ALT-BU-2024-7138-1
Branch c10f1 update bulletin.
Closed vulnerabilities
BDU:2024-02163
Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2022-27651
A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. This has the potential to impact confidentiality and integrity.
- https://bugzilla.redhat.com/show_bug.cgi?id=2066840
- https://bugzilla.redhat.com/show_bug.cgi?id=2066840
- https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b
- https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b
- https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h
- https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h
- FEDORA-2022-1a15fe81f0
- FEDORA-2022-1a15fe81f0
- FEDORA-2022-224a93852c
- FEDORA-2022-224a93852c
- FEDORA-2022-e6388650ea
- FEDORA-2022-e6388650ea
Modified: 2024-11-21
CVE-2022-2990
An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
- https://bugzilla.redhat.com/show_bug.cgi?id=2121453
- https://bugzilla.redhat.com/show_bug.cgi?id=2121453
- https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
- https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Modified: 2024-11-26
CVE-2024-1753
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
- RHSA-2024:2049
- RHSA-2024:2055
- RHSA-2024:2064
- RHSA-2024:2066
- RHSA-2024:2077
- RHSA-2024:2084
- RHSA-2024:2089
- RHSA-2024:2090
- RHSA-2024:2097
- RHSA-2024:2098
- RHSA-2024:2548
- RHSA-2024:2645
- RHSA-2024:2669
- RHSA-2024:2672
- RHSA-2024:2784
- RHSA-2024:2877
- RHSA-2024:3254
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHBZ#2265513
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://pkg.go.dev/vuln/GO-2024-2658
- RHSA-2024:2049
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- RHBZ#2265513
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHSA-2024:3254
- RHSA-2024:2877
- RHSA-2024:2784
- RHSA-2024:2672
- RHSA-2024:2669
- RHSA-2024:2645
- RHSA-2024:2548
- RHSA-2024:2098
- RHSA-2024:2097
- RHSA-2024:2090
- RHSA-2024:2089
- RHSA-2024:2084
- RHSA-2024:2077
- RHSA-2024:2066
- RHSA-2024:2064
- RHSA-2024:2055
Modified: 2024-11-21
CVE-2024-24786
The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.
- http://www.openwall.com/lists/oss-security/2024/03/08/4
- http://www.openwall.com/lists/oss-security/2024/03/08/4
- https://go.dev/cl/569356
- https://go.dev/cl/569356
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDMBHAVSDU2FBDZ45U3A2VLSM35OJ2HU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDMBHAVSDU2FBDZ45U3A2VLSM35OJ2HU/
- https://pkg.go.dev/vuln/GO-2024-2611
- https://pkg.go.dev/vuln/GO-2024-2611
- https://security.netapp.com/advisory/ntap-20240517-0002/
- https://security.netapp.com/advisory/ntap-20240517-0002/
Closed vulnerabilities
BDU:2023-07200
Уязвимость функции externalSortTags (sort.c) утилиты создания индексов файлов для исходного кода программы Exuberant Ctags, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2014-7204
jscript.c in Exuberant Ctags 5.8 allows remote attackers to cause a denial of service (infinite loop and CPU and disk consumption) via a crafted JavaScript file.
- http://advisories.mageia.org/MGASA-2014-0415.html
- http://sourceforge.net/p/ctags/code/791/
- DSA-3042
- MDVSA-2015:178
- [oss-security] 20140929 CVE request: exuberant-ctags: CPU/disk DoS on minified JavaScript file
- USN-2371-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742605
- http://advisories.mageia.org/MGASA-2014-0415.html
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742605
- USN-2371-1
- [oss-security] 20140929 CVE request: exuberant-ctags: CPU/disk DoS on minified JavaScript file
- MDVSA-2015:178
- DSA-3042
- http://sourceforge.net/p/ctags/code/791/
Modified: 2024-11-21
CVE-2022-4515
A flaw was found in Exuberant Ctags in the way it handles the "-o" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way.
- [debian-lts-announce] 20221231 [SECURITY] [DLA 3254-1] exuberant-ctags security update
- [debian-lts-announce] 20221231 [SECURITY] [DLA 3254-1] exuberant-ctags security update
- https://sourceforge.net/p/ctags/code/HEAD/tree/tags/ctags-5.8/sort.c#l56
- https://sourceforge.net/p/ctags/code/HEAD/tree/tags/ctags-5.8/sort.c#l56