11 including bugfixes for the following:\n\n* CVE-2024-23653: BuildKit API doesn\u0027t validate entitlement on container creation (bsc#1219438).\n* CVE-2024-23652: Fixed arbitrary deletion of files (bsc#1219268).\n* CVE-2024-23651: Fixed race condition in mount (bsc#1219267).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-587,SUSE-SLE-Module-Containers-12-2024-587", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0587-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0587-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240587-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0587-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017989.html" }, { "category": "self", "summary": "SUSE Bug 1219267", "url": "https://bugzilla.suse.com/1219267" }, { "category": "self", "summary": "SUSE Bug 1219268", "url": "https://bugzilla.suse.com/1219268" }, { "category": "self", "summary": "SUSE Bug 1219438", "url": "https://bugzilla.suse.com/1219438" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23651 page", "url": "https://www.suse.com/security/cve/CVE-2024-23651/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23652 page", "url": "https://www.suse.com/security/cve/CVE-2024-23652/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23653 page", "url": "https://www.suse.com/security/cve/CVE-2024-23653/" } ], "title": "Security update for docker", "tracking": { "current_release_date": "2024-02-22T08:55:20Z", "generator": { "date": "2024-02-22T08:55:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0587-1", "initial_release_date": "2024-02-22T08:55:20Z", "revision_history": [ { "date": "2024-02-22T08:55:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-98.106.1.aarch64", "product": { "name": "docker-24.0.7_ce-98.106.1.aarch64", "product_id": "docker-24.0.7_ce-98.106.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-98.106.1.i586", "product": { "name": "docker-24.0.7_ce-98.106.1.i586", "product_id": "docker-24.0.7_ce-98.106.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "docker-bash-completion-24.0.7_ce-98.106.1.noarch", "product": { "name": "docker-bash-completion-24.0.7_ce-98.106.1.noarch", "product_id": "docker-bash-completion-24.0.7_ce-98.106.1.noarch" } }, { "category": "product_version", "name": "docker-fish-completion-24.0.7_ce-98.106.1.noarch", "product": { "name": "docker-fish-completion-24.0.7_ce-98.106.1.noarch", "product_id": "docker-fish-completion-24.0.7_ce-98.106.1.noarch" } }, { "category": "product_version", "name": "docker-rootless-extras-24.0.7_ce-98.106.1.noarch", "product": { "name": "docker-rootless-extras-24.0.7_ce-98.106.1.noarch", "product_id": "docker-rootless-extras-24.0.7_ce-98.106.1.noarch" } }, { "category": "product_version", "name": "docker-zsh-completion-24.0.7_ce-98.106.1.noarch", "product": { "name": "docker-zsh-completion-24.0.7_ce-98.106.1.noarch", "product_id": "docker-zsh-completion-24.0.7_ce-98.106.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-98.106.1.ppc64le", "product": { "name": "docker-24.0.7_ce-98.106.1.ppc64le", "product_id": "docker-24.0.7_ce-98.106.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-98.106.1.s390x", "product": { "name": "docker-24.0.7_ce-98.106.1.s390x", "product_id": "docker-24.0.7_ce-98.106.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-98.106.1.x86_64", "product": { "name": "docker-24.0.7_ce-98.106.1.x86_64", "product_id": "docker-24.0.7_ce-98.106.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 12", "product": { "name": "SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-98.106.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-98.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-98.106.1.s390x as component of SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.s390x" }, "product_reference": "docker-24.0.7_ce-98.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-98.106.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.x86_64" }, "product_reference": "docker-24.0.7_ce-98.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-23651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23651" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23651", "url": "https://www.suse.com/security/cve/CVE-2024-23651" }, { "category": "external", "summary": "SUSE Bug 1219267 for CVE-2024-23651", "url": "https://bugzilla.suse.com/1219267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-22T08:55:20Z", "details": "important" } ], "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23652" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23652", "url": "https://www.suse.com/security/cve/CVE-2024-23652" }, { "category": "external", "summary": "SUSE Bug 1219268 for CVE-2024-23652", "url": "https://bugzilla.suse.com/1219268" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-22T08:55:20Z", "details": "moderate" } ], "title": "CVE-2024-23652" }, { "cve": "CVE-2024-23653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23653" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23653", "url": "https://www.suse.com/security/cve/CVE-2024-23653" }, { "category": "external", "summary": "SUSE Bug 1219438 for CVE-2024-23653", "url": "https://bugzilla.suse.com/1219438" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-24.0.7_ce-98.106.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-22T08:55:20Z", "details": "important" } ], "title": "CVE-2024-23653" } ] }
suse-su-2024:3120-1
Vulnerability from csaf_suse
Published
2024-09-03 15:13
Modified
2024-09-03 15:13
Summary
Security update for buildah, docker
Notes
Title of the patch
Security update for buildah, docker
Description of the patch
This update for buildah, docker fixes the following issues:
Changes in docker:
- CVE-2024-23651: Fixed arbitrary files write due to race condition on mounts (bsc#1219267)
- CVE-2024-23652: Fixed insufficient validation of parent directory on mount (bsc#1219268)
- CVE-2024-23653: Fixed insufficient validation on entitlement on container creation via buildkit (bsc#1219438)
- CVE-2024-41110: A Authz zero length regression that could lead to authentication bypass was fixed (bsc#1228324)
Other fixes:
- Update to Docker 25.0.6-ce. See upstream changelog online at
<https://docs.docker.com/engine/release-notes/25.0/#2506>
- Update to Docker 25.0.5-ce (bsc#1223409)
- Fix BuildKit's symlink resolution logic to correctly handle non-lexical
symlinks. (bsc#1221916)
- Write volume options atomically so sudden system crashes won't result in
future Docker starts failing due to empty files. (bsc#1214855)
Changes in buildah:
- Update to version 1.35.4:
* [release-1.35] Bump to Buildah v1.35.4
* [release-1.35] CVE-2024-3727 updates (bsc#1224117)
* integration test: handle new labels in 'bud and test --unsetlabel'
* [release-1.35] Bump go-jose CVE-2024-28180
* [release-1.35] Bump ocicrypt and go-jose CVE-2024-28180
- Update to version 1.35.3:
* [release-1.35] Bump to Buildah v1.35.3
* [release-1.35] correctly configure /etc/hosts and resolv.conf
* [release-1.35] buildah: refactor resolv/hosts setup.
* [release-1.35] rename the hostFile var to reflect
* [release-1.35] Bump c/common to v0.58.1
* [release-1.35] Bump Buildah to v1.35.2
* [release-1.35] CVE-2024-24786 protobuf to 1.33
* [release-1.35] Bump to v1.35.2-dev
- Update to version 1.35.1:
* [release-1.35] Bump to v1.35.1
* [release-1.35] CVE-2024-1753 container escape fix (bsc#1221677)
- Buildah dropped cni support, require netavark instead (bsc#1221243)
- Remove obsolete requires libcontainers-image & libcontainers-storage
- Require passt for rootless networking (poo#156955)
Buildah moved to passt/pasta for rootless networking from slirp4netns
(https://github.com/containers/common/pull/1846)
- Update to version 1.35.0:
* Bump v1.35.0
* Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0
* conformance tests: don't break on trailing zeroes in layer blobs
* Add a conformance test for copying to a mounted prior stage
* fix(deps): update module github.com/stretchr/testify to v1.9.0
* cgroups: reuse version check from c/common
* Update vendor of containers/(common,image)
* fix(deps): update github.com/containers/storage digest to eadc620
* fix(deps): update github.com/containers/luksy digest to ceb12d4
* fix(deps): update github.com/containers/image/v5 digest to cdc6802
* manifest add: complain if we get artifact flags without --artifact
* Use retry logic from containers/common
* Vendor in containers/(storage,image,common)
* Update module golang.org/x/crypto to v0.20.0
* Add comment re: Total Success task name
* tests: skip_if_no_unshare(): check for --setuid
* Properly handle build --pull=false
* [skip-ci] Update tim-actions/get-pr-commits action to v1.3.1
* Update module go.etcd.io/bbolt to v1.3.9
* Revert 'Reduce official image size'
* Update module github.com/opencontainers/image-spec to v1.1.0
* Reduce official image size
* Build with CNI support on FreeBSD
* build --all-platforms: skip some base 'image' platforms
* Bump main to v1.35.0-dev
* Vendor in latest containers/(storage,image,common)
* Split up error messages for missing --sbom related flags
* `buildah manifest`: add artifact-related options
* cmd/buildah/manifest.go: lock lists before adding/annotating/pushing
* cmd/buildah/manifest.go: don't make struct declarations aliases
* Use golang.org/x/exp/slices.Contains
* Disable loong64 again
* Fix a couple of typos in one-line comments
* egrep is obsolescent; use grep -E
* Try Cirrus with a newer VM version
* Set CONTAINERS_CONF in the chroot-mount-flags integration test
* Update to match dependency API update
* Update github.com/openshift/imagebuilder and containers/common
* docs: correct default authfile path
* fix(deps): update module github.com/containerd/containerd to v1.7.13
* tests: retrofit test for heredoc summary
* build, heredoc: show heredoc summary in build output
* manifest, push: add support for --retry and --retry-delay
* fix(deps): update github.com/openshift/imagebuilder digest to b767bc3
* imagebuildah: fix crash with empty RUN
* fix(deps): update github.com/containers/luksy digest to b62d551
* fix(deps): update module github.com/opencontainers/runc to v1.1.12 [security]
* fix(deps): update module github.com/moby/buildkit to v0.12.5 [security]
* Make buildah match podman for handling of ulimits
* docs: move footnotes to where they're applicable
* Allow users to specify no-dereference
* Run codespell on code
* Fix FreeBSD version parsing
* Fix a build break on FreeBSD
* Remove a bad FROM line
* fix(deps): update module github.com/onsi/gomega to v1.31.1
* fix(deps): update module github.com/opencontainers/image-spec to v1.1.0-rc6
* docs: use reversed logo for dark theme in README
* build,commit: add --sbom to scan and produce SBOMs when committing
* commit: force omitHistory if the parent has layers but no history
* docs: fix a couple of typos
* internal/mkcw.Archive(): handle extra image content
* stage_executor,heredoc: honor interpreter in heredoc
* stage_executor,layers: burst cache if heredoc content is changed
* fix(deps): update module golang.org/x/crypto to v0.18.0
* Replace map[K]bool with map[K]struct{} where it makes sense
* fix(deps): update module golang.org/x/sync to v0.6.0
* fix(deps): update module golang.org/x/term to v0.16.0
* Bump CI VMs
* Replace strings.SplitN with strings.Cut
* fix(deps): update github.com/containers/storage digest to ef81e9b
* fix(deps): update github.com/containers/image/v5 digest to 1b221d4
* fix(deps): update module github.com/fsouza/go-dockerclient to v1.10.1
* Document use of containers-transports values in buildah
* fix(deps): update module golang.org/x/crypto to v0.17.0 [security]
* chore(deps): update dependency containers/automation_images to v20231208
* manifest: addCompression use default from containers.conf
* commit: add a --add-file flag
* mkcw: populate the rootfs using an overlay
* chore(deps): update dependency containers/automation_images to v20230517
* [skip-ci] Update actions/stale action to v9
* fix(deps): update module github.com/containernetworking/plugins to v1.4.0
* fix(deps): update github.com/containers/image/v5 digest to 7a40fee
* Bump to v1.34.1-dev
* Ignore errors if label.Relabel returns ENOSUP
Patchnames
SUSE-2024-3120,SUSE-SLE-Micro-5.3-2024-3120,SUSE-SLE-Micro-5.4-2024-3120,SUSE-SLE-Micro-5.5-2024-3120,SUSE-SLE-Module-Containers-15-SP5-2024-3120,SUSE-SLE-Module-Containers-15-SP6-2024-3120,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3120,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3120,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3120,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3120,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3120,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3120,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3120,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3120,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3120,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3120,SUSE-SUSE-MicroOS-5.1-2024-3120,SUSE-SUSE-MicroOS-5.2-2024-3120,SUSE-Storage-7.1-2024-3120,openSUSE-Leap-Micro-5.5-2024-3120,openSUSE-SLE-15.5-2024-3120,openSUSE-SLE-15.6-2024-3120
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for buildah, docker", "title": "Title of the patch" }, { "category": "description", "text": "This update for buildah, docker fixes the following issues:\n\nChanges in docker:\n- CVE-2024-23651: Fixed arbitrary files write due to race condition on mounts (bsc#1219267)\n- CVE-2024-23652: Fixed insufficient validation of parent directory on mount (bsc#1219268)\n- CVE-2024-23653: Fixed insufficient validation on entitlement on container creation via buildkit (bsc#1219438)\n- CVE-2024-41110: A Authz zero length regression that could lead to authentication bypass was fixed (bsc#1228324)\n\nOther fixes:\n\n- Update to Docker 25.0.6-ce. See upstream changelog online at\n \u003chttps://docs.docker.com/engine/release-notes/25.0/#2506\u003e\n- Update to Docker 25.0.5-ce (bsc#1223409)\n\n- Fix BuildKit\u0027s symlink resolution logic to correctly handle non-lexical\n symlinks. (bsc#1221916)\n- Write volume options atomically so sudden system crashes won\u0027t result in\n future Docker starts failing due to empty files. (bsc#1214855)\n\nChanges in buildah:\n- Update to version 1.35.4:\n * [release-1.35] Bump to Buildah v1.35.4\n * [release-1.35] CVE-2024-3727 updates (bsc#1224117)\n * integration test: handle new labels in \u0027bud and test --unsetlabel\u0027\n * [release-1.35] Bump go-jose CVE-2024-28180\n * [release-1.35] Bump ocicrypt and go-jose CVE-2024-28180\n\n- Update to version 1.35.3:\n * [release-1.35] Bump to Buildah v1.35.3\n * [release-1.35] correctly configure /etc/hosts and resolv.conf\n * [release-1.35] buildah: refactor resolv/hosts setup.\n * [release-1.35] rename the hostFile var to reflect\n * [release-1.35] Bump c/common to v0.58.1\n * [release-1.35] Bump Buildah to v1.35.2\n * [release-1.35] CVE-2024-24786 protobuf to 1.33\n * [release-1.35] Bump to v1.35.2-dev\n\n- Update to version 1.35.1:\n * [release-1.35] Bump to v1.35.1\n * [release-1.35] CVE-2024-1753 container escape fix (bsc#1221677)\n\n- Buildah dropped cni support, require netavark instead (bsc#1221243)\n\n- Remove obsolete requires libcontainers-image \u0026 libcontainers-storage\n\n- Require passt for rootless networking (poo#156955)\n Buildah moved to passt/pasta for rootless networking from slirp4netns\n (https://github.com/containers/common/pull/1846)\n\n- Update to version 1.35.0:\n * Bump v1.35.0\n * Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0\n * conformance tests: don\u0027t break on trailing zeroes in layer blobs\n * Add a conformance test for copying to a mounted prior stage\n * fix(deps): update module github.com/stretchr/testify to v1.9.0\n * cgroups: reuse version check from c/common\n * Update vendor of containers/(common,image)\n * fix(deps): update github.com/containers/storage digest to eadc620\n * fix(deps): update github.com/containers/luksy digest to ceb12d4\n * fix(deps): update github.com/containers/image/v5 digest to cdc6802\n * manifest add: complain if we get artifact flags without --artifact\n * Use retry logic from containers/common\n * Vendor in containers/(storage,image,common)\n * Update module golang.org/x/crypto to v0.20.0\n * Add comment re: Total Success task name\n * tests: skip_if_no_unshare(): check for --setuid\n * Properly handle build --pull=false\n * [skip-ci] Update tim-actions/get-pr-commits action to v1.3.1\n * Update module go.etcd.io/bbolt to v1.3.9\n * Revert \u0027Reduce official image size\u0027\n * Update module github.com/opencontainers/image-spec to v1.1.0\n * Reduce official image size\n * Build with CNI support on FreeBSD\n * build --all-platforms: skip some base \u0027image\u0027 platforms\n * Bump main to v1.35.0-dev\n * Vendor in latest containers/(storage,image,common)\n * Split up error messages for missing --sbom related flags\n * `buildah manifest`: add artifact-related options\n * cmd/buildah/manifest.go: lock lists before adding/annotating/pushing\n * cmd/buildah/manifest.go: don\u0027t make struct declarations aliases\n * Use golang.org/x/exp/slices.Contains\n * Disable loong64 again\n * Fix a couple of typos in one-line comments\n * egrep is obsolescent; use grep -E\n * Try Cirrus with a newer VM version\n * Set CONTAINERS_CONF in the chroot-mount-flags integration test\n * Update to match dependency API update\n * Update github.com/openshift/imagebuilder and containers/common\n * docs: correct default authfile path\n * fix(deps): update module github.com/containerd/containerd to v1.7.13\n * tests: retrofit test for heredoc summary\n * build, heredoc: show heredoc summary in build output\n * manifest, push: add support for --retry and --retry-delay\n * fix(deps): update github.com/openshift/imagebuilder digest to b767bc3\n * imagebuildah: fix crash with empty RUN\n * fix(deps): update github.com/containers/luksy digest to b62d551\n * fix(deps): update module github.com/opencontainers/runc to v1.1.12 [security]\n * fix(deps): update module github.com/moby/buildkit to v0.12.5 [security]\n * Make buildah match podman for handling of ulimits\n * docs: move footnotes to where they\u0027re applicable\n * Allow users to specify no-dereference\n * Run codespell on code\n * Fix FreeBSD version parsing\n * Fix a build break on FreeBSD\n * Remove a bad FROM line\n * fix(deps): update module github.com/onsi/gomega to v1.31.1\n * fix(deps): update module github.com/opencontainers/image-spec to v1.1.0-rc6\n * docs: use reversed logo for dark theme in README\n * build,commit: add --sbom to scan and produce SBOMs when committing\n * commit: force omitHistory if the parent has layers but no history\n * docs: fix a couple of typos\n * internal/mkcw.Archive(): handle extra image content\n * stage_executor,heredoc: honor interpreter in heredoc\n * stage_executor,layers: burst cache if heredoc content is changed\n * fix(deps): update module golang.org/x/crypto to v0.18.0\n * Replace map[K]bool with map[K]struct{} where it makes sense\n * fix(deps): update module golang.org/x/sync to v0.6.0\n * fix(deps): update module golang.org/x/term to v0.16.0\n * Bump CI VMs\n * Replace strings.SplitN with strings.Cut\n * fix(deps): update github.com/containers/storage digest to ef81e9b\n * fix(deps): update github.com/containers/image/v5 digest to 1b221d4\n * fix(deps): update module github.com/fsouza/go-dockerclient to v1.10.1\n * Document use of containers-transports values in buildah\n * fix(deps): update module golang.org/x/crypto to v0.17.0 [security]\n * chore(deps): update dependency containers/automation_images to v20231208\n * manifest: addCompression use default from containers.conf\n * commit: add a --add-file flag\n * mkcw: populate the rootfs using an overlay\n * chore(deps): update dependency containers/automation_images to v20230517\n * [skip-ci] Update actions/stale action to v9\n * fix(deps): update module github.com/containernetworking/plugins to v1.4.0\n * fix(deps): update github.com/containers/image/v5 digest to 7a40fee\n * Bump to v1.34.1-dev\n * Ignore errors if label.Relabel returns ENOSUP\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3120,SUSE-SLE-Micro-5.3-2024-3120,SUSE-SLE-Micro-5.4-2024-3120,SUSE-SLE-Micro-5.5-2024-3120,SUSE-SLE-Module-Containers-15-SP5-2024-3120,SUSE-SLE-Module-Containers-15-SP6-2024-3120,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3120,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3120,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3120,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3120,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3120,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3120,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3120,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3120,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3120,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3120,SUSE-SUSE-MicroOS-5.1-2024-3120,SUSE-SUSE-MicroOS-5.2-2024-3120,SUSE-Storage-7.1-2024-3120,openSUSE-Leap-Micro-5.5-2024-3120,openSUSE-SLE-15.5-2024-3120,openSUSE-SLE-15.6-2024-3120", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3120-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:3120-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243120-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:3120-1", "url": "https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" }, { "category": "self", "summary": "SUSE Bug 1214855", "url": "https://bugzilla.suse.com/1214855" }, { "category": "self", "summary": "SUSE Bug 1219267", "url": "https://bugzilla.suse.com/1219267" }, { "category": "self", "summary": "SUSE Bug 1219268", "url": "https://bugzilla.suse.com/1219268" }, { "category": "self", "summary": "SUSE Bug 1219438", "url": "https://bugzilla.suse.com/1219438" }, { "category": "self", "summary": "SUSE Bug 1221243", "url": "https://bugzilla.suse.com/1221243" }, { "category": "self", "summary": "SUSE Bug 1221677", "url": "https://bugzilla.suse.com/1221677" }, { "category": "self", "summary": "SUSE Bug 1221916", "url": "https://bugzilla.suse.com/1221916" }, { "category": "self", "summary": "SUSE Bug 1223409", "url": "https://bugzilla.suse.com/1223409" }, { "category": "self", "summary": "SUSE Bug 1224117", "url": "https://bugzilla.suse.com/1224117" }, { "category": "self", "summary": "SUSE Bug 1228324", "url": "https://bugzilla.suse.com/1228324" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1753 page", "url": "https://www.suse.com/security/cve/CVE-2024-1753/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23651 page", "url": "https://www.suse.com/security/cve/CVE-2024-23651/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23652 page", "url": "https://www.suse.com/security/cve/CVE-2024-23652/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23653 page", "url": "https://www.suse.com/security/cve/CVE-2024-23653/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-24786 page", "url": "https://www.suse.com/security/cve/CVE-2024-24786/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-28180 page", "url": "https://www.suse.com/security/cve/CVE-2024-28180/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-3727 page", "url": "https://www.suse.com/security/cve/CVE-2024-3727/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-41110 page", "url": "https://www.suse.com/security/cve/CVE-2024-41110/" } ], "title": "Security update for buildah, docker", "tracking": { "current_release_date": "2024-09-03T15:13:23Z", "generator": { "date": "2024-09-03T15:13:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:3120-1", "initial_release_date": "2024-09-03T15:13:23Z", "revision_history": [ { "date": "2024-09-03T15:13:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "buildah-1.35.4-150300.8.25.1.aarch64", "product": { "name": "buildah-1.35.4-150300.8.25.1.aarch64", "product_id": "buildah-1.35.4-150300.8.25.1.aarch64" } }, { "category": "product_version", "name": "docker-25.0.6_ce-150000.207.1.aarch64", "product": { "name": "docker-25.0.6_ce-150000.207.1.aarch64", "product_id": "docker-25.0.6_ce-150000.207.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "buildah-1.35.4-150300.8.25.1.i586", "product": { "name": "buildah-1.35.4-150300.8.25.1.i586", "product_id": "buildah-1.35.4-150300.8.25.1.i586" } }, { "category": "product_version", "name": "docker-25.0.6_ce-150000.207.1.i586", "product": { "name": "docker-25.0.6_ce-150000.207.1.i586", "product_id": "docker-25.0.6_ce-150000.207.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "product": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "product_id": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch" } }, { "category": "product_version", "name": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "product": { "name": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "product_id": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch" } }, { "category": "product_version", "name": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "product": { "name": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "product_id": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch" } }, { "category": "product_version", "name": "docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "product": { "name": "docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "product_id": "docker-zsh-completion-25.0.6_ce-150000.207.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "buildah-1.35.4-150300.8.25.1.ppc64le", "product": { "name": "buildah-1.35.4-150300.8.25.1.ppc64le", "product_id": "buildah-1.35.4-150300.8.25.1.ppc64le" } }, { "category": "product_version", "name": "docker-25.0.6_ce-150000.207.1.ppc64le", "product": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le", "product_id": "docker-25.0.6_ce-150000.207.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-1.35.4-150300.8.25.1.s390x", "product": { "name": "buildah-1.35.4-150300.8.25.1.s390x", "product_id": "buildah-1.35.4-150300.8.25.1.s390x" } }, { "category": "product_version", "name": "docker-25.0.6_ce-150000.207.1.s390x", "product": { "name": "docker-25.0.6_ce-150000.207.1.s390x", "product_id": "docker-25.0.6_ce-150000.207.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildah-1.35.4-150300.8.25.1.x86_64", "product": { "name": "buildah-1.35.4-150300.8.25.1.x86_64", "product_id": "buildah-1.35.4-150300.8.25.1.x86_64" } }, { "category": "product_version", "name": "docker-25.0.6_ce-150000.207.1.x86_64", "product": { "name": "docker-25.0.6_ce-150000.207.1.x86_64", "product_id": "docker-25.0.6_ce-150000.207.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Containers 15 SP6", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.5", "product": { "name": "openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le" }, "product_reference": "docker-25.0.6_ce-150000.207.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le" }, "product_reference": "docker-25.0.6_ce-150000.207.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le" }, "product_reference": "docker-25.0.6_ce-150000.207.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP6", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP6", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1.35.4-150300.8.25.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64" }, "product_reference": "buildah-1.35.4-150300.8.25.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1.35.4-150300.8.25.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64" }, "product_reference": "buildah-1.35.4-150300.8.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le" }, "product_reference": "docker-25.0.6_ce-150000.207.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1.35.4-150300.8.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64" }, "product_reference": "buildah-1.35.4-150300.8.25.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1.35.4-150300.8.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le" }, "product_reference": "buildah-1.35.4-150300.8.25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1.35.4-150300.8.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x" }, "product_reference": "buildah-1.35.4-150300.8.25.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1.35.4-150300.8.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64" }, "product_reference": "buildah-1.35.4-150300.8.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le" }, "product_reference": "docker-25.0.6_ce-150000.207.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le" }, "product_reference": "docker-25.0.6_ce-150000.207.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le" }, "product_reference": "docker-25.0.6_ce-150000.207.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1.35.4-150300.8.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le" }, "product_reference": "buildah-1.35.4-150300.8.25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1.35.4-150300.8.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64" }, "product_reference": "buildah-1.35.4-150300.8.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le" }, "product_reference": "docker-25.0.6_ce-150000.207.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le" }, "product_reference": "docker-25.0.6_ce-150000.207.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1.35.4-150300.8.25.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64" }, "product_reference": "buildah-1.35.4-150300.8.25.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1.35.4-150300.8.25.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64" }, "product_reference": "buildah-1.35.4-150300.8.25.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "openSUSE Leap Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le" }, "product_reference": "docker-25.0.6_ce-150000.207.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-zsh-completion-25.0.6_ce-150000.207.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le" }, "product_reference": "docker-25.0.6_ce-150000.207.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x" }, "product_reference": "docker-25.0.6_ce-150000.207.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-150000.207.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64" }, "product_reference": "docker-25.0.6_ce-150000.207.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "docker-zsh-completion-25.0.6_ce-150000.207.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch" }, "product_reference": "docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-1753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1753" } ], "notes": [ { "category": "general", "text": "A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1753", "url": "https://www.suse.com/security/cve/CVE-2024-1753" }, { "category": "external", "summary": "SUSE Bug 1221677 for CVE-2024-1753", "url": "https://bugzilla.suse.com/1221677" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-09-03T15:13:23Z", "details": "important" } ], "title": "CVE-2024-1753" }, { "cve": "CVE-2024-23651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23651" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23651", "url": "https://www.suse.com/security/cve/CVE-2024-23651" }, { "category": "external", "summary": "SUSE Bug 1219267 for CVE-2024-23651", "url": "https://bugzilla.suse.com/1219267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-09-03T15:13:23Z", "details": "important" } ], "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23652" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23652", "url": "https://www.suse.com/security/cve/CVE-2024-23652" }, { "category": "external", "summary": "SUSE Bug 1219268 for CVE-2024-23652", "url": "https://bugzilla.suse.com/1219268" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-09-03T15:13:23Z", "details": "moderate" } ], "title": "CVE-2024-23652" }, { "cve": "CVE-2024-23653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23653" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23653", "url": "https://www.suse.com/security/cve/CVE-2024-23653" }, { "category": "external", "summary": "SUSE Bug 1219438 for CVE-2024-23653", "url": "https://bugzilla.suse.com/1219438" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-09-03T15:13:23Z", "details": "important" } ], "title": "CVE-2024-23653" }, { "cve": "CVE-2024-24786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-24786" } ], "notes": [ { "category": "general", "text": "The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-24786", "url": "https://www.suse.com/security/cve/CVE-2024-24786" }, { "category": "external", "summary": "SUSE Bug 1226136 for CVE-2024-24786", "url": "https://bugzilla.suse.com/1226136" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-09-03T15:13:23Z", "details": "important" } ], "title": "CVE-2024-24786" }, { "cve": "CVE-2024-28180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-28180" } ], "notes": [ { "category": "general", "text": "Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-28180", "url": "https://www.suse.com/security/cve/CVE-2024-28180" }, { "category": "external", "summary": "SUSE Bug 1234984 for CVE-2024-28180", "url": "https://bugzilla.suse.com/1234984" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-09-03T15:13:23Z", "details": "moderate" } ], "title": "CVE-2024-28180" }, { "cve": "CVE-2024-3727", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-3727" } ], "notes": [ { "category": "general", "text": "A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-3727", "url": "https://www.suse.com/security/cve/CVE-2024-3727" }, { "category": "external", "summary": "SUSE Bug 1224112 for CVE-2024-3727", "url": "https://bugzilla.suse.com/1224112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-09-03T15:13:23Z", "details": "important" } ], "title": "CVE-2024-3727" }, { "cve": "CVE-2024-41110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-41110" } ], "notes": [ { "category": "general", "text": "Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\n\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\n\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\n\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\n\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-41110", "url": "https://www.suse.com/security/cve/CVE-2024-41110" }, { "category": "external", "summary": "SUSE Bug 1228324 for CVE-2024-41110", "url": "https://bugzilla.suse.com/1228324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Enterprise Storage 7.1:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Enterprise Storage 7.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.4-150300.8.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-25.0.6_ce-150000.207.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.5:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.ppc64le", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap 15.6:docker-25.0.6_ce-150000.207.1.x86_64", "openSUSE Leap 15.6:docker-bash-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-fish-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-rootless-extras-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap 15.6:docker-zsh-completion-25.0.6_ce-150000.207.1.noarch", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.aarch64", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.s390x", "openSUSE Leap Micro 5.5:docker-25.0.6_ce-150000.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-09-03T15:13:23Z", "details": "critical" } ], "title": "CVE-2024-41110" } ] }
suse-su-2025:20107-1
Vulnerability from csaf_suse
Published
2025-02-03 09:18
Modified
2025-02-03 09:18
Summary
Security update for buildkit
Notes
Title of the patch
Security update for buildkit
Description of the patch
This update for buildkit fixes the following issues:
- Update to version 0.12.5:
* update runc to v1.1.12
* exec: add extra validation for submount sources (fixes CVE-2024-23651, bsc#1219267)
* oci: fix error handling on submount calls
* executor: recheck mount stub path within root after container run (fixes CVE-2024-23652, bsc#1219268)
* llbsolver: make sure interactive container API validates entitlements (fixes CVE-2024-23653, bsc#1219438)
* gateway: pass executor with build and not access worker directly
* pb: add extra validation to protobuf types
* sourcepolicy: add validations for nil values
* exporter: add validation for platforms key value
* exporter: add validation for invalid platorm
* exporter: validate null config metadata from gateway
* ci: disable push if not upstream repo
* hack: use git context only for upstream repo
* hack/test: allow ALPINE_VERSION to be set from env
* hack: align syntax
* vendor: github.com/cyphar/filepath-securejoin v0.2.4
* tracing: allow the `Resource` to be set externally
- Update to version 0.12.4:
* Fix possible concurrent map access on remote cache export
* Fix hang on debug server listener
* Fix possible deadlock in History API under high number of parallel builds
* Fix possible panic on handling deleted records in History API
* Fix possible data corruption in zstd library
- Update to version 0.12.3:
* Fix possible duplicate source files in provenance attestation for chained builds
* Fix possible negative step time in progressbar for step shared with other build request
* Fix properly closing history and cache DB on shutdown to avoid corruption
* Fix incorrect error handling for invalid HTTP source URLs
* Fix fallback cases for ambiguous insecure configuration provided for registry used as push target.
* Fix possible data race with parallel image config resolves
* Fix regression in v0.12 for clients waiting on buildkitd to become available
* Fix Cgroup NS handling for hosts supporting only CgroupV1
- Update to version 0.12.2:
* Fix possible discarded network error when exporting result to client
* Avoid unnecessary memory allocations when writing build progress
- Update to version 0.12.1:
* executor: fix resource sampler goroutine leak
* [v0.11] make tracing socket forward error non-fatal
* integration: missing env var to check feature compat
* test: update pinned busybox image to 1.36
* test: update pinned alpine image to 3.18
* vendor: github.com/docker/docker 8e51b8b59cb8 (master, v25.0.0-dev)
* executor/resource: stub out NewSysSampler on Windows
* vendor: github.com/docker/cli v24.0.4
* testutil: move CheckContainerdVersion to a separate package
* llbsolver: fix policy rule ordering
* filesync: fix backward compatibility with encoding + and %
* hack: allow to set GO_VERSION during tests
* test: always disable tls for dockerd worker
* buildctl: set max backoff delay to 1 second
* contenthash: data race
* filesync: escape special query characters
* applier: add hack to support docker zstd layers
* Fix various nits
* pullprogress data race
* use sampler lock instead
* Fix ResolveImageConfig to evaluate source policy
* sampler data race fix
* update cgroup parent test to work with cgroupns
* Revert "specify a `ResponseHeaderTimeout` value"
* oci: make sure cgroupns is enabled if supported
* bash lint fix
* rename BUILDFLAGS to GOBUILDFLAGS
* allow ENOTSUP for PSI cgroup files
* containerimage: use platform matcher to detect platform to unpack
* exporter: silently skip unpacking unknown reference
* improve error handling in ReadFile
* dockerfile: arg for controlling go build flags
* dockerfile: arg to enable go race detection
* Add support for health start interval
* Re-vendor moby/moby
* filesync: mark if options have been encoded to detect old versions
* dockerfile: heredoc should use 0644 permissions
* docs: update README to reference OpenTelemetry instead of OpenTracing
* gateway: restore original filename in ReadFile error message
* Dockerfile: update containerd to v1.7.2
* Use system.ToSlash() instead of filepath.ToSlash()
* Revert most changes to client/llb
* Remove Architecture
* Default to linux in client
* Ensure we use proper path separators
* Set default platform
* Add nil pointer check in dispatchWorkdir
* Remove nil pointer check and extra NormalizePath
* Rename variable, remove superfluous check
* Use current OS as a default
* Handle file paths base on target platform
* exporter: unlazy references in parallel
* exporter: simplify unlazy references to reduce duplication
* exporter: allow unpack on multi-platform images
* tests: add unpack to scratch export test
* overlay: set whiteout timestamps to 1970-01-01 (not to SOURCE_DATE_EPOCH)
* dockerfile: graduate `ADD --checksum=<checksum>` from labs
* dockerfile: graduate `ADD <git ref>` from labs
* dockerfile: mod-outdated target to check modules updates
* dockerfile: use xx in dnsname stage
* dockerfile: install musl-dev to fix compilation issue
* dockerfile: update Alpine to 3.18
* vendor: update fsutil to 36ef4d8
* export(local): split opt
* buildctl: Provide --wait option
* containerimage: support SOURCE_DATE_EPOCH for CreatedAt
* move flightcontrol to use generics
* containerimage: keep layer labels for exported images
* shell: start shell from cmd, not entrypoint
* sbom: propogate image-resolve-mode for generator image
* client: add extra debug to tests
* handle missing provenance for non-evaluated result
* tests: add provenance test for duplicate platform
* tests: add provenance test for when context directory does not exist
* forward: make BridgeClient public for lint
* gateway: enable named contexts for gateway frontend
* vendor: update vt100 with resize panic fix
* docs: dockerfile: remove "known issues" related to AuFS
* docs: add running instruction to CONTRIBUTING.md
* tests: add worker close method to interface
* add and check for gateway.exec.secretenv cap
* move Secretenv from Meta to InitMessage
* support passing SecretEnv to gateway containers
* Add comment, update from review
* Fix issue with digest merge (inconsistent graph state)
* docs: add helper commands section to CONTRIBUTING.md
* docs: update CONTRIBUTING.md whitespace formatting
* integration: fix not deleting dockerd workdir
* remove uses of deprecated ResolverOptions.Client
* filesync: fix handling non-ascii in file paths
* tests: add test for unicode filenames
* Adding more docs to client/llb
* Add special case for rw bind mounts
* vendor: github.com/docker/cli v24.0.2
* vendor: github.com/docker/docker v24.0.2
* progressui: fix index printing on partial rows
* gateway: wrap ExecProcessServer Send calls with a mutex
* resources: make maxsamples configurable
* llbsolver: add systemusage samples to provenance attestation
* resources: store sys cpu usage per step
* resources: add sampler for periodic stat reads
* resources: CNI network usage sampling support
* resources: add build step resource tracking via cgroups
* solver: lock before using actives
* Emulate "bind" mounts using the bind filter
* Fix mount layers on host
* llbsolver: set temporary lease in Commit context
* Update containerd dependency
* exporter: Add exptypes with Common exporter keys
* exporter/image/exptypes: Make strongly typed
* solver: move AddBuildConfig into llbsolver package
* tests: add test to check url format for image loaded from oci layout
* solver: mark locally loaded images as such
* solver: merge local and remote images into single list
* purl: allow RefToPURL to take a type parameter
* tests: don't use purl code to test itself
* Use linux as a default for inputOS
* Add path handling functions
* response to comments
* containerimage: Export option keys
* vendor: update spdx/tools-golang to v0.5.1
* exporter: remove non dist options from tar exporter
* exporter: move fs opt parsing to method
* tests: fixup attestation tar to not panic when file not found
* git: set umask without reexec
* add language property for sourcemap
* dockerfile/docs: add set -ex to heredoc #3870
* authprovider: fix a bug where registry-1.docker.io auth was always a cache miss
* response to comments
* tracing: fix buildx tracing delegation
* Update continuity and fsutil
* cache: add a few more fields to ref trace logs.
* vendor: github.com/containerd/go-runc v1.1.0
* provenance: fix possible empty digest access
* vendor: fix broken vendoring
* dockerfile: bump up nerdctl to v1.4.0
* bump nydus-snapshotter dependence to v0.8.2
* vendor: github.com/docker/cli v24.0.1
* vendor: github.com/docker/docker v24.0.1
* vendor: github.com/containerd/containerd v1.7.1
* vendor: github.com/Microsoft/hcsshim v0.10.0-rc.8
* vendor: github.com/Microsoft/go-winio v0.6.1
* vendor: golang.org/x/sys v0.7.0
* vendor: github.com/containerd/typeurl/v2 v2.1.1
* chore: bump spdx tools
* Fix typo in attestation-storage.md
* vendor: github.com/docker/cli v24.0.0
* vendor: github.com/docker/docker v24.0.0
* vendor: github.com/opencontainers/runc v1.1.7
* vendor: github.com/opencontainers/runtime-spec v1.1.0-rc.2
* vendor: github.com/klauspost/compress v1.16.3
* Dockerfile: CONTAINERD_VERSION=v1.7.1
* Dockerfile: CONTAINERD_ALT_VERSION_16=v1.6.21
* Dockerfile: RUNC_VERSION=v1.1.7
* session: avoid logging healthcheck error on canceled connection
* session: fix run and close synchronization
* testutil: update ReadImages to fallback to reading manifest
* Add trace logs for cache leaks.
* Add some doc strings for LLB functions
* attestations: move containerd media type warnings
* update generated proto files
* attestations: replace intoto media type with vendored const
* nydus: bump nydus versions in Dockerfile and doc
* feedback changes for moby/buildkit #2251
* testutil: expose underlying docker address for supported workers
* testutil: expose integration workers as public
* remove type aliases for leasemanager/contentstore
* llbsolver: move history blobs to a separate namespace
* build(deps): bump github.com/docker/distribution
* added import/export support for OCI compatible image manifest version of cache manifest (opt-in on export, inferred on import) moby/buildkit #2251
* llb: carry platform from inputs for merge/diff
* llb: don't include platform in fileop
* control: fix possible deadlock on network error
* exporter/containerimage: remove redundant type for var declaration
* Fix not to set the value on empty vertex
* Fix to import as digest
* cache: always release ref when getting size in usage.
* Drop unneeded variable
* ssh: add fallback to ensure conn is closed in all cases.
* vendor: github.com/opencontainers/image-spec v1.1.0-rc3
* vendor: github.com/docker/cli v23.0.5
* vendor: github.com/docker/docker v23.0.5
* nydus: update nydus-snapshotter dependency to v0.8.0
* progressui: fix possible zero prefix numbers in logs
* llbsolver: send active event only to current client
* llbsolver: send delete status event
* llbsolver: filter out records marked deleted from list responses
* Add Windows service support
* docs: fixup build repro doc with updated policy format
* test: use appropriate snapshotter service to walk snapshots
* overlay: use function to check for overlay-based mounts
* Update uses of Image platform fields in OCI image-spec
* allow setting user agent products
* Bump up golangci-lint to v1.52.2
* chore: tidy up duplicated imports
* solver: Release unused refs in LoadWithParents
* Avoid panic on parallel walking on DefinitionOp
* solver: skip sbom post processor if result is nil
* vendor: github.com/docker/docker v23.0.4
* vendor: github.com/docker/cli v23.0.4
* vendor: golang.org/x/time v0.3.0
* vendor: github.com/docker/cli v23.0.2
* vendor: github.com/docker/docker v23.0.2
* test: don't hang if a process doesn't run
* ci: put worker name first for better UX in actions
* go.mod: remove github.com/kr/pretty
* Revert "Problem: can't use anonymous S3 credentials"
* go.mod: bump up runc to v1.1.6
* go.mod: Bump up stargz-snapshotter to v0.14.3
* dockerfile: bump up stargz-snapshotter to v0.14.3
* dockerfile: bump up runc to v1.1.6
* buildkitd: add grpc reflection
* Bump up nerdctl to 1.3.0
* Bump up containerd 1.6.20
* Fix gzip decoding of HTTP sources.
* ci: update runner os to ubuntu 22.04
* Fix bearer token expiration check (fixes #3779)
* docs: update buildkitd.toml with new field info
* buildkitd: allow durations for gc config
* buildkitd: allow multiple units for gc config
* dockerui: expose context detection functions as public
* Prevent overflow of runc exit code.
* Upgrade to latest go-runc.
* runc worker: fix sigkill handling
* Dockerfile: RUNC_VERSION=v1.1.5
* client: add client opts to enable system certificates
* Make ClientOpts type safe
* build(deps): bump github.com/opencontainers/runc from 1.1.4 to 1.1.5
* fileop: create new fileOpSolver instance per Exec call
* Provide CacheManager to Controller instead of CacheKeyManager.
* http: ensure HEAD and GET requests have same headers
* docs: add auto-generated sections to buildctl.md
* client: allow grpc dial option passthrough
* cni: simplify netns creation
* add Bass to list of LLB languages
* llbsolver: fix sorting of history records
* llbsolver: Fix performance of recomputeDigests
* solve: use comparables instead of reflection in result struct
* vendor: github.com/docker/cli v23.0.1
* vendor: github.com/docker/docker v23.0.1
* client: create oci-layout file in StoreIndex
* ci: output annotations for failures
* test: set mod vendor
* test: use gotestsum to generate reports
* fix gateway exec tty cleanup on context.Canceled
* fix process termination handling for runc exec
* Register builds before recording build history
* docs(dockerfile): minimal Dockerfile version support for chmod
* Update builder.md to document newly supported --chmod features in both ADD and COPY statements.
* use bklog.G(ctx) instead of logrus directly
* integration: missing mergeDiff compat check
* chore: `translateLegacySolveRequest` does not need to return error checking.
* integration: split feature compat check for subtests
* integration: missing feature compat check for cache
* dockerfile: fix reproducible digest test for non-amd64
* integration: add FeatureMergeDiff compat
* integration: add FeatureCacheBackend* compat
* integration: enforce features compat through env vars
* ci: upstream docs conformance validation
* dockerfile(docs): fix liquid syntax
* Problem: can't use anonymous S3 credentials
* hack: remove build_ci_first_pass script
* hack: binaries and cross bake targets
* go.mod: update to go 1.20
* Dockerfile: CONTAINERD_VERSION=v1.7.0
* go.mod: github.com/containerd/containerd v1.7.0
* Add Namespace to list of buildkit users.
* remove buildinfo
* buildinfo: add BUILDKIT_BUILDINFO build arg
* buildinfo: mark as deprecated
* docs: deprecated features page
* rootless: guide for Bottlerocket OS (`sysctl -w user.max_user_namespaces=N`)
* rootless: fix up unprivileged mount opts
* Dockerfile: CONTAINERD_VERSION=v1.7.0-rc.3, CONTAINERD_ALT_VERSION_16=v1.6.19
* go.mod: github.com/containerd/containerd v1.7.0-rc.3
* version: add "v" prefix to version for tagging convention consistency
* remove context name validation from kubepod connhelper
* gateway: add hostname option to NewContainer API
* fix error message typo
* provenance: ensure URLs are redacted before written
* test/client: Close buildkit client
* docs: missing security policy markdown file
* diffapply: do chown before xattrs
* Add test for merge of files with capabilities.
* fix a possible panic on cache
* Update cmd/buildkitd/main_windows.go
* ci(validate): use bake
* hack: shfmt bake target
* hack: generated-files bake target
* hack: doctoc bake target
* hack: lint bake target
* hack: authors Dockerfile and bake target
* hack: bake definition with vendor targets
* Fix buildkitd panic when frontend input is nil.
* ci: trigger workflows on push to release branches
* build(deps): bump golang.org/x/net from 0.5.0 to 0.7.0
* ci: create GitHub Release for frontend as well
* ci: make release depends on image job
* lint: fix issues with go 1.20
* remove deprecated golangci-lint linters
* update golangci-lint to v1.51.1
* update to go 1.20
* Allow DefinitionOp to track sources
* specify a `ResponseHeaderTimeout` value
* Ensures that the primary GID is also included in the additional GIDs
* ci: fix missing TESTFLAGS env var in test-os workflow
* Dockerfile: update containerd to v1.7.0-beta.4, v1.6.18
* go.mod: github.com/containerd/containerd v1.7.0-beta.4
* ci: update softprops/action-gh-release to v0.1.15
* ci: remove unused vars in dockerd workflow
* ci: split cross job
* Dockerfile: remove binaries-linux-helper stage
* ci: rename unclear env vars
* readme: fix and update badges
* ci: rename build workflow to buildkit
* ci: reusable test workflow
* ci: move test-os to a dedicated workflow
* ci: move frontend integration tests and build to a dedicated workflow
* stargz-snapshotter: graduate from experimental
* Bump up stargz-snapshotter to v0.14.1
* set osversion in index descriptor from base image
* progress: solve status description
* ci: update buildx to latest
* Dockerfile: update xx to 1.2.1
* integration: make sure registry directory exists
* gha: avoid range requests with too big offset
* ci: merge test-nydus job in test one
* ci: remove branch restriction on pull request event
* client: add tests for layerID in comment field
* exporter: fix sbom supplement core detection
* exporter: fix supplement sboms on empty scratch layer
* exporter: fix file layer finder whiteout detection
* exporter: canonicalize sbom file paths during search
* Add platform tracing socket paths and mounts
* integration: log dockerd cmd
* integration: set custom flags for dockerd worker
* remotecache: proper exporter naming for gha, s3 and azblob
* remotecache: explicit names for registry and local
* exporter: use compression.ParseAttributes func
* remotecache: mutualize compression parsing attrs
* lex: add support for optional colon in variable expansion
* test: rework TestProcessWithMatches to use a matrix
* dockerfile: update to use dockerui pkg
* dockerui: separate docker frontend params to reusable package
* cache: add fallback for snapshotID
* exporter: remove wrappers for oci data types
* vendor: github.com/docker/cli v23.0.0
* vendor: github.com/docker/docker v23.0.0
* hack: do not cache some stages on release
* hack: do not set attest flags when exporting to docker
* git: override the locale to ensure consistent output
* fix support for empty git ref with subdir
* gitutil: use subtests
* source: more tests cases for git identifier
* source: use subtests cases for git identifier
* otel: bump dependencies to v1.11.2/v0.37.0
* hack: treat unset variables as an error
* frontend: fix typo in release script
* ci: create matrix for building frontend image
* inline cache: fix blob indexes by uncompressed digest
* Skip configuring cache exporter if it is nil.
* docs: update syntax for labs channel in examples
* integration: remove wrong compat condition
* integration: fix compat check for CNI DNS test
* cache: don’t link blobonly based on chainid
* do not mount secrets that are optional and missing from solve opts
* SOURCE_DATE_EPOCH: drop timezone
* sbom: create tmp directory for scanner image
* progress: keep color enabled with NO_COLOR empty
* hack: remove azblob_test
* integration: basic azblob cache test
* test: add proxy build args when existed
* vendor: github.com/docker/cli v23.0.0-rc.3
* vendor: github.com/docker/docker v23.0.0-rc.3
* vendor: golang.org/x/net v0.5.0
* vendor: golang.org/x/text v0.6.0
* vendor: golang.org/x/sys v0.4.0
* Dockerfile: CNI plugins v1.2.0
* Dockerfile: CONTAINERD_VERSION=v1.7.0-beta.3, CONTAINERD_ALT_VERSION_16=v1.6.16
* Fix tracing listener on Windows
* go.mod: github.com/containerd/containerd v1.7.0-beta.3
* control: send current timestamp header with event streams
* vendor: update containerd to v1.6.16-0.1709cfe273d9
* buildctl: add ref-file to get history record for a build
* client: make sure ref is configurable for the history API
* history: save completed steps with cache stats
* history: fix exporter key not being passed
* history: fix logs and traces are saving on canceled builds
* hack: add correct entrypoint to shell script
* ci: use moby/buildkit:latest in build action
* dockerfile: add testReproSourceDateEpoch
* Fix cache cannot reuse lazy layers
* Correct manifests_prefix documentation for S3 cache
* Use golang.org/x/sys/windows instead of syscall
* dockerfile: release frontend for i386 platform
* Add get-user-info utility
* optimize --dry-run flag
* fix(tracing): spelling of OTEL_TRACES_EXPORTER value
* Propagate sshforward send side connection close
* buildctl: add `buildctl debug histories, buildctl prune-histories`
* dockerfile: fix panic on warnings with multi-platform
* vendor: github.com/docker/cli v23.0.0-rc.2
* vendor: github.com/docker/docker v23.0.0-rc.2
* vendor: github.com/containerd/containerd v1.6.15
* cache: add registry.insecure option to registry exporter
* Make local cache non-lazy
* docs/build-repro.md: add the SOURCE_DATE_EPOCH section
* docs: clarified build argument example by changing the variable name
* azblob cache: account_name attribute
* docs: master -> 0.11
* ci: fix dockerd workflow with latest changes from moby
* integration: set mirrors and entitlements with dockerd worker
* github: update CI to buildkit version
* exporter: ensure spdx order prioritizes primary sbom
* hack: remove s3_test
* integration: basic s3 cache test
* integration: add runCmd and randomString utils
* integration: expose backend logs in sandbox interface
* azblob_test: pin busybox to avoid "Illegal instruction" error
* docs: add nerdctl container buildkitd address docs
* feat: add namespace support for nerdctl container
* ci: add ci to check README toc
* testutil: pin busybox and alpine used in releases
* exporter: allow configuring inline attestations for image exporters
* exporter: force enabling inline attestations for image export
* docs: change semicolons to double ampersands
* llbsolver: fix panic when requesting provenance on nil result
* vendor: update fsutil to fb43384
* attestation: only supplement file data for the core scan
* docs: add index page for attestations
* docs: move attestation docs to dedicated directory
* docs: rename slsa.md to slsa-provenance.md
* docs: tidy up json examples for slsa definitions
* docs: add cross-linking between slsa pages
* Flakiness in azblob test job
* vendor: update spdx/tools-golang to d6f58551be3f
* feat: add nerdctl-container support for client
* docs: slsa review updates
* docs: moved slsa definitions to a separate page
* docs: slsa editorial fixes
* docs: add filename to provenance attestation
* docs: update hermetic field after it was moved in implementation
* docs: update provenance docs
* docs: add slsa provenance documentation
* progress: fix clean context cancelling
* fix: updated_at -> updated-at
* Solve panic due to concurrent access to ExportSpans
* feat: allow ignoring remote cache-export error if failing
* add cache stats to the build history API
* vendor: github.com/docker/cli v23.0.0-rc.1
* vendor: github.com/docker/docker v23.0.0-rc.1
* vendor: github.com/containerd/containerd v1.6.14
* frontend: fix testMultiStageImplicitFrom to account for busybox changes
* sshforward: skip conn close on stream CloseSend.
* chore: update buildkitd.toml docs with mirror path example
* feat: handle mirror url with path
* provenance: fix the order of the build steps
* provenance: move hermetic field into a correct struct
* add possibility to override filename for provenance
* Fix typo in CapExecMountBindReadWriteNoOutput.
* Use SkipOutput instead of -1 for output indexes to clarify semantics.
* fix indentation for in-toto and traces
* attestation: forbid provenance attestations from frontend
* attestation: validate attestations before unbundling as well
* exporter: make attestation validation public
* result: change reason types to strings
* attestations: ignore spdx parse errors
* attestations: propogate metadata through unbundling
* gateway: add addition check to prevent content func from being forwarded
* ociindex: add utility method for getting a single manifest from the index
* ociindex: refactor to hide implementation internally
* cache: test gha cache exporter
* containerdexecutor: add network namespace callback
* frontend/dockerfile: BFlags.Parse(): use strings.Cut()
* frontend/dockerfile: parseExtraHosts(): use strings.Cut()
* frontend/dockerfile: parseMount() use strings.Cut(), and some minor cleanup
* frontend/dockerfile: move check for cache-sharing
* frontend/dockerfile: provide suggestions for mount share mode
* frontend/dockerfile: define types for enums
* frontend/dockerfile/shell: use strings.Equalfold
* frontend/dockerfile/parser: remove redundant concat
* frontend/dockerfile: parseBuildStageName(): pre-compile regex
* frontend/dockerfile: remove isSSHMountsSupported, isSecretMountsSupported
* docs: Enable rootless for stargz-snapshotter
* executor/oci: GetResolvConf(): simplify handling of resolv.conf
Patchnames
SUSE-SLE-Micro-6.0-156
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for buildkit", "title": "Title of the patch" }, { "category": "description", "text": "This update for buildkit fixes the following issues:\n\n- Update to version 0.12.5:\n * update runc to v1.1.12\n * exec: add extra validation for submount sources (fixes CVE-2024-23651, bsc#1219267)\n * oci: fix error handling on submount calls\n * executor: recheck mount stub path within root after container run (fixes CVE-2024-23652, bsc#1219268)\n * llbsolver: make sure interactive container API validates entitlements (fixes CVE-2024-23653, bsc#1219438)\n * gateway: pass executor with build and not access worker directly\n * pb: add extra validation to protobuf types\n * sourcepolicy: add validations for nil values\n * exporter: add validation for platforms key value\n * exporter: add validation for invalid platorm\n * exporter: validate null config metadata from gateway\n * ci: disable push if not upstream repo\n * hack: use git context only for upstream repo\n * hack/test: allow ALPINE_VERSION to be set from env\n * hack: align syntax\n * vendor: github.com/cyphar/filepath-securejoin v0.2.4\n * tracing: allow the `Resource` to be set externally\n\n- Update to version 0.12.4:\n * Fix possible concurrent map access on remote cache export\n * Fix hang on debug server listener\n * Fix possible deadlock in History API under high number of parallel builds\n * Fix possible panic on handling deleted records in History API\n * Fix possible data corruption in zstd library\n\n- Update to version 0.12.3:\n * Fix possible duplicate source files in provenance attestation for chained builds\n * Fix possible negative step time in progressbar for step shared with other build request\n * Fix properly closing history and cache DB on shutdown to avoid corruption\n * Fix incorrect error handling for invalid HTTP source URLs\n * Fix fallback cases for ambiguous insecure configuration provided for registry used as push target.\n * Fix possible data race with parallel image config resolves\n * Fix regression in v0.12 for clients waiting on buildkitd to become available\n * Fix Cgroup NS handling for hosts supporting only CgroupV1\n\n- Update to version 0.12.2:\n * Fix possible discarded network error when exporting result to client\n * Avoid unnecessary memory allocations when writing build progress\n\n- Update to version 0.12.1:\n * executor: fix resource sampler goroutine leak\n * [v0.11] make tracing socket forward error non-fatal\n * integration: missing env var to check feature compat\n * test: update pinned busybox image to 1.36\n * test: update pinned alpine image to 3.18\n * vendor: github.com/docker/docker 8e51b8b59cb8 (master, v25.0.0-dev)\n * executor/resource: stub out NewSysSampler on Windows\n * vendor: github.com/docker/cli v24.0.4\n * testutil: move CheckContainerdVersion to a separate package\n * llbsolver: fix policy rule ordering\n * filesync: fix backward compatibility with encoding + and %\n * hack: allow to set GO_VERSION during tests\n * test: always disable tls for dockerd worker\n * buildctl: set max backoff delay to 1 second\n * contenthash: data race\n * filesync: escape special query characters\n * applier: add hack to support docker zstd layers\n * Fix various nits\n * pullprogress data race\n * use sampler lock instead\n * Fix ResolveImageConfig to evaluate source policy\n * sampler data race fix\n * update cgroup parent test to work with cgroupns\n * Revert \"specify a `ResponseHeaderTimeout` value\"\n * oci: make sure cgroupns is enabled if supported\n * bash lint fix\n * rename BUILDFLAGS to GOBUILDFLAGS\n * allow ENOTSUP for PSI cgroup files\n * containerimage: use platform matcher to detect platform to unpack\n * exporter: silently skip unpacking unknown reference\n * improve error handling in ReadFile\n * dockerfile: arg for controlling go build flags\n * dockerfile: arg to enable go race detection\n * Add support for health start interval\n * Re-vendor moby/moby\n * filesync: mark if options have been encoded to detect old versions\n * dockerfile: heredoc should use 0644 permissions\n * docs: update README to reference OpenTelemetry instead of OpenTracing\n * gateway: restore original filename in ReadFile error message\n * Dockerfile: update containerd to v1.7.2\n * Use system.ToSlash() instead of filepath.ToSlash()\n * Revert most changes to client/llb\n * Remove Architecture\n * Default to linux in client\n * Ensure we use proper path separators\n * Set default platform\n * Add nil pointer check in dispatchWorkdir\n * Remove nil pointer check and extra NormalizePath\n * Rename variable, remove superfluous check\n * Use current OS as a default\n * Handle file paths base on target platform\n * exporter: unlazy references in parallel\n * exporter: simplify unlazy references to reduce duplication\n * exporter: allow unpack on multi-platform images\n * tests: add unpack to scratch export test\n * overlay: set whiteout timestamps to 1970-01-01 (not to SOURCE_DATE_EPOCH)\n * dockerfile: graduate `ADD --checksum=\u003cchecksum\u003e` from labs\n * dockerfile: graduate `ADD \u003cgit ref\u003e` from labs\n * dockerfile: mod-outdated target to check modules updates\n * dockerfile: use xx in dnsname stage\n * dockerfile: install musl-dev to fix compilation issue\n * dockerfile: update Alpine to 3.18\n * vendor: update fsutil to 36ef4d8\n * export(local): split opt\n * buildctl: Provide --wait option\n * containerimage: support SOURCE_DATE_EPOCH for CreatedAt\n * move flightcontrol to use generics\n * containerimage: keep layer labels for exported images\n * shell: start shell from cmd, not entrypoint\n * sbom: propogate image-resolve-mode for generator image\n * client: add extra debug to tests\n * handle missing provenance for non-evaluated result\n * tests: add provenance test for duplicate platform\n * tests: add provenance test for when context directory does not exist\n * forward: make BridgeClient public for lint\n * gateway: enable named contexts for gateway frontend\n * vendor: update vt100 with resize panic fix\n * docs: dockerfile: remove \"known issues\" related to AuFS\n * docs: add running instruction to CONTRIBUTING.md\n * tests: add worker close method to interface\n * add and check for gateway.exec.secretenv cap\n * move Secretenv from Meta to InitMessage\n * support passing SecretEnv to gateway containers\n * Add comment, update from review\n * Fix issue with digest merge (inconsistent graph state)\n * docs: add helper commands section to CONTRIBUTING.md\n * docs: update CONTRIBUTING.md whitespace formatting\n * integration: fix not deleting dockerd workdir\n * remove uses of deprecated ResolverOptions.Client\n * filesync: fix handling non-ascii in file paths\n * tests: add test for unicode filenames\n * Adding more docs to client/llb\n * Add special case for rw bind mounts\n * vendor: github.com/docker/cli v24.0.2\n * vendor: github.com/docker/docker v24.0.2\n * progressui: fix index printing on partial rows\n * gateway: wrap ExecProcessServer Send calls with a mutex\n * resources: make maxsamples configurable\n * llbsolver: add systemusage samples to provenance attestation\n * resources: store sys cpu usage per step\n * resources: add sampler for periodic stat reads\n * resources: CNI network usage sampling support\n * resources: add build step resource tracking via cgroups\n * solver: lock before using actives\n * Emulate \"bind\" mounts using the bind filter\n * Fix mount layers on host\n * llbsolver: set temporary lease in Commit context\n * Update containerd dependency\n * exporter: Add exptypes with Common exporter keys\n * exporter/image/exptypes: Make strongly typed\n * solver: move AddBuildConfig into llbsolver package\n * tests: add test to check url format for image loaded from oci layout\n * solver: mark locally loaded images as such\n * solver: merge local and remote images into single list\n * purl: allow RefToPURL to take a type parameter\n * tests: don\u0027t use purl code to test itself\n * Use linux as a default for inputOS\n * Add path handling functions\n * response to comments\n * containerimage: Export option keys\n * vendor: update spdx/tools-golang to v0.5.1\n * exporter: remove non dist options from tar exporter\n * exporter: move fs opt parsing to method\n * tests: fixup attestation tar to not panic when file not found\n * git: set umask without reexec\n * add language property for sourcemap\n * dockerfile/docs: add set -ex to heredoc #3870\n * authprovider: fix a bug where registry-1.docker.io auth was always a cache miss\n * response to comments\n * tracing: fix buildx tracing delegation\n * Update continuity and fsutil\n * cache: add a few more fields to ref trace logs.\n * vendor: github.com/containerd/go-runc v1.1.0\n * provenance: fix possible empty digest access\n * vendor: fix broken vendoring\n * dockerfile: bump up nerdctl to v1.4.0\n * bump nydus-snapshotter dependence to v0.8.2\n * vendor: github.com/docker/cli v24.0.1\n * vendor: github.com/docker/docker v24.0.1\n * vendor: github.com/containerd/containerd v1.7.1\n * vendor: github.com/Microsoft/hcsshim v0.10.0-rc.8\n * vendor: github.com/Microsoft/go-winio v0.6.1\n * vendor: golang.org/x/sys v0.7.0\n * vendor: github.com/containerd/typeurl/v2 v2.1.1\n * chore: bump spdx tools\n * Fix typo in attestation-storage.md\n * vendor: github.com/docker/cli v24.0.0\n * vendor: github.com/docker/docker v24.0.0\n * vendor: github.com/opencontainers/runc v1.1.7\n * vendor: github.com/opencontainers/runtime-spec v1.1.0-rc.2\n * vendor: github.com/klauspost/compress v1.16.3\n * Dockerfile: CONTAINERD_VERSION=v1.7.1\n * Dockerfile: CONTAINERD_ALT_VERSION_16=v1.6.21\n * Dockerfile: RUNC_VERSION=v1.1.7\n * session: avoid logging healthcheck error on canceled connection\n * session: fix run and close synchronization\n * testutil: update ReadImages to fallback to reading manifest\n * Add trace logs for cache leaks.\n * Add some doc strings for LLB functions\n * attestations: move containerd media type warnings\n * update generated proto files\n * attestations: replace intoto media type with vendored const\n * nydus: bump nydus versions in Dockerfile and doc\n * feedback changes for moby/buildkit #2251\n * testutil: expose underlying docker address for supported workers\n * testutil: expose integration workers as public\n * remove type aliases for leasemanager/contentstore\n * llbsolver: move history blobs to a separate namespace\n * build(deps): bump github.com/docker/distribution\n * added import/export support for OCI compatible image manifest version of cache manifest (opt-in on export, inferred on import) moby/buildkit #2251\n * llb: carry platform from inputs for merge/diff\n * llb: don\u0027t include platform in fileop\n * control: fix possible deadlock on network error\n * exporter/containerimage: remove redundant type for var declaration\n * Fix not to set the value on empty vertex\n * Fix to import as digest\n * cache: always release ref when getting size in usage.\n * Drop unneeded variable\n * ssh: add fallback to ensure conn is closed in all cases.\n * vendor: github.com/opencontainers/image-spec v1.1.0-rc3\n * vendor: github.com/docker/cli v23.0.5\n * vendor: github.com/docker/docker v23.0.5\n * nydus: update nydus-snapshotter dependency to v0.8.0\n * progressui: fix possible zero prefix numbers in logs\n * llbsolver: send active event only to current client\n * llbsolver: send delete status event\n * llbsolver: filter out records marked deleted from list responses\n * Add Windows service support\n * docs: fixup build repro doc with updated policy format\n * test: use appropriate snapshotter service to walk snapshots\n * overlay: use function to check for overlay-based mounts\n * Update uses of Image platform fields in OCI image-spec\n * allow setting user agent products\n * Bump up golangci-lint to v1.52.2\n * chore: tidy up duplicated imports\n * solver: Release unused refs in LoadWithParents\n * Avoid panic on parallel walking on DefinitionOp\n * solver: skip sbom post processor if result is nil\n * vendor: github.com/docker/docker v23.0.4\n * vendor: github.com/docker/cli v23.0.4\n * vendor: golang.org/x/time v0.3.0\n * vendor: github.com/docker/cli v23.0.2\n * vendor: github.com/docker/docker v23.0.2\n * test: don\u0027t hang if a process doesn\u0027t run\n * ci: put worker name first for better UX in actions\n * go.mod: remove github.com/kr/pretty\n * Revert \"Problem: can\u0027t use anonymous S3 credentials\"\n * go.mod: bump up runc to v1.1.6\n * go.mod: Bump up stargz-snapshotter to v0.14.3\n * dockerfile: bump up stargz-snapshotter to v0.14.3\n * dockerfile: bump up runc to v1.1.6\n * buildkitd: add grpc reflection\n * Bump up nerdctl to 1.3.0\n * Bump up containerd 1.6.20\n * Fix gzip decoding of HTTP sources.\n * ci: update runner os to ubuntu 22.04\n * Fix bearer token expiration check (fixes #3779)\n * docs: update buildkitd.toml with new field info\n * buildkitd: allow durations for gc config\n * buildkitd: allow multiple units for gc config\n * dockerui: expose context detection functions as public\n * Prevent overflow of runc exit code.\n * Upgrade to latest go-runc.\n * runc worker: fix sigkill handling\n * Dockerfile: RUNC_VERSION=v1.1.5\n * client: add client opts to enable system certificates\n * Make ClientOpts type safe\n * build(deps): bump github.com/opencontainers/runc from 1.1.4 to 1.1.5\n * fileop: create new fileOpSolver instance per Exec call\n * Provide CacheManager to Controller instead of CacheKeyManager.\n * http: ensure HEAD and GET requests have same headers\n * docs: add auto-generated sections to buildctl.md\n * client: allow grpc dial option passthrough\n * cni: simplify netns creation\n * add Bass to list of LLB languages\n * llbsolver: fix sorting of history records\n * llbsolver: Fix performance of recomputeDigests\n * solve: use comparables instead of reflection in result struct\n * vendor: github.com/docker/cli v23.0.1\n * vendor: github.com/docker/docker v23.0.1\n * client: create oci-layout file in StoreIndex\n * ci: output annotations for failures\n * test: set mod vendor\n * test: use gotestsum to generate reports\n * fix gateway exec tty cleanup on context.Canceled\n * fix process termination handling for runc exec\n * Register builds before recording build history\n * docs(dockerfile): minimal Dockerfile version support for chmod\n * Update builder.md to document newly supported --chmod features in both ADD and COPY statements.\n * use bklog.G(ctx) instead of logrus directly\n * integration: missing mergeDiff compat check\n * chore: `translateLegacySolveRequest` does not need to return error checking.\n * integration: split feature compat check for subtests\n * integration: missing feature compat check for cache\n * dockerfile: fix reproducible digest test for non-amd64\n * integration: add FeatureMergeDiff compat\n * integration: add FeatureCacheBackend* compat\n * integration: enforce features compat through env vars\n * ci: upstream docs conformance validation\n * dockerfile(docs): fix liquid syntax\n * Problem: can\u0027t use anonymous S3 credentials\n * hack: remove build_ci_first_pass script\n * hack: binaries and cross bake targets\n * go.mod: update to go 1.20\n * Dockerfile: CONTAINERD_VERSION=v1.7.0\n * go.mod: github.com/containerd/containerd v1.7.0\n * Add Namespace to list of buildkit users.\n * remove buildinfo\n * buildinfo: add BUILDKIT_BUILDINFO build arg\n * buildinfo: mark as deprecated\n * docs: deprecated features page\n * rootless: guide for Bottlerocket OS (`sysctl -w user.max_user_namespaces=N`)\n * rootless: fix up unprivileged mount opts\n * Dockerfile: CONTAINERD_VERSION=v1.7.0-rc.3, CONTAINERD_ALT_VERSION_16=v1.6.19\n * go.mod: github.com/containerd/containerd v1.7.0-rc.3\n * version: add \"v\" prefix to version for tagging convention consistency\n * remove context name validation from kubepod connhelper\n * gateway: add hostname option to NewContainer API\n * fix error message typo\n * provenance: ensure URLs are redacted before written\n * test/client: Close buildkit client\n * docs: missing security policy markdown file\n * diffapply: do chown before xattrs\n * Add test for merge of files with capabilities.\n * fix a possible panic on cache\n * Update cmd/buildkitd/main_windows.go\n * ci(validate): use bake\n * hack: shfmt bake target\n * hack: generated-files bake target\n * hack: doctoc bake target\n * hack: lint bake target\n * hack: authors Dockerfile and bake target\n * hack: bake definition with vendor targets\n * Fix buildkitd panic when frontend input is nil.\n * ci: trigger workflows on push to release branches\n * build(deps): bump golang.org/x/net from 0.5.0 to 0.7.0\n * ci: create GitHub Release for frontend as well\n * ci: make release depends on image job\n * lint: fix issues with go 1.20\n * remove deprecated golangci-lint linters\n * update golangci-lint to v1.51.1\n * update to go 1.20\n * Allow DefinitionOp to track sources\n * specify a `ResponseHeaderTimeout` value\n * Ensures that the primary GID is also included in the additional GIDs\n * ci: fix missing TESTFLAGS env var in test-os workflow\n * Dockerfile: update containerd to v1.7.0-beta.4, v1.6.18\n * go.mod: github.com/containerd/containerd v1.7.0-beta.4\n * ci: update softprops/action-gh-release to v0.1.15\n * ci: remove unused vars in dockerd workflow\n * ci: split cross job\n * Dockerfile: remove binaries-linux-helper stage\n * ci: rename unclear env vars\n * readme: fix and update badges\n * ci: rename build workflow to buildkit\n * ci: reusable test workflow\n * ci: move test-os to a dedicated workflow\n * ci: move frontend integration tests and build to a dedicated workflow\n * stargz-snapshotter: graduate from experimental\n * Bump up stargz-snapshotter to v0.14.1\n * set osversion in index descriptor from base image\n * progress: solve status description\n * ci: update buildx to latest\n * Dockerfile: update xx to 1.2.1\n * integration: make sure registry directory exists\n * gha: avoid range requests with too big offset\n * ci: merge test-nydus job in test one\n * ci: remove branch restriction on pull request event\n * client: add tests for layerID in comment field\n * exporter: fix sbom supplement core detection\n * exporter: fix supplement sboms on empty scratch layer\n * exporter: fix file layer finder whiteout detection\n * exporter: canonicalize sbom file paths during search\n * Add platform tracing socket paths and mounts\n * integration: log dockerd cmd\n * integration: set custom flags for dockerd worker\n * remotecache: proper exporter naming for gha, s3 and azblob\n * remotecache: explicit names for registry and local\n * exporter: use compression.ParseAttributes func\n * remotecache: mutualize compression parsing attrs\n * lex: add support for optional colon in variable expansion\n * test: rework TestProcessWithMatches to use a matrix\n * dockerfile: update to use dockerui pkg\n * dockerui: separate docker frontend params to reusable package\n * cache: add fallback for snapshotID\n * exporter: remove wrappers for oci data types\n * vendor: github.com/docker/cli v23.0.0\n * vendor: github.com/docker/docker v23.0.0\n * hack: do not cache some stages on release\n * hack: do not set attest flags when exporting to docker\n * git: override the locale to ensure consistent output\n * fix support for empty git ref with subdir\n * gitutil: use subtests\n * source: more tests cases for git identifier\n * source: use subtests cases for git identifier\n * otel: bump dependencies to v1.11.2/v0.37.0\n * hack: treat unset variables as an error\n * frontend: fix typo in release script\n * ci: create matrix for building frontend image\n * inline cache: fix blob indexes by uncompressed digest\n * Skip configuring cache exporter if it is nil.\n * docs: update syntax for labs channel in examples\n * integration: remove wrong compat condition\n * integration: fix compat check for CNI DNS test\n * cache: don\u2019t link blobonly based on chainid\n * do not mount secrets that are optional and missing from solve opts\n * SOURCE_DATE_EPOCH: drop timezone\n * sbom: create tmp directory for scanner image\n * progress: keep color enabled with NO_COLOR empty\n * hack: remove azblob_test\n * integration: basic azblob cache test\n * test: add proxy build args when existed\n * vendor: github.com/docker/cli v23.0.0-rc.3\n * vendor: github.com/docker/docker v23.0.0-rc.3\n * vendor: golang.org/x/net v0.5.0\n * vendor: golang.org/x/text v0.6.0\n * vendor: golang.org/x/sys v0.4.0\n * Dockerfile: CNI plugins v1.2.0\n * Dockerfile: CONTAINERD_VERSION=v1.7.0-beta.3, CONTAINERD_ALT_VERSION_16=v1.6.16\n * Fix tracing listener on Windows\n * go.mod: github.com/containerd/containerd v1.7.0-beta.3\n * control: send current timestamp header with event streams\n * vendor: update containerd to v1.6.16-0.1709cfe273d9\n * buildctl: add ref-file to get history record for a build\n * client: make sure ref is configurable for the history API\n * history: save completed steps with cache stats\n * history: fix exporter key not being passed\n * history: fix logs and traces are saving on canceled builds\n * hack: add correct entrypoint to shell script\n * ci: use moby/buildkit:latest in build action\n * dockerfile: add testReproSourceDateEpoch\n * Fix cache cannot reuse lazy layers\n * Correct manifests_prefix documentation for S3 cache\n * Use golang.org/x/sys/windows instead of syscall\n * dockerfile: release frontend for i386 platform\n * Add get-user-info utility\n * optimize --dry-run flag\n * fix(tracing): spelling of OTEL_TRACES_EXPORTER value\n * Propagate sshforward send side connection close\n * buildctl: add `buildctl debug histories, buildctl prune-histories`\n * dockerfile: fix panic on warnings with multi-platform\n * vendor: github.com/docker/cli v23.0.0-rc.2\n * vendor: github.com/docker/docker v23.0.0-rc.2\n * vendor: github.com/containerd/containerd v1.6.15\n * cache: add registry.insecure option to registry exporter\n * Make local cache non-lazy\n * docs/build-repro.md: add the SOURCE_DATE_EPOCH section\n * docs: clarified build argument example by changing the variable name\n * azblob cache: account_name attribute\n * docs: master -\u003e 0.11\n * ci: fix dockerd workflow with latest changes from moby\n * integration: set mirrors and entitlements with dockerd worker\n * github: update CI to buildkit version\n * exporter: ensure spdx order prioritizes primary sbom\n * hack: remove s3_test\n * integration: basic s3 cache test\n * integration: add runCmd and randomString utils\n * integration: expose backend logs in sandbox interface\n * azblob_test: pin busybox to avoid \"Illegal instruction\" error\n * docs: add nerdctl container buildkitd address docs\n * feat: add namespace support for nerdctl container\n * ci: add ci to check README toc\n * testutil: pin busybox and alpine used in releases\n * exporter: allow configuring inline attestations for image exporters\n * exporter: force enabling inline attestations for image export\n * docs: change semicolons to double ampersands\n * llbsolver: fix panic when requesting provenance on nil result\n * vendor: update fsutil to fb43384\n * attestation: only supplement file data for the core scan\n * docs: add index page for attestations\n * docs: move attestation docs to dedicated directory\n * docs: rename slsa.md to slsa-provenance.md\n * docs: tidy up json examples for slsa definitions\n * docs: add cross-linking between slsa pages\n * Flakiness in azblob test job\n * vendor: update spdx/tools-golang to d6f58551be3f\n * feat: add nerdctl-container support for client\n * docs: slsa review updates\n * docs: moved slsa definitions to a separate page\n * docs: slsa editorial fixes\n * docs: add filename to provenance attestation\n * docs: update hermetic field after it was moved in implementation\n * docs: update provenance docs\n * docs: add slsa provenance documentation\n * progress: fix clean context cancelling\n * fix: updated_at -\u003e updated-at\n * Solve panic due to concurrent access to ExportSpans\n * feat: allow ignoring remote cache-export error if failing\n * add cache stats to the build history API\n * vendor: github.com/docker/cli v23.0.0-rc.1\n * vendor: github.com/docker/docker v23.0.0-rc.1\n * vendor: github.com/containerd/containerd v1.6.14\n * frontend: fix testMultiStageImplicitFrom to account for busybox changes\n * sshforward: skip conn close on stream CloseSend.\n * chore: update buildkitd.toml docs with mirror path example\n * feat: handle mirror url with path\n * provenance: fix the order of the build steps\n * provenance: move hermetic field into a correct struct\n * add possibility to override filename for provenance\n * Fix typo in CapExecMountBindReadWriteNoOutput.\n * Use SkipOutput instead of -1 for output indexes to clarify semantics.\n * fix indentation for in-toto and traces\n * attestation: forbid provenance attestations from frontend\n * attestation: validate attestations before unbundling as well\n * exporter: make attestation validation public\n * result: change reason types to strings\n * attestations: ignore spdx parse errors\n * attestations: propogate metadata through unbundling\n * gateway: add addition check to prevent content func from being forwarded\n * ociindex: add utility method for getting a single manifest from the index\n * ociindex: refactor to hide implementation internally\n * cache: test gha cache exporter\n * containerdexecutor: add network namespace callback\n * frontend/dockerfile: BFlags.Parse(): use strings.Cut()\n * frontend/dockerfile: parseExtraHosts(): use strings.Cut()\n * frontend/dockerfile: parseMount() use strings.Cut(), and some minor cleanup\n * frontend/dockerfile: move check for cache-sharing\n * frontend/dockerfile: provide suggestions for mount share mode\n * frontend/dockerfile: define types for enums\n * frontend/dockerfile/shell: use strings.Equalfold\n * frontend/dockerfile/parser: remove redundant concat\n * frontend/dockerfile: parseBuildStageName(): pre-compile regex\n * frontend/dockerfile: remove isSSHMountsSupported, isSecretMountsSupported\n * docs: Enable rootless for stargz-snapshotter\n * executor/oci: GetResolvConf(): simplify handling of resolv.conf\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Micro-6.0-156", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20107-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:20107-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520107-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:20107-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021214.html" }, { "category": "self", "summary": "SUSE Bug 1219267", "url": "https://bugzilla.suse.com/1219267" }, { "category": "self", "summary": "SUSE Bug 1219268", "url": "https://bugzilla.suse.com/1219268" }, { "category": "self", "summary": "SUSE Bug 1219438", "url": "https://bugzilla.suse.com/1219438" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23651 page", "url": "https://www.suse.com/security/cve/CVE-2024-23651/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23652 page", "url": "https://www.suse.com/security/cve/CVE-2024-23652/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23653 page", "url": "https://www.suse.com/security/cve/CVE-2024-23653/" } ], "title": "Security update for buildkit", "tracking": { "current_release_date": "2025-02-03T09:18:59Z", "generator": { "date": "2025-02-03T09:18:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:20107-1", "initial_release_date": "2025-02-03T09:18:59Z", "revision_history": [ { "date": "2025-02-03T09:18:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "buildkit-0.12.5-1.1.aarch64", "product": { "name": "buildkit-0.12.5-1.1.aarch64", "product_id": "buildkit-0.12.5-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "buildkit-0.12.5-1.1.s390x", "product": { "name": "buildkit-0.12.5-1.1.s390x", "product_id": "buildkit-0.12.5-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildkit-0.12.5-1.1.x86_64", "product": { "name": "buildkit-0.12.5-1.1.x86_64", "product_id": "buildkit-0.12.5-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Micro 6.0", "product": { "name": "SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0", "product_identification_helper": { "cpe": "cpe:/o:suse:sl-micro:6.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "buildkit-0.12.5-1.1.aarch64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.aarch64" }, "product_reference": "buildkit-0.12.5-1.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "buildkit-0.12.5-1.1.s390x as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.s390x" }, "product_reference": "buildkit-0.12.5-1.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "buildkit-0.12.5-1.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.x86_64" }, "product_reference": "buildkit-0.12.5-1.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-23651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23651" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.aarch64", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.s390x", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23651", "url": "https://www.suse.com/security/cve/CVE-2024-23651" }, { "category": "external", "summary": "SUSE Bug 1219267 for CVE-2024-23651", "url": "https://bugzilla.suse.com/1219267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.aarch64", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.s390x", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.aarch64", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.s390x", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T09:18:59Z", "details": "important" } ], "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23652" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.aarch64", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.s390x", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23652", "url": "https://www.suse.com/security/cve/CVE-2024-23652" }, { "category": "external", "summary": "SUSE Bug 1219268 for CVE-2024-23652", "url": "https://bugzilla.suse.com/1219268" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.aarch64", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.s390x", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.aarch64", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.s390x", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T09:18:59Z", "details": "moderate" } ], "title": "CVE-2024-23652" }, { "cve": "CVE-2024-23653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23653" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.aarch64", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.s390x", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23653", "url": "https://www.suse.com/security/cve/CVE-2024-23653" }, { "category": "external", "summary": "SUSE Bug 1219438 for CVE-2024-23653", "url": "https://bugzilla.suse.com/1219438" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.aarch64", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.s390x", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.aarch64", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.s390x", "SUSE Linux Micro 6.0:buildkit-0.12.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T09:18:59Z", "details": "important" } ], "title": "CVE-2024-23653" } ] }
suse-su-2024:0586-1
Vulnerability from csaf_suse
Published
2024-02-22 08:54
Modified
2024-02-22 08:54
Summary
Security update for docker
Notes
Title of the patch
Security update for docker
Description of the patch
This update for docker fixes the following issues:
Vendor latest buildkit v0.11 including bugfixes for the following:
* CVE-2024-23653: BuildKit API doesn't validate entitlement on container creation (bsc#1219438).
* CVE-2024-23652: Fixed arbitrary deletion of files (bsc#1219268).
* CVE-2024-23651: Fixed race condition in mount (bsc#1219267).
Patchnames
SUSE-2024-586,SUSE-SLE-Micro-5.3-2024-586,SUSE-SLE-Micro-5.4-2024-586,SUSE-SLE-Micro-5.5-2024-586,SUSE-SLE-Module-Containers-15-SP4-2024-586,SUSE-SLE-Module-Containers-15-SP5-2024-586,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-586,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-586,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-586,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-586,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-586,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-586,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-586,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-586,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-586,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-586,SUSE-SUSE-MicroOS-5.1-2024-586,SUSE-SUSE-MicroOS-5.2-2024-586,SUSE-Storage-7.1-2024-586,openSUSE-Leap-Micro-5.3-2024-586,openSUSE-Leap-Micro-5.4-2024-586,openSUSE-SLE-15.5-2024-586
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for docker", "title": "Title of the patch" }, { "category": "description", "text": "This update for docker fixes the following issues:\n\nVendor latest buildkit v0.11 including bugfixes for the following:\n\n* CVE-2024-23653: BuildKit API doesn\u0027t validate entitlement on container creation (bsc#1219438).\n* CVE-2024-23652: Fixed arbitrary deletion of files (bsc#1219268).\n* CVE-2024-23651: Fixed race condition in mount (bsc#1219267).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-586,SUSE-SLE-Micro-5.3-2024-586,SUSE-SLE-Micro-5.4-2024-586,SUSE-SLE-Micro-5.5-2024-586,SUSE-SLE-Module-Containers-15-SP4-2024-586,SUSE-SLE-Module-Containers-15-SP5-2024-586,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-586,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-586,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-586,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-586,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-586,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-586,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-586,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-586,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-586,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-586,SUSE-SUSE-MicroOS-5.1-2024-586,SUSE-SUSE-MicroOS-5.2-2024-586,SUSE-Storage-7.1-2024-586,openSUSE-Leap-Micro-5.3-2024-586,openSUSE-Leap-Micro-5.4-2024-586,openSUSE-SLE-15.5-2024-586", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0586-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0586-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240586-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0586-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017990.html" }, { "category": "self", "summary": "SUSE Bug 1219267", "url": "https://bugzilla.suse.com/1219267" }, { "category": "self", "summary": "SUSE Bug 1219268", "url": "https://bugzilla.suse.com/1219268" }, { "category": "self", "summary": "SUSE Bug 1219438", "url": "https://bugzilla.suse.com/1219438" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23651 page", "url": "https://www.suse.com/security/cve/CVE-2024-23651/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23652 page", "url": "https://www.suse.com/security/cve/CVE-2024-23652/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23653 page", "url": "https://www.suse.com/security/cve/CVE-2024-23653/" } ], "title": "Security update for docker", "tracking": { "current_release_date": "2024-02-22T08:54:32Z", "generator": { "date": "2024-02-22T08:54:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0586-1", "initial_release_date": "2024-02-22T08:54:32Z", "revision_history": [ { "date": "2024-02-22T08:54:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-150000.193.1.aarch64", "product": { "name": "docker-24.0.7_ce-150000.193.1.aarch64", "product_id": "docker-24.0.7_ce-150000.193.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-150000.193.1.i586", "product": { "name": "docker-24.0.7_ce-150000.193.1.i586", "product_id": "docker-24.0.7_ce-150000.193.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "product": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "product_id": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch" } }, { "category": "product_version", "name": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "product": { "name": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "product_id": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch" } }, { "category": "product_version", "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "product": { "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "product_id": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" } }, { "category": "product_version", "name": "docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "product": { "name": "docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "product_id": "docker-zsh-completion-24.0.7_ce-150000.193.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-150000.193.1.ppc64le", "product": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le", "product_id": "docker-24.0.7_ce-150000.193.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-150000.193.1.s390x", "product": { "name": "docker-24.0.7_ce-150000.193.1.s390x", "product_id": "docker-24.0.7_ce-150000.193.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-150000.193.1.x86_64", "product": { "name": "docker-24.0.7_ce-150000.193.1.x86_64", "product_id": "docker-24.0.7_ce-150000.193.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.3", "product": { "name": "openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.3" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.4", "product": { "name": "openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-150000.193.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-150000.193.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP5", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-150000.193.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-150000.193.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-150000.193.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-150000.193.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-150000.193.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-150000.193.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:docker-fish-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "openSUSE Leap Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-150000.193.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-fish-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "docker-zsh-completion-24.0.7_ce-150000.193.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:docker-zsh-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-23651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23651" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.ppc64le", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23651", "url": "https://www.suse.com/security/cve/CVE-2024-23651" }, { "category": "external", "summary": "SUSE Bug 1219267 for CVE-2024-23651", "url": "https://bugzilla.suse.com/1219267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.ppc64le", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.ppc64le", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-22T08:54:32Z", "details": "important" } ], "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23652" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.ppc64le", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23652", "url": "https://www.suse.com/security/cve/CVE-2024-23652" }, { "category": "external", "summary": "SUSE Bug 1219268 for CVE-2024-23652", "url": "https://bugzilla.suse.com/1219268" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.ppc64le", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.ppc64le", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-22T08:54:32Z", "details": "moderate" } ], "title": "CVE-2024-23652" }, { "cve": "CVE-2024-23653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23653" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.ppc64le", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23653", "url": "https://www.suse.com/security/cve/CVE-2024-23653" }, { "category": "external", "summary": "SUSE Bug 1219438 for CVE-2024-23653", "url": "https://bugzilla.suse.com/1219438" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.ppc64le", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Enterprise Storage 7.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Enterprise Storage 7.1:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Enterprise Storage 7.1:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.1:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Micro 5.5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.ppc64le", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap 15.5:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap 15.5:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap 15.5:docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.3:docker-24.0.7_ce-150000.193.1.x86_64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.aarch64", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.s390x", "openSUSE Leap Micro 5.4:docker-24.0.7_ce-150000.193.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-22T08:54:32Z", "details": "important" } ], "title": "CVE-2024-23653" } ] }
suse-su-2025:20056-1
Vulnerability from csaf_suse
Published
2025-02-03 08:56
Modified
2025-02-03 08:56
Summary
Security update for docker
Notes
Title of the patch
Security update for docker
Description of the patch
This update for docker fixes the following issues:
Security fixes:
- CVE-2024-23651: Fixed arbitrary files write due to race condition on mounts (bsc#1219267)
- CVE-2024-23652: Fixed insufficient validation of parent directory on mount (bsc#1219268)
- CVE-2024-23653: Fixed insufficient validation on entitlement on container creation via buildkit (bsc#1219438)
- CVE-2024-41110: A Authz zero length regression that could lead to authentication bypass was fixed (bsc#1228324)
Other changes:
- Update to Docker 25.0.6-ce.
- Fix BuildKit's symlink resolution logic to correctly handle non-lexical
symlinks. (bsc#1221916)
- Write volume options atomically so sudden system crashes won't result in
future Docker starts failing due to empty files. (bsc#1214855)
- Fixed world writable docker overlay files (bsc#1220339)
Patchnames
SUSE-SLE-Micro-6.0-64
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for docker", "title": "Title of the patch" }, { "category": "description", "text": "This update for docker fixes the following issues:\n\nSecurity fixes:\n\n- CVE-2024-23651: Fixed arbitrary files write due to race condition on mounts (bsc#1219267)\n- CVE-2024-23652: Fixed insufficient validation of parent directory on mount (bsc#1219268)\n- CVE-2024-23653: Fixed insufficient validation on entitlement on container creation via buildkit (bsc#1219438)\n- CVE-2024-41110: A Authz zero length regression that could lead to authentication bypass was fixed (bsc#1228324)\n\nOther changes:\n\n- Update to Docker 25.0.6-ce.\n- Fix BuildKit\u0027s symlink resolution logic to correctly handle non-lexical\n symlinks. (bsc#1221916)\n- Write volume options atomically so sudden system crashes won\u0027t result in\n future Docker starts failing due to empty files. (bsc#1214855)\n- Fixed world writable docker overlay files (bsc#1220339)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Micro-6.0-64", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20056-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:20056-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520056-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:20056-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021311.html" }, { "category": "self", "summary": "SUSE Bug 1210141", "url": "https://bugzilla.suse.com/1210141" }, { "category": "self", "summary": "SUSE Bug 1214855", "url": "https://bugzilla.suse.com/1214855" }, { "category": "self", "summary": "SUSE Bug 1215323", "url": "https://bugzilla.suse.com/1215323" }, { "category": "self", "summary": "SUSE Bug 1217513", "url": "https://bugzilla.suse.com/1217513" }, { "category": "self", "summary": "SUSE Bug 1219267", "url": "https://bugzilla.suse.com/1219267" }, { "category": "self", "summary": "SUSE Bug 1219268", "url": "https://bugzilla.suse.com/1219268" }, { "category": "self", "summary": "SUSE Bug 1219438", "url": "https://bugzilla.suse.com/1219438" }, { "category": "self", "summary": "SUSE Bug 1220339", "url": "https://bugzilla.suse.com/1220339" }, { "category": "self", "summary": "SUSE Bug 1221916", "url": "https://bugzilla.suse.com/1221916" }, { "category": "self", "summary": "SUSE Bug 1223409", "url": "https://bugzilla.suse.com/1223409" }, { "category": "self", "summary": "SUSE Bug 1228324", "url": "https://bugzilla.suse.com/1228324" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23651 page", "url": "https://www.suse.com/security/cve/CVE-2024-23651/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23652 page", "url": "https://www.suse.com/security/cve/CVE-2024-23652/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23653 page", "url": "https://www.suse.com/security/cve/CVE-2024-23653/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-41110 page", "url": "https://www.suse.com/security/cve/CVE-2024-41110/" } ], "title": "Security update for docker", "tracking": { "current_release_date": "2025-02-03T08:56:52Z", "generator": { "date": "2025-02-03T08:56:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:20056-1", "initial_release_date": "2025-02-03T08:56:52Z", "revision_history": [ { "date": "2025-02-03T08:56:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "docker-25.0.6_ce-1.1.aarch64", "product": { "name": "docker-25.0.6_ce-1.1.aarch64", "product_id": "docker-25.0.6_ce-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "docker-25.0.6_ce-1.1.s390x", "product": { "name": "docker-25.0.6_ce-1.1.s390x", "product_id": "docker-25.0.6_ce-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "docker-25.0.6_ce-1.1.x86_64", "product": { "name": "docker-25.0.6_ce-1.1.x86_64", "product_id": "docker-25.0.6_ce-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Micro 6.0", "product": { "name": "SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0", "product_identification_helper": { "cpe": "cpe:/o:suse:sl-micro:6.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-1.1.aarch64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64" }, "product_reference": "docker-25.0.6_ce-1.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-1.1.s390x as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x" }, "product_reference": "docker-25.0.6_ce-1.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.6_ce-1.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" }, "product_reference": "docker-25.0.6_ce-1.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-23651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23651" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23651", "url": "https://www.suse.com/security/cve/CVE-2024-23651" }, { "category": "external", "summary": "SUSE Bug 1219267 for CVE-2024-23651", "url": "https://bugzilla.suse.com/1219267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T08:56:52Z", "details": "important" } ], "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23652" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23652", "url": "https://www.suse.com/security/cve/CVE-2024-23652" }, { "category": "external", "summary": "SUSE Bug 1219268 for CVE-2024-23652", "url": "https://bugzilla.suse.com/1219268" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T08:56:52Z", "details": "moderate" } ], "title": "CVE-2024-23652" }, { "cve": "CVE-2024-23653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23653" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23653", "url": "https://www.suse.com/security/cve/CVE-2024-23653" }, { "category": "external", "summary": "SUSE Bug 1219438 for CVE-2024-23653", "url": "https://bugzilla.suse.com/1219438" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T08:56:52Z", "details": "important" } ], "title": "CVE-2024-23653" }, { "cve": "CVE-2024-41110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-41110" } ], "notes": [ { "category": "general", "text": "Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\n\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\n\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\n\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\n\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-41110", "url": "https://www.suse.com/security/cve/CVE-2024-41110" }, { "category": "external", "summary": "SUSE Bug 1228324 for CVE-2024-41110", "url": "https://bugzilla.suse.com/1228324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.aarch64", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.s390x", "SUSE Linux Micro 6.0:docker-25.0.6_ce-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T08:56:52Z", "details": "critical" } ], "title": "CVE-2024-41110" } ] }
suse-su-2024:1469-1
Vulnerability from csaf_suse
Published
2024-04-29 15:59
Modified
2024-04-29 15:59
Summary
Security update for docker
Notes
Title of the patch
Security update for docker
Description of the patch
This update for docker fixes the following issues:
- CVE-2024-23651: Fixed arbitrary files write due to race condition on mounts (bsc#1219267)
- CVE-2024-23652: Fixed insufficient validation of parent directory on mount (bsc#1219268)
- CVE-2024-23653: Fixed insufficient validation on entitlement on container creation via buildkit (bsc#1219438)
Other fixes:
- Update to Docker 25.0.5-ce (bsc#1223409)
Patchnames
SUSE-2024-1469,SUSE-SLE-Module-Containers-12-2024-1469
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for docker", "title": "Title of the patch" }, { "category": "description", "text": "This update for docker fixes the following issues:\n\n- CVE-2024-23651: Fixed arbitrary files write due to race condition on mounts (bsc#1219267)\n- CVE-2024-23652: Fixed insufficient validation of parent directory on mount (bsc#1219268)\n- CVE-2024-23653: Fixed insufficient validation on entitlement on container creation via buildkit (bsc#1219438)\n\nOther fixes:\n- Update to Docker 25.0.5-ce (bsc#1223409)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-1469,SUSE-SLE-Module-Containers-12-2024-1469", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1469-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:1469-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241469-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:1469-1", "url": "https://lists.suse.com/pipermail/sle-updates/2024-April/035123.html" }, { "category": "self", "summary": "SUSE Bug 1219267", "url": "https://bugzilla.suse.com/1219267" }, { "category": "self", "summary": "SUSE Bug 1219268", "url": "https://bugzilla.suse.com/1219268" }, { "category": "self", "summary": "SUSE Bug 1219438", "url": "https://bugzilla.suse.com/1219438" }, { "category": "self", "summary": "SUSE Bug 1223409", "url": "https://bugzilla.suse.com/1223409" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23651 page", "url": "https://www.suse.com/security/cve/CVE-2024-23651/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23652 page", "url": "https://www.suse.com/security/cve/CVE-2024-23652/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23653 page", "url": "https://www.suse.com/security/cve/CVE-2024-23653/" } ], "title": "Security update for docker", "tracking": { "current_release_date": "2024-04-29T15:59:43Z", "generator": { "date": "2024-04-29T15:59:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:1469-1", "initial_release_date": "2024-04-29T15:59:43Z", "revision_history": [ { "date": "2024-04-29T15:59:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "docker-25.0.5_ce-98.112.1.aarch64", "product": { "name": "docker-25.0.5_ce-98.112.1.aarch64", "product_id": "docker-25.0.5_ce-98.112.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "docker-25.0.5_ce-98.112.1.i586", "product": { "name": "docker-25.0.5_ce-98.112.1.i586", "product_id": "docker-25.0.5_ce-98.112.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "docker-bash-completion-25.0.5_ce-98.112.1.noarch", "product": { "name": "docker-bash-completion-25.0.5_ce-98.112.1.noarch", "product_id": "docker-bash-completion-25.0.5_ce-98.112.1.noarch" } }, { "category": "product_version", "name": "docker-fish-completion-25.0.5_ce-98.112.1.noarch", "product": { "name": "docker-fish-completion-25.0.5_ce-98.112.1.noarch", "product_id": "docker-fish-completion-25.0.5_ce-98.112.1.noarch" } }, { "category": "product_version", "name": "docker-rootless-extras-25.0.5_ce-98.112.1.noarch", "product": { "name": "docker-rootless-extras-25.0.5_ce-98.112.1.noarch", "product_id": "docker-rootless-extras-25.0.5_ce-98.112.1.noarch" } }, { "category": "product_version", "name": "docker-zsh-completion-25.0.5_ce-98.112.1.noarch", "product": { "name": "docker-zsh-completion-25.0.5_ce-98.112.1.noarch", "product_id": "docker-zsh-completion-25.0.5_ce-98.112.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "docker-25.0.5_ce-98.112.1.ppc64le", "product": { "name": "docker-25.0.5_ce-98.112.1.ppc64le", "product_id": "docker-25.0.5_ce-98.112.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "docker-25.0.5_ce-98.112.1.s390x", "product": { "name": "docker-25.0.5_ce-98.112.1.s390x", "product_id": "docker-25.0.5_ce-98.112.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "docker-25.0.5_ce-98.112.1.x86_64", "product": { "name": "docker-25.0.5_ce-98.112.1.x86_64", "product_id": "docker-25.0.5_ce-98.112.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 12", "product": { "name": "SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.5_ce-98.112.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.ppc64le" }, "product_reference": "docker-25.0.5_ce-98.112.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.5_ce-98.112.1.s390x as component of SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.s390x" }, "product_reference": "docker-25.0.5_ce-98.112.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12" }, { "category": "default_component_of", "full_product_name": { "name": "docker-25.0.5_ce-98.112.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.x86_64" }, "product_reference": "docker-25.0.5_ce-98.112.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-23651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23651" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23651", "url": "https://www.suse.com/security/cve/CVE-2024-23651" }, { "category": "external", "summary": "SUSE Bug 1219267 for CVE-2024-23651", "url": "https://bugzilla.suse.com/1219267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-04-29T15:59:43Z", "details": "important" } ], "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23652" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23652", "url": "https://www.suse.com/security/cve/CVE-2024-23652" }, { "category": "external", "summary": "SUSE Bug 1219268 for CVE-2024-23652", "url": "https://bugzilla.suse.com/1219268" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-04-29T15:59:43Z", "details": "moderate" } ], "title": "CVE-2024-23652" }, { "cve": "CVE-2024-23653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23653" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23653", "url": "https://www.suse.com/security/cve/CVE-2024-23653" }, { "category": "external", "summary": "SUSE Bug 1219438 for CVE-2024-23653", "url": "https://bugzilla.suse.com/1219438" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-25.0.5_ce-98.112.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-04-29T15:59:43Z", "details": "important" } ], "title": "CVE-2024-23653" } ] }
suse-su-2024:0586-2
Vulnerability from csaf_suse
Published
2024-04-04 13:13
Modified
2024-04-04 13:13
Summary
Security update for docker
Notes
Title of the patch
Security update for docker
Description of the patch
This update for docker fixes the following issues:
Vendor latest buildkit v0.11 including bugfixes for the following:
* CVE-2024-23653: BuildKit API doesn't validate entitlement on container creation (bsc#1219438).
* CVE-2024-23652: Fixed arbitrary deletion of files (bsc#1219268).
* CVE-2024-23651: Fixed race condition in mount (bsc#1219267).
Patchnames
SUSE-2024-586,SUSE-SLE-Module-Containers-15-SP4-2024-586
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for docker", "title": "Title of the patch" }, { "category": "description", "text": "This update for docker fixes the following issues:\n\nVendor latest buildkit v0.11 including bugfixes for the following:\n\n* CVE-2024-23653: BuildKit API doesn\u0027t validate entitlement on container creation (bsc#1219438).\n* CVE-2024-23652: Fixed arbitrary deletion of files (bsc#1219268).\n* CVE-2024-23651: Fixed race condition in mount (bsc#1219267).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-586,SUSE-SLE-Module-Containers-15-SP4-2024-586", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0586-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0586-2", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240586-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0586-2", "url": "https://lists.suse.com/pipermail/sle-updates/2024-April/034848.html" }, { "category": "self", "summary": "SUSE Bug 1219267", "url": "https://bugzilla.suse.com/1219267" }, { "category": "self", "summary": "SUSE Bug 1219268", "url": "https://bugzilla.suse.com/1219268" }, { "category": "self", "summary": "SUSE Bug 1219438", "url": "https://bugzilla.suse.com/1219438" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23651 page", "url": "https://www.suse.com/security/cve/CVE-2024-23651/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23652 page", "url": "https://www.suse.com/security/cve/CVE-2024-23652/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23653 page", "url": "https://www.suse.com/security/cve/CVE-2024-23653/" } ], "title": "Security update for docker", "tracking": { "current_release_date": "2024-04-04T13:13:53Z", "generator": { "date": "2024-04-04T13:13:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0586-2", "initial_release_date": "2024-04-04T13:13:53Z", "revision_history": [ { "date": "2024-04-04T13:13:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-150000.193.1.aarch64", "product": { "name": "docker-24.0.7_ce-150000.193.1.aarch64", "product_id": "docker-24.0.7_ce-150000.193.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-150000.193.1.i586", "product": { "name": "docker-24.0.7_ce-150000.193.1.i586", "product_id": "docker-24.0.7_ce-150000.193.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "product": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "product_id": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch" } }, { "category": "product_version", "name": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "product": { "name": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch", "product_id": "docker-fish-completion-24.0.7_ce-150000.193.1.noarch" } }, { "category": "product_version", "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "product": { "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "product_id": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" } }, { "category": "product_version", "name": "docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "product": { "name": "docker-zsh-completion-24.0.7_ce-150000.193.1.noarch", "product_id": "docker-zsh-completion-24.0.7_ce-150000.193.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-150000.193.1.ppc64le", "product": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le", "product_id": "docker-24.0.7_ce-150000.193.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-150000.193.1.s390x", "product": { "name": "docker-24.0.7_ce-150000.193.1.s390x", "product_id": "docker-24.0.7_ce-150000.193.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-150000.193.1.x86_64", "product": { "name": "docker-24.0.7_ce-150000.193.1.x86_64", "product_id": "docker-24.0.7_ce-150000.193.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:15:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-150000.193.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x" }, "product_reference": "docker-24.0.7_ce-150000.193.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-150000.193.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64" }, "product_reference": "docker-24.0.7_ce-150000.193.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP4", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" }, "product_reference": "docker-rootless-extras-24.0.7_ce-150000.193.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-23651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23651" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23651", "url": "https://www.suse.com/security/cve/CVE-2024-23651" }, { "category": "external", "summary": "SUSE Bug 1219267 for CVE-2024-23651", "url": "https://bugzilla.suse.com/1219267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-04-04T13:13:53Z", "details": "important" } ], "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23652" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23652", "url": "https://www.suse.com/security/cve/CVE-2024-23652" }, { "category": "external", "summary": "SUSE Bug 1219268 for CVE-2024-23652", "url": "https://bugzilla.suse.com/1219268" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-04-04T13:13:53Z", "details": "moderate" } ], "title": "CVE-2024-23652" }, { "cve": "CVE-2024-23653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23653" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23653", "url": "https://www.suse.com/security/cve/CVE-2024-23653" }, { "category": "external", "summary": "SUSE Bug 1219438 for CVE-2024-23653", "url": "https://bugzilla.suse.com/1219438" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-24.0.7_ce-150000.193.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-bash-completion-24.0.7_ce-150000.193.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP4:docker-rootless-extras-24.0.7_ce-150000.193.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-04-04T13:13:53Z", "details": "important" } ], "title": "CVE-2024-23653" } ] }
gsd-2024-23651
Vulnerability from gsd
Modified
2024-01-19 06:02
Details
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-23651" ], "details": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n", "id": "GSD-2024-23651", "modified": "2024-01-19T06:02:13.206939Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2024-23651", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "buildkit", "version": { "version_data": [ { "version_affected": "=", "version_value": "\u003c 0.12.5" } ] } } ] }, "vendor_name": "moby" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n" } ] }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-362", "lang": "eng", "value": "CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv", "refsource": "MISC", "url": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv" }, { "name": "https://github.com/moby/buildkit/pull/4604", "refsource": "MISC", "url": "https://github.com/moby/buildkit/pull/4604" }, { "name": "https://github.com/moby/buildkit/releases/tag/v0.12.5", "refsource": "MISC", "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5" } ] }, "source": { "advisory": "GHSA-m3r6-h7wv-7xxv", "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mobyproject:buildkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AAE2F08-4E4D-4B85-8230-8D5BA7788D3D", "versionEndExcluding": "0.12.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n" }, { "lang": "es", "value": "BuildKit es un conjunto de herramientas para convertir c\u00f3digo fuente para crear artefactos de manera eficiente, expresiva y repetible. Dos pasos de compilaci\u00f3n maliciosos que se ejecutan en paralelo y comparten los mismos montajes de cach\u00e9 con subrutas podr\u00edan causar una condici\u00f3n de ejecuci\u00f3n que puede hacer que los archivos del sistema host sean accesibles al contenedor de compilaci\u00f3n. El problema se solucion\u00f3 en v0.12.5. Los workarounds incluyen evitar el uso de la interfaz de BuildKit desde una fuente que no es de confianza o crear un Dockerfile que no sea de confianza que contenga montajes de cach\u00e9 con las opciones --mount=type=cache,source=...." } ], "id": "CVE-2024-23651", "lastModified": "2024-02-09T01:43:51.767", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.8, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2024-01-31T22:15:54.183", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/moby/buildkit/pull/4604" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Release Notes" ], "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "security-advisories@github.com", "type": "Primary" } ] } } } }
opensuse-su-2024:13651-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
buildkit-0.12.5-1.1 on GA media
Notes
Title of the patch
buildkit-0.12.5-1.1 on GA media
Description of the patch
These are all security issues fixed in the buildkit-0.12.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13651
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "buildkit-0.12.5-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the buildkit-0.12.5-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13651", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13651-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23651 page", "url": "https://www.suse.com/security/cve/CVE-2024-23651/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23652 page", "url": "https://www.suse.com/security/cve/CVE-2024-23652/" } ], "title": "buildkit-0.12.5-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13651-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "buildkit-0.12.5-1.1.aarch64", "product": { "name": "buildkit-0.12.5-1.1.aarch64", "product_id": "buildkit-0.12.5-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "buildkit-0.12.5-1.1.ppc64le", "product": { "name": "buildkit-0.12.5-1.1.ppc64le", "product_id": "buildkit-0.12.5-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildkit-0.12.5-1.1.s390x", "product": { "name": "buildkit-0.12.5-1.1.s390x", "product_id": "buildkit-0.12.5-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildkit-0.12.5-1.1.x86_64", "product": { "name": "buildkit-0.12.5-1.1.x86_64", "product_id": "buildkit-0.12.5-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "buildkit-0.12.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:buildkit-0.12.5-1.1.aarch64" }, "product_reference": "buildkit-0.12.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "buildkit-0.12.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:buildkit-0.12.5-1.1.ppc64le" }, "product_reference": "buildkit-0.12.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "buildkit-0.12.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:buildkit-0.12.5-1.1.s390x" }, "product_reference": "buildkit-0.12.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "buildkit-0.12.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:buildkit-0.12.5-1.1.x86_64" }, "product_reference": "buildkit-0.12.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-23651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23651" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:buildkit-0.12.5-1.1.aarch64", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.ppc64le", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.s390x", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23651", "url": "https://www.suse.com/security/cve/CVE-2024-23651" }, { "category": "external", "summary": "SUSE Bug 1219267 for CVE-2024-23651", "url": "https://bugzilla.suse.com/1219267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:buildkit-0.12.5-1.1.aarch64", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.ppc64le", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.s390x", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:buildkit-0.12.5-1.1.aarch64", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.ppc64le", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.s390x", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23652" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:buildkit-0.12.5-1.1.aarch64", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.ppc64le", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.s390x", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23652", "url": "https://www.suse.com/security/cve/CVE-2024-23652" }, { "category": "external", "summary": "SUSE Bug 1219268 for CVE-2024-23652", "url": "https://bugzilla.suse.com/1219268" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:buildkit-0.12.5-1.1.aarch64", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.ppc64le", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.s390x", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:buildkit-0.12.5-1.1.aarch64", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.ppc64le", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.s390x", "openSUSE Tumbleweed:buildkit-0.12.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-23652" } ] }
opensuse-su-2024:13689-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
docker-24.0.7_ce-3.1 on GA media
Notes
Title of the patch
docker-24.0.7_ce-3.1 on GA media
Description of the patch
These are all security issues fixed in the docker-24.0.7_ce-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13689
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "docker-24.0.7_ce-3.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the docker-24.0.7_ce-3.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13689", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13689-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23651 page", "url": "https://www.suse.com/security/cve/CVE-2024-23651/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23652 page", "url": "https://www.suse.com/security/cve/CVE-2024-23652/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23653 page", "url": "https://www.suse.com/security/cve/CVE-2024-23653/" } ], "title": "docker-24.0.7_ce-3.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13689-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-3.1.aarch64", "product": { "name": "docker-24.0.7_ce-3.1.aarch64", "product_id": "docker-24.0.7_ce-3.1.aarch64" } }, { "category": "product_version", "name": "docker-bash-completion-24.0.7_ce-3.1.aarch64", "product": { "name": "docker-bash-completion-24.0.7_ce-3.1.aarch64", "product_id": "docker-bash-completion-24.0.7_ce-3.1.aarch64" } }, { "category": "product_version", "name": "docker-fish-completion-24.0.7_ce-3.1.aarch64", "product": { "name": "docker-fish-completion-24.0.7_ce-3.1.aarch64", "product_id": "docker-fish-completion-24.0.7_ce-3.1.aarch64" } }, { "category": "product_version", "name": "docker-rootless-extras-24.0.7_ce-3.1.aarch64", "product": { "name": "docker-rootless-extras-24.0.7_ce-3.1.aarch64", "product_id": "docker-rootless-extras-24.0.7_ce-3.1.aarch64" } }, { "category": "product_version", "name": "docker-zsh-completion-24.0.7_ce-3.1.aarch64", "product": { "name": "docker-zsh-completion-24.0.7_ce-3.1.aarch64", "product_id": "docker-zsh-completion-24.0.7_ce-3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-3.1.ppc64le", "product": { "name": "docker-24.0.7_ce-3.1.ppc64le", "product_id": "docker-24.0.7_ce-3.1.ppc64le" } }, { "category": "product_version", "name": "docker-bash-completion-24.0.7_ce-3.1.ppc64le", "product": { "name": "docker-bash-completion-24.0.7_ce-3.1.ppc64le", "product_id": "docker-bash-completion-24.0.7_ce-3.1.ppc64le" } }, { "category": "product_version", "name": "docker-fish-completion-24.0.7_ce-3.1.ppc64le", "product": { "name": "docker-fish-completion-24.0.7_ce-3.1.ppc64le", "product_id": "docker-fish-completion-24.0.7_ce-3.1.ppc64le" } }, { "category": "product_version", "name": "docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "product": { "name": "docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "product_id": "docker-rootless-extras-24.0.7_ce-3.1.ppc64le" } }, { "category": "product_version", "name": "docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "product": { "name": "docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "product_id": "docker-zsh-completion-24.0.7_ce-3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-3.1.s390x", "product": { "name": "docker-24.0.7_ce-3.1.s390x", "product_id": "docker-24.0.7_ce-3.1.s390x" } }, { "category": "product_version", "name": "docker-bash-completion-24.0.7_ce-3.1.s390x", "product": { "name": "docker-bash-completion-24.0.7_ce-3.1.s390x", "product_id": "docker-bash-completion-24.0.7_ce-3.1.s390x" } }, { "category": "product_version", "name": "docker-fish-completion-24.0.7_ce-3.1.s390x", "product": { "name": "docker-fish-completion-24.0.7_ce-3.1.s390x", "product_id": "docker-fish-completion-24.0.7_ce-3.1.s390x" } }, { "category": "product_version", "name": "docker-rootless-extras-24.0.7_ce-3.1.s390x", "product": { "name": "docker-rootless-extras-24.0.7_ce-3.1.s390x", "product_id": "docker-rootless-extras-24.0.7_ce-3.1.s390x" } }, { "category": "product_version", "name": "docker-zsh-completion-24.0.7_ce-3.1.s390x", "product": { "name": "docker-zsh-completion-24.0.7_ce-3.1.s390x", "product_id": "docker-zsh-completion-24.0.7_ce-3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "docker-24.0.7_ce-3.1.x86_64", "product": { "name": "docker-24.0.7_ce-3.1.x86_64", "product_id": "docker-24.0.7_ce-3.1.x86_64" } }, { "category": "product_version", "name": "docker-bash-completion-24.0.7_ce-3.1.x86_64", "product": { "name": "docker-bash-completion-24.0.7_ce-3.1.x86_64", "product_id": "docker-bash-completion-24.0.7_ce-3.1.x86_64" } }, { "category": "product_version", "name": "docker-fish-completion-24.0.7_ce-3.1.x86_64", "product": { "name": "docker-fish-completion-24.0.7_ce-3.1.x86_64", "product_id": "docker-fish-completion-24.0.7_ce-3.1.x86_64" } }, { "category": "product_version", "name": "docker-rootless-extras-24.0.7_ce-3.1.x86_64", "product": { "name": "docker-rootless-extras-24.0.7_ce-3.1.x86_64", "product_id": "docker-rootless-extras-24.0.7_ce-3.1.x86_64" } }, { "category": "product_version", "name": "docker-zsh-completion-24.0.7_ce-3.1.x86_64", "product": { "name": "docker-zsh-completion-24.0.7_ce-3.1.x86_64", "product_id": "docker-zsh-completion-24.0.7_ce-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.aarch64" }, "product_reference": "docker-24.0.7_ce-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.ppc64le" }, "product_reference": "docker-24.0.7_ce-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.s390x" }, "product_reference": "docker-24.0.7_ce-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-24.0.7_ce-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.x86_64" }, "product_reference": "docker-24.0.7_ce-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.aarch64" }, "product_reference": "docker-bash-completion-24.0.7_ce-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.ppc64le" }, "product_reference": "docker-bash-completion-24.0.7_ce-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.s390x" }, "product_reference": "docker-bash-completion-24.0.7_ce-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-bash-completion-24.0.7_ce-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.x86_64" }, "product_reference": "docker-bash-completion-24.0.7_ce-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-24.0.7_ce-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.aarch64" }, "product_reference": "docker-fish-completion-24.0.7_ce-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-24.0.7_ce-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.ppc64le" }, "product_reference": "docker-fish-completion-24.0.7_ce-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-24.0.7_ce-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.s390x" }, "product_reference": "docker-fish-completion-24.0.7_ce-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-fish-completion-24.0.7_ce-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.x86_64" }, "product_reference": "docker-fish-completion-24.0.7_ce-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.aarch64" }, "product_reference": "docker-rootless-extras-24.0.7_ce-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.ppc64le" }, "product_reference": "docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.s390x" }, "product_reference": "docker-rootless-extras-24.0.7_ce-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-rootless-extras-24.0.7_ce-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.x86_64" }, "product_reference": "docker-rootless-extras-24.0.7_ce-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-zsh-completion-24.0.7_ce-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.aarch64" }, "product_reference": "docker-zsh-completion-24.0.7_ce-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-zsh-completion-24.0.7_ce-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.ppc64le" }, "product_reference": "docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-zsh-completion-24.0.7_ce-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.s390x" }, "product_reference": "docker-zsh-completion-24.0.7_ce-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "docker-zsh-completion-24.0.7_ce-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.x86_64" }, "product_reference": "docker-zsh-completion-24.0.7_ce-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-23651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23651" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23651", "url": "https://www.suse.com/security/cve/CVE-2024-23651" }, { "category": "external", "summary": "SUSE Bug 1219267 for CVE-2024-23651", "url": "https://bugzilla.suse.com/1219267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23652" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23652", "url": "https://www.suse.com/security/cve/CVE-2024-23652" }, { "category": "external", "summary": "SUSE Bug 1219268 for CVE-2024-23652", "url": "https://bugzilla.suse.com/1219268" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-23652" }, { "cve": "CVE-2024-23653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23653" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23653", "url": "https://www.suse.com/security/cve/CVE-2024-23653" }, { "category": "external", "summary": "SUSE Bug 1219438 for CVE-2024-23653", "url": "https://bugzilla.suse.com/1219438" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-bash-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-fish-completion-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-rootless-extras-24.0.7_ce-3.1.x86_64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.aarch64", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.ppc64le", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.s390x", "openSUSE Tumbleweed:docker-zsh-completion-24.0.7_ce-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-23653" } ] }
opensuse-su-2024:14059-1
Vulnerability from csaf_opensuse
Published
2024-06-20 00:00
Modified
2024-06-20 00:00
Summary
singularity-ce-4.1.3-1.1 on GA media
Notes
Title of the patch
singularity-ce-4.1.3-1.1 on GA media
Description of the patch
These are all security issues fixed in the singularity-ce-4.1.3-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-14059
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "singularity-ce-4.1.3-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the singularity-ce-4.1.3-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14059", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14059-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23538 page", "url": "https://www.suse.com/security/cve/CVE-2022-23538/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39237 page", "url": "https://www.suse.com/security/cve/CVE-2022-39237/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21626 page", "url": "https://www.suse.com/security/cve/CVE-2024-21626/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23650 page", "url": "https://www.suse.com/security/cve/CVE-2024-23650/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23651 page", "url": "https://www.suse.com/security/cve/CVE-2024-23651/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23652 page", "url": "https://www.suse.com/security/cve/CVE-2024-23652/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23653 page", "url": "https://www.suse.com/security/cve/CVE-2024-23653/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-3727 page", "url": "https://www.suse.com/security/cve/CVE-2024-3727/" } ], "title": "singularity-ce-4.1.3-1.1 on GA media", "tracking": { "current_release_date": "2024-06-20T00:00:00Z", "generator": { "date": "2024-06-20T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14059-1", "initial_release_date": "2024-06-20T00:00:00Z", "revision_history": [ { "date": "2024-06-20T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "singularity-ce-4.1.3-1.1.aarch64", "product": { "name": "singularity-ce-4.1.3-1.1.aarch64", "product_id": "singularity-ce-4.1.3-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "singularity-ce-4.1.3-1.1.ppc64le", "product": { "name": "singularity-ce-4.1.3-1.1.ppc64le", "product_id": "singularity-ce-4.1.3-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "singularity-ce-4.1.3-1.1.s390x", "product": { "name": "singularity-ce-4.1.3-1.1.s390x", "product_id": "singularity-ce-4.1.3-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "singularity-ce-4.1.3-1.1.x86_64", "product": { "name": "singularity-ce-4.1.3-1.1.x86_64", "product_id": "singularity-ce-4.1.3-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "singularity-ce-4.1.3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64" }, "product_reference": "singularity-ce-4.1.3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "singularity-ce-4.1.3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le" }, "product_reference": "singularity-ce-4.1.3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "singularity-ce-4.1.3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x" }, "product_reference": "singularity-ce-4.1.3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "singularity-ce-4.1.3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" }, "product_reference": "singularity-ce-4.1.3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23538", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23538" } ], "notes": [ { "category": "general", "text": "github.com/sylabs/scs-library-client is the Go client for the Singularity Container Services (SCS) Container Library Service. When the scs-library-client is used to pull a container image, with authentication, the HTTP Authorization header sent by the client to the library service may be incorrectly leaked to an S3 backing storage provider. This occurs in a specific flow, where the library service redirects the client to a backing S3 storage server, to perform a multi-part concurrent download. Depending on site configuration, the S3 service may be provided by a third party. An attacker with access to the S3 service may be able to extract user credentials, allowing them to impersonate the user. The vulnerable multi-part concurrent download flow, with redirect to S3, is only used when communicating with a Singularity Enterprise 1.x installation, or third party server implementing this flow. Interaction with Singularity Enterprise 2.x, and Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow. We encourage all users to update. Users who interact with a Singularity Enterprise 1.x installation, using a 3rd party S3 storage service, are advised to revoke and recreate their authentication tokens within Singularity Enterprise. There is no workaround available at this time.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23538", "url": "https://www.suse.com/security/cve/CVE-2022-23538" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-20T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23538" }, { "cve": "CVE-2022-39237", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39237" } ], "notes": [ { "category": "general", "text": "syslabs/sif is the Singularity Image Format (SIF) reference implementation. In versions prior to 2.8.1the `github.com/sylabs/sif/v2/pkg/integrity` package did not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures. A patch is available in version \u003e= v2.8.1 of the module. Users are encouraged to upgrade. Users unable to upgrade may independently validate that the hash algorithm(s) used for metadata digest(s) and signature hash are cryptographically secure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39237", "url": "https://www.suse.com/security/cve/CVE-2022-39237" }, { "category": "external", "summary": "SUSE Bug 1209493 for CVE-2022-39237", "url": "https://bugzilla.suse.com/1209493" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-20T00:00:00Z", "details": "important" } ], "title": "CVE-2022-39237" }, { "cve": "CVE-2024-21626", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21626" } ], "notes": [ { "category": "general", "text": "runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem (\"attack 2\"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run (\"attack 1\"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes (\"attack 3a\" and \"attack 3b\"). runc 1.1.12 includes patches for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21626", "url": "https://www.suse.com/security/cve/CVE-2024-21626" }, { "category": "external", "summary": "SUSE Bug 1218894 for CVE-2024-21626", "url": "https://bugzilla.suse.com/1218894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-20T00:00:00Z", "details": "important" } ], "title": "CVE-2024-21626" }, { "cve": "CVE-2024-23650", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23650" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit client or frontend could craft a request that could lead to BuildKit daemon crashing with a panic. The issue has been fixed in v0.12.5. As a workaround, avoid using BuildKit frontends from untrusted sources.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23650", "url": "https://www.suse.com/security/cve/CVE-2024-23650" }, { "category": "external", "summary": "SUSE Bug 1219437 for CVE-2024-23650", "url": "https://bugzilla.suse.com/1219437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-20T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-23650" }, { "cve": "CVE-2024-23651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23651" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23651", "url": "https://www.suse.com/security/cve/CVE-2024-23651" }, { "category": "external", "summary": "SUSE Bug 1219267 for CVE-2024-23651", "url": "https://bugzilla.suse.com/1219267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-20T00:00:00Z", "details": "important" } ], "title": "CVE-2024-23651" }, { "cve": "CVE-2024-23652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23652" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23652", "url": "https://www.suse.com/security/cve/CVE-2024-23652" }, { "category": "external", "summary": "SUSE Bug 1219268 for CVE-2024-23652", "url": "https://bugzilla.suse.com/1219268" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-20T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-23652" }, { "cve": "CVE-2024-23653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23653" } ], "notes": [ { "category": "general", "text": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23653", "url": "https://www.suse.com/security/cve/CVE-2024-23653" }, { "category": "external", "summary": "SUSE Bug 1219438 for CVE-2024-23653", "url": "https://bugzilla.suse.com/1219438" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-20T00:00:00Z", "details": "important" } ], "title": "CVE-2024-23653" }, { "cve": "CVE-2024-3727", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-3727" } ], "notes": [ { "category": "general", "text": "A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-3727", "url": "https://www.suse.com/security/cve/CVE-2024-3727" }, { "category": "external", "summary": "SUSE Bug 1224112 for CVE-2024-3727", "url": "https://bugzilla.suse.com/1224112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.aarch64", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.ppc64le", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.s390x", "openSUSE Tumbleweed:singularity-ce-4.1.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-20T00:00:00Z", "details": "important" } ], "title": "CVE-2024-3727" } ] }
ghsa-m3r6-h7wv-7xxv
Vulnerability from github
Published
2024-01-31 22:43
Modified
2024-02-01 17:48
Severity ?
VLAI Severity ?
Summary
BuildKit vulnerable to possible race condition with accessing subpaths from cache mounts
Details
Impact
Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container.
Patches
The issue has been fixed in v0.12.5
Workarounds
Avoid using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=...
options.
References
https://www.openwall.com/lists/oss-security/2019/05/28/1
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/moby/buildkit" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.12.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-23651" ], "database_specific": { "cwe_ids": [ "CWE-362" ], "github_reviewed": true, "github_reviewed_at": "2024-01-31T22:43:32Z", "nvd_published_at": "2024-01-31T22:15:54Z", "severity": "HIGH" }, "details": "### Impact\nTwo malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container.\n\n### Patches\nThe issue has been fixed in v0.12.5\n\n### Workarounds\nAvoid using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with `--mount=type=cache,source=...` options.\n\n### References\nhttps://www.openwall.com/lists/oss-security/2019/05/28/1\n", "id": "GHSA-m3r6-h7wv-7xxv", "modified": "2024-02-01T17:48:14Z", "published": "2024-01-31T22:43:32Z", "references": [ { "type": "WEB", "url": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23651" }, { "type": "WEB", "url": "https://github.com/moby/buildkit/pull/4604" }, { "type": "PACKAGE", "url": "https://github.com/moby/buildkit" }, { "type": "WEB", "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "type": "CVSS_V3" } ], "summary": "BuildKit vulnerable to possible race condition with accessing subpaths from cache mounts" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…