suse-su-2024:3186-1
Vulnerability from csaf_suse
Published
2024-09-10 07:43
Modified
2024-09-10 07:43
Summary
Security update for buildah

Notes

Title of the patch
Security update for buildah
Description of the patch
This update for buildah fixes the following issues: Update to version 1.35.4: * CVE-2024-3727 updates (bsc#1224117) * Bump go-jose CVE-2024-28180 * Bump ocicrypt and go-jose CVE-2024-28180 Update to version 1.35.3: * correctly configure /etc/hosts and resolv.conf * buildah: refactor resolv/hosts setup. * rename the hostFile var to reflect * CVE-2024-24786 protobuf to 1.33 Update to version 1.35.1: * CVE-2024-1753 container escape fix (bsc#1221677) - Buildah dropped cni support, require netavark instead (bsc#1221243) - Remove obsolete requires libcontainers-image & libcontainers-storage - Require passt for rootless networking (poo#156955) Buildah moved to passt/pasta for rootless networking from slirp4netns (https://github.com/containers/common/pull/1846) Update to version 1.35.0: * Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0 * conformance tests: don't break on trailing zeroes in layer blobs * Add a conformance test for copying to a mounted prior stage * cgroups: reuse version check from c/common * Update vendor of containers/(common,image) * manifest add: complain if we get artifact flags without --artifact * Use retry logic from containers/common * Vendor in containers/(storage,image,common) * Update module golang.org/x/crypto to v0.20.0 * Add comment re: Total Success task name * tests: skip_if_no_unshare(): check for --setuid * Properly handle build --pull=false * Update module go.etcd.io/bbolt to v1.3.9 * Update module github.com/opencontainers/image-spec to v1.1.0 * build --all-platforms: skip some base 'image' platforms * Bump main to v1.35.0-dev * Vendor in latest containers/(storage,image,common) * Split up error messages for missing --sbom related flags * `buildah manifest`: add artifact-related options * cmd/buildah/manifest.go: lock lists before adding/annotating/pushing * cmd/buildah/manifest.go: don't make struct declarations aliases * Use golang.org/x/exp/slices.Contains * Try Cirrus with a newer VM version * Set CONTAINERS_CONF in the chroot-mount-flags integration test * Update to match dependency API update * Update github.com/openshift/imagebuilder and containers/common * docs: correct default authfile path * tests: retrofit test for heredoc summary * build, heredoc: show heredoc summary in build output * manifest, push: add support for --retry and --retry-delay * imagebuildah: fix crash with empty RUN * Make buildah match podman for handling of ulimits * docs: move footnotes to where they're applicable * Allow users to specify no-dereference * docs: use reversed logo for dark theme in README * build,commit: add --sbom to scan and produce SBOMs when committing * commit: force omitHistory if the parent has layers but no history * docs: fix a couple of typos * internal/mkcw.Archive(): handle extra image content * stage_executor,heredoc: honor interpreter in heredoc * stage_executor,layers: burst cache if heredoc content is changed * Replace map[K]bool with map[K]struct{} where it makes sense * Bump CI VMs * Replace strings.SplitN with strings.Cut * Document use of containers-transports values in buildah * manifest: addCompression use default from containers.conf * commit: add a --add-file flag * mkcw: populate the rootfs using an overlay * [skip-ci] Update actions/stale action to v9 * Ignore errors if label.Relabel returns ENOSUP
Patchnames
SUSE-2024-3186,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3186,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3186,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3186,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3186
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for buildah",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for buildah fixes the following issues:\n\nUpdate to version 1.35.4:\n\n* CVE-2024-3727 updates (bsc#1224117)\n* Bump go-jose CVE-2024-28180\n* Bump ocicrypt and go-jose CVE-2024-28180\n\nUpdate to version 1.35.3:\n\n* correctly configure /etc/hosts and resolv.conf\n* buildah: refactor resolv/hosts setup.\n* rename the hostFile var to reflect\n* CVE-2024-24786 protobuf to 1.33\n\n\nUpdate to version 1.35.1:\n\n* CVE-2024-1753 container escape fix (bsc#1221677)\n\n- Buildah dropped cni support, require netavark instead (bsc#1221243)\n\n- Remove obsolete requires libcontainers-image \u0026 libcontainers-storage\n\n- Require passt for rootless networking (poo#156955)\n  Buildah moved to passt/pasta for rootless networking from slirp4netns\n  (https://github.com/containers/common/pull/1846)\n\nUpdate to version 1.35.0:\n\n* Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0\n* conformance tests: don\u0027t break on trailing zeroes in layer blobs\n* Add a conformance test for copying to a mounted prior stage\n* cgroups: reuse version check from c/common\n* Update vendor of containers/(common,image)\n* manifest add: complain if we get artifact flags without --artifact\n* Use retry logic from containers/common\n* Vendor in containers/(storage,image,common)\n* Update module golang.org/x/crypto to v0.20.0\n* Add comment re: Total Success task name\n* tests: skip_if_no_unshare(): check for --setuid\n* Properly handle build --pull=false\n* Update module go.etcd.io/bbolt to v1.3.9\n* Update module github.com/opencontainers/image-spec to v1.1.0\n* build --all-platforms: skip some base \u0027image\u0027 platforms\n* Bump main to v1.35.0-dev\n* Vendor in latest containers/(storage,image,common)\n* Split up error messages for missing --sbom related flags\n* `buildah manifest`: add artifact-related options\n* cmd/buildah/manifest.go: lock lists before adding/annotating/pushing\n* cmd/buildah/manifest.go: don\u0027t make struct declarations aliases\n* Use golang.org/x/exp/slices.Contains\n* Try Cirrus with a newer VM version\n* Set CONTAINERS_CONF in the chroot-mount-flags integration test\n* Update to match dependency API update\n* Update github.com/openshift/imagebuilder and containers/common\n* docs: correct default authfile path\n* tests: retrofit test for heredoc summary\n* build, heredoc: show heredoc summary in build output\n* manifest, push: add support for --retry and --retry-delay\n* imagebuildah: fix crash with empty RUN\n* Make buildah match podman for handling of ulimits\n* docs: move footnotes to where they\u0027re applicable\n* Allow users to specify no-dereference\n* docs: use reversed logo for dark theme in README\n* build,commit: add --sbom to scan and produce SBOMs when committing\n* commit: force omitHistory if the parent has layers but no history\n* docs: fix a couple of typos\n* internal/mkcw.Archive(): handle extra image content\n* stage_executor,heredoc: honor interpreter in heredoc\n* stage_executor,layers: burst cache if heredoc content is changed\n* Replace map[K]bool with map[K]struct{} where it makes sense\n* Bump CI VMs\n* Replace strings.SplitN with strings.Cut\n* Document use of containers-transports values in buildah\n* manifest: addCompression use default from containers.conf\n* commit: add a --add-file flag\n* mkcw: populate the rootfs using an overlay\n* [skip-ci] Update actions/stale action to v9\n* Ignore errors if label.Relabel returns ENOSUP",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-3186,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3186,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3186,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3186,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3186",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3186-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:3186-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243186-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:3186-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221243",
        "url": "https://bugzilla.suse.com/1221243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221677",
        "url": "https://bugzilla.suse.com/1221677"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224117",
        "url": "https://bugzilla.suse.com/1224117"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-1753 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-1753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-24786 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-24786/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-28180 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-28180/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-3727 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-3727/"
      }
    ],
    "title": "Security update for buildah",
    "tracking": {
      "current_release_date": "2024-09-10T07:43:19Z",
      "generator": {
        "date": "2024-09-10T07:43:19Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:3186-1",
      "initial_release_date": "2024-09-10T07:43:19Z",
      "revision_history": [
        {
          "date": "2024-09-10T07:43:19Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "buildah-1.35.4-150400.3.30.1.aarch64",
                "product": {
                  "name": "buildah-1.35.4-150400.3.30.1.aarch64",
                  "product_id": "buildah-1.35.4-150400.3.30.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "buildah-1.35.4-150400.3.30.1.i586",
                "product": {
                  "name": "buildah-1.35.4-150400.3.30.1.i586",
                  "product_id": "buildah-1.35.4-150400.3.30.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "buildah-1.35.4-150400.3.30.1.ppc64le",
                "product": {
                  "name": "buildah-1.35.4-150400.3.30.1.ppc64le",
                  "product_id": "buildah-1.35.4-150400.3.30.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "buildah-1.35.4-150400.3.30.1.s390x",
                "product": {
                  "name": "buildah-1.35.4-150400.3.30.1.s390x",
                  "product_id": "buildah-1.35.4-150400.3.30.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "buildah-1.35.4-150400.3.30.1.x86_64",
                "product": {
                  "name": "buildah-1.35.4-150400.3.30.1.x86_64",
                  "product_id": "buildah-1.35.4-150400.3.30.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "buildah-1.35.4-150400.3.30.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64"
        },
        "product_reference": "buildah-1.35.4-150400.3.30.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "buildah-1.35.4-150400.3.30.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64"
        },
        "product_reference": "buildah-1.35.4-150400.3.30.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "buildah-1.35.4-150400.3.30.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64"
        },
        "product_reference": "buildah-1.35.4-150400.3.30.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "buildah-1.35.4-150400.3.30.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64"
        },
        "product_reference": "buildah-1.35.4-150400.3.30.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "buildah-1.35.4-150400.3.30.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64"
        },
        "product_reference": "buildah-1.35.4-150400.3.30.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "buildah-1.35.4-150400.3.30.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le"
        },
        "product_reference": "buildah-1.35.4-150400.3.30.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "buildah-1.35.4-150400.3.30.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x"
        },
        "product_reference": "buildah-1.35.4-150400.3.30.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "buildah-1.35.4-150400.3.30.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64"
        },
        "product_reference": "buildah-1.35.4-150400.3.30.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "buildah-1.35.4-150400.3.30.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le"
        },
        "product_reference": "buildah-1.35.4-150400.3.30.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "buildah-1.35.4-150400.3.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
        },
        "product_reference": "buildah-1.35.4-150400.3.30.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-1753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-1753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-1753",
          "url": "https://www.suse.com/security/cve/CVE-2024-1753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221677 for CVE-2024-1753",
          "url": "https://bugzilla.suse.com/1221677"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-09-10T07:43:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-1753"
    },
    {
      "cve": "CVE-2024-24786",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-24786"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-24786",
          "url": "https://www.suse.com/security/cve/CVE-2024-24786"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226136 for CVE-2024-24786",
          "url": "https://bugzilla.suse.com/1226136"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-09-10T07:43:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-24786"
    },
    {
      "cve": "CVE-2024-28180",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-28180"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-28180",
          "url": "https://www.suse.com/security/cve/CVE-2024-28180"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234984 for CVE-2024-28180",
          "url": "https://bugzilla.suse.com/1234984"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-09-10T07:43:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-28180"
    },
    {
      "cve": "CVE-2024-3727",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-3727"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-3727",
          "url": "https://www.suse.com/security/cve/CVE-2024-3727"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224112 for CVE-2024-3727",
          "url": "https://bugzilla.suse.com/1224112"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.4-150400.3.30.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.4-150400.3.30.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-09-10T07:43:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-3727"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…