2024-04-16 14:26:14 +00:00

134 lines
5.2 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20244646",
"Version": "oval:org.altlinux.errata:def:20244646",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-4646: package `buildah` update to version 1.34.3-alt0.p10",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-4646",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-4646",
"Source": "ALTPU"
},
{
"RefID": "BDU:2024-02163",
"RefURL": "https://bdu.fstec.ru/vul/2024-02163",
"Source": "BDU"
},
{
"RefID": "CVE-2024-1753",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753",
"Source": "CVE"
},
{
"RefID": "CVE-2024-24786",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786",
"Source": "CVE"
}
],
"Description": "This update upgrades buildah to version 1.34.3-alt0.p10. \nSecurity Fix(es):\n\n * BDU:2024-02163: Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии\n\n * CVE-2024-1753: A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.\n\n * CVE-2024-24786: The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-04-01"
},
"Updated": {
"Date": "2024-04-01"
},
"BDUs": [
{
"ID": "BDU:2024-02163",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2024-02163",
"Impact": "High",
"Public": "20240318"
}
],
"CVEs": [
{
"ID": "CVE-2024-1753",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753",
"Impact": "None",
"Public": "20240318"
},
{
"ID": "CVE-2024-24786",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786",
"Impact": "None",
"Public": "20240305"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20244646001",
"Comment": "buildah is earlier than 0:1.34.3-alt0.p10"
}
]
}
]
}
}
]
}