|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2024:9459-01 (buildah)

An update for buildah is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

The buildah package provides a tool for facilitating building OCI container
images. Among other things, buildah enables you to: Create a working
container, either from scratch or using an image as a starting point; Create
an image, either from a working container or using the instructions in a
Dockerfile; Build both Docker and OCI images. 

Security Fix(es):

* go/parser: golang: Calling any of the Parse functions containing deeply
nested literals can cause a panic/stack exhaustion (CVE-2024-34155)

* encoding/gob: golang: Calling Decoder.Decode on a message which contains
deeply nested structures can cause a panic due to stack exhaustion
(CVE-2024-34156)

* go/build/constraint: golang: Calling Parse on a "// +build" build tag line
with deeply nested expressions can cause a panic due to stack exhaustion
(CVE-2024-34158)

* Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in
containers/common Go Library (CVE-2024-9341)

* Buildah: Podman: Improper Input Validation in bind-propagation Option of
Dockerfile RUN --mount Instruction (CVE-2024-9407)

* buildah: Buildah allows arbitrary directory mount (CVE-2024-9675)

* Podman: Buildah: CRI-O: symlink traversal vulnerability in the
containers/storage library can cause Denial of Service (DoS) (CVE-2024-9676)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0
International License (https://creativecommons.org/licenses/by/4.0/). If you
distribute this content, or a modified version of it, you must provide
attribution to Red Hat Inc. and provide a link to the original.

Original: https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_9459.json


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds