<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for buildah</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:3151-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-09-06T08:23:40Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-09-06T08:23:40Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-09-06T08:23:40Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for buildah</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for buildah fixes the following issues:

Update to version 1.35.4:

* Bump to Buildah v1.35.4
* CVE-2024-3727 updates (bsc#1224117)
* integration test: handle new labels in 'bud and test --unsetlabel'
* Bump go-jose CVE-2024-28180
* Bump ocicrypt and go-jose CVE-2024-28180

Update to version 1.35.3:

* correctly configure /etc/hosts and resolv.conf
* buildah: refactor resolv/hosts setup.
* CVE-2024-24786 protobuf to 1.33


Update to version 1.35.1:

* CVE-2024-1753 container escape fix (bsc#1221677)

- Buildah dropped cni support, require netavark instead (bsc#1221243)

- Remove obsolete requires libcontainers-image &amp; libcontainers-storage

- Require passt for rootless networking (poo#156955)
  Buildah moved to passt/pasta for rootless networking from slirp4netns
  (https://github.com/containers/common/pull/1846)

Update to version 1.35.0:

* Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0
* conformance tests: don't break on trailing zeroes in layer blobs
* Add a conformance test for copying to a mounted prior stage
* cgroups: reuse version check from c/common
* Update vendor of containers/(common,image)
* manifest add: complain if we get artifact flags without --artifact
* Use retry logic from containers/common
* Vendor in containers/(storage,image,common)
* Update module golang.org/x/crypto to v0.20.0
* Add comment re: Total Success task name
* tests: skip_if_no_unshare(): check for --setuid
* Properly handle build --pull=false
* [skip-ci] Update tim-actions/get-pr-commits action to v1.3.1
* Update module go.etcd.io/bbolt to v1.3.9
* Revert 'Reduce official image size'
* Update module github.com/opencontainers/image-spec to v1.1.0
* Reduce official image size
* Build with CNI support on FreeBSD
* build --all-platforms: skip some base 'image' platforms
* Bump main to v1.35.0-dev
* Vendor in latest containers/(storage,image,common)
* Split up error messages for missing --sbom related flags
* `buildah manifest`: add artifact-related options
* cmd/buildah/manifest.go: lock lists before adding/annotating/pushing
* cmd/buildah/manifest.go: don't make struct declarations aliases
* Use golang.org/x/exp/slices.Contains
* Disable loong64 again
* Fix a couple of typos in one-line comments
* egrep is obsolescent; use grep -E
* Try Cirrus with a newer VM version
* Set CONTAINERS_CONF in the chroot-mount-flags integration test
* Update to match dependency API update
* Update github.com/openshift/imagebuilder and containers/common
* docs: correct default authfile path
* tests: retrofit test for heredoc summary
* build, heredoc: show heredoc summary in build output
* manifest, push: add support for --retry and --retry-delay
* imagebuildah: fix crash with empty RUN
* Make buildah match podman for handling of ulimits
* docs: move footnotes to where they're applicable
* Allow users to specify no-dereference
* docs: use reversed logo for dark theme in README
* build,commit: add --sbom to scan and produce SBOMs when committing
* commit: force omitHistory if the parent has layers but no history
* docs: fix a couple of typos
* internal/mkcw.Archive(): handle extra image content
* stage_executor,heredoc: honor interpreter in heredoc
* stage_executor,layers: burst cache if heredoc content is changed
* Replace map[K]bool with map[K]struct{} where it makes sense
* Replace strings.SplitN with strings.Cut
* Document use of containers-transports values in buildah
* manifest: addCompression use default from containers.conf
* commit: add a --add-file flag
* mkcw: populate the rootfs using an overlay
* Ignore errors if label.Relabel returns ENOSUP</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-3151,SUSE-SLE-Module-Containers-15-SP5-2024-3151,SUSE-SLE-Module-Containers-15-SP6-2024-3151,openSUSE-SLE-15.5-2024-3151,openSUSE-SLE-15.6-2024-3151</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243151-1/</URL>
      <Description>Link for SUSE-SU-2024:3151-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:3151-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221243</URL>
      <Description>SUSE Bug 1221243</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221677</URL>
      <Description>SUSE Bug 1221677</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224117</URL>
      <Description>SUSE Bug 1224117</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-1753/</URL>
      <Description>SUSE CVE CVE-2024-1753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-24786/</URL>
      <Description>SUSE CVE CVE-2024-24786 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-28180/</URL>
      <Description>SUSE CVE CVE-2024-28180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-3727/</URL>
      <Description>SUSE CVE CVE-2024-3727 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Containers 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 15 SP5" CPE="cpe:/o:suse:sle-module-containers:15:sp5">SUSE Linux Enterprise Module for Containers 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Containers 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 15 SP6" CPE="cpe:/o:suse:sle-module-containers:15:sp6">SUSE Linux Enterprise Module for Containers 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="buildah-1.35.4-150500.3.10.1">
      <FullProductName ProductID="buildah-1.35.4-150500.3.10.1">buildah-1.35.4-150500.3.10.1</FullProductName>
    </Branch>
    <Relationship ProductReference="buildah-1.35.4-150500.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 15 SP5:buildah-1.35.4-150500.3.10.1">buildah-1.35.4-150500.3.10.1 as a component of SUSE Linux Enterprise Module for Containers 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="buildah-1.35.4-150500.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.4-150500.3.10.1">buildah-1.35.4-150500.3.10.1 as a component of SUSE Linux Enterprise Module for Containers 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="buildah-1.35.4-150500.3.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:buildah-1.35.4-150500.3.10.1">buildah-1.35.4-150500.3.10.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="buildah-1.35.4-150500.3.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:buildah-1.35.4-150500.3.10.1">buildah-1.35.4-150500.3.10.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.</Note>
    </Notes>
    <CVE>CVE-2024-1753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP5:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.5:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.6:buildah-1.35.4-150500.3.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-1753.html</URL>
        <Description>CVE-2024-1753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221677</URL>
        <Description>SUSE Bug 1221677</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.</Note>
    </Notes>
    <CVE>CVE-2024-24786</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP5:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.5:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.6:buildah-1.35.4-150500.3.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-24786.html</URL>
        <Description>CVE-2024-24786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226136</URL>
        <Description>SUSE Bug 1226136</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.
</Note>
    </Notes>
    <CVE>CVE-2024-28180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP5:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.5:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.6:buildah-1.35.4-150500.3.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-28180.html</URL>
        <Description>CVE-2024-28180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234984</URL>
        <Description>SUSE Bug 1234984</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.</Note>
    </Notes>
    <CVE>CVE-2024-3727</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP5:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.5:buildah-1.35.4-150500.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.6:buildah-1.35.4-150500.3.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-3727.html</URL>
        <Description>CVE-2024-3727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224112</URL>
        <Description>SUSE Bug 1224112</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
