133 lines
5.9 KiB
JSON
133 lines
5.9 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20244649",
|
||
"Version": "oval:org.altlinux.errata:def:20244649",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2024-4649: package `buildah` update to version 1.34.3-alt0.p10",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c10f2"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2024-4649",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-4649",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-02163",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-02163",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-27651",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27651",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2990",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2990",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-1753",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-24786",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades buildah to version 1.34.3-alt0.p10. \nSecurity Fix(es):\n\n * BDU:2024-02163: Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии\n\n * CVE-2022-27651: A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. This has the potential to impact confidentiality and integrity.\n\n * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.\n\n * CVE-2024-1753: A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.\n\n * CVE-2024-24786: The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2024-04-02"
|
||
},
|
||
"Updated": {
|
||
"Date": "2024-04-02"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2024-02163",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-02163",
|
||
"Impact": "High",
|
||
"Public": "20240318"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2022-27651",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27651",
|
||
"Impact": "Low",
|
||
"Public": "20220404"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2990",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-842",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2990",
|
||
"Impact": "High",
|
||
"Public": "20220913"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-1753",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753",
|
||
"Impact": "None",
|
||
"Public": "20240318"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-24786",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786",
|
||
"Impact": "None",
|
||
"Public": "20240305"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:10",
|
||
"cpe:/o:alt:spserver:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:5001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20244649001",
|
||
"Comment": "buildah is earlier than 0:1.34.3-alt0.p10"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |