<div class="container">
    <h1>Security update for buildah</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2024:3186-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221243">bsc#1221243</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221677">bsc#1221677</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224117">bsc#1224117</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-1753.html">CVE-2024-1753</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-24786.html">CVE-2024-24786</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-28180.html">CVE-2024-28180</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-3727.html">CVE-2024-3727</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-1753</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-24786</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-3727</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves four vulnerabilities can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for buildah fixes the following issues:</p>
<p>Update to version 1.35.4:</p>
<ul>
<li>CVE-2024-3727 updates (bsc#1224117)</li>
<li>Bump go-jose CVE-2024-28180</li>
<li>Bump ocicrypt and go-jose CVE-2024-28180</li>
</ul>
<p>Update to version 1.35.3:</p>
<ul>
<li>correctly configure /etc/hosts and resolv.conf</li>
<li>buildah: refactor resolv/hosts setup.</li>
<li>rename the hostFile var to reflect</li>
<li>CVE-2024-24786 protobuf to 1.33</li>
</ul>
<p>Update to version 1.35.1:</p>
<ul>
<li>
<p>CVE-2024-1753 container escape fix (bsc#1221677)</p>
</li>
<li>
<p>Buildah dropped cni support, require netavark instead (bsc#1221243)</p>
</li>
<li>
<p>Remove obsolete requires libcontainers-image & libcontainers-storage</p>
</li>
<li>
<p>Require passt for rootless networking (poo#156955)
  Buildah moved to passt/pasta for rootless networking from slirp4netns
  (https://github.com/containers/common/pull/1846)</p>
</li>
</ul>
<p>Update to version 1.35.0:</p>
<ul>
<li>Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0</li>
<li>conformance tests: don&#x27;t break on trailing zeroes in layer blobs</li>
<li>Add a conformance test for copying to a mounted prior stage</li>
<li>cgroups: reuse version check from c/common</li>
<li>Update vendor of containers/(common,image)</li>
<li>manifest add: complain if we get artifact flags without --artifact</li>
<li>Use retry logic from containers/common</li>
<li>Vendor in containers/(storage,image,common)</li>
<li>Update module golang.org/x/crypto to v0.20.0</li>
<li>Add comment re: Total Success task name</li>
<li>tests: skip_if_no_unshare(): check for --setuid</li>
<li>Properly handle build --pull=false</li>
<li>Update module go.etcd.io/bbolt to v1.3.9</li>
<li>Update module github.com/opencontainers/image-spec to v1.1.0</li>
<li>build --all-platforms: skip some base "image" platforms</li>
<li>Bump main to v1.35.0-dev</li>
<li>Vendor in latest containers/(storage,image,common)</li>
<li>Split up error messages for missing --sbom related flags</li>
<li><code>buildah manifest</code>: add artifact-related options</li>
<li>cmd/buildah/manifest.go: lock lists before adding/annotating/pushing</li>
<li>cmd/buildah/manifest.go: don&#x27;t make struct declarations aliases</li>
<li>Use golang.org/x/exp/slices.Contains</li>
<li>Try Cirrus with a newer VM version</li>
<li>Set CONTAINERS_CONF in the chroot-mount-flags integration test</li>
<li>Update to match dependency API update</li>
<li>Update github.com/openshift/imagebuilder and containers/common</li>
<li>docs: correct default authfile path</li>
<li>tests: retrofit test for heredoc summary</li>
<li>build, heredoc: show heredoc summary in build output</li>
<li>manifest, push: add support for --retry and --retry-delay</li>
<li>imagebuildah: fix crash with empty RUN</li>
<li>Make buildah match podman for handling of ulimits</li>
<li>docs: move footnotes to where they&#x27;re applicable</li>
<li>Allow users to specify no-dereference</li>
<li>docs: use reversed logo for dark theme in README</li>
<li>build,commit: add --sbom to scan and produce SBOMs when committing</li>
<li>commit: force omitHistory if the parent has layers but no history</li>
<li>docs: fix a couple of typos</li>
<li>internal/mkcw.Archive(): handle extra image content</li>
<li>stage_executor,heredoc: honor interpreter in heredoc</li>
<li>stage_executor,layers: burst cache if heredoc content is changed</li>
<li>Replace map[K]bool with map[K]struct{} where it makes sense</li>
<li>Bump CI VMs</li>
<li>Replace strings.SplitN with strings.Cut</li>
<li>Document use of containers-transports values in buildah</li>
<li>manifest: addCompression use default from containers.conf</li>
<li>commit: add a --add-file flag</li>
<li>mkcw: populate the rootfs using an overlay</li>
<li>[skip-ci] Update actions/stale action to v9</li>
<li>Ignore errors if label.Relabel returns ENOSUP</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3186=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server for SAP Applications 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3186=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap 15.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-2024-3186=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3186=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3186=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>buildah-1.35.4-150400.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
                    <ul>
                        
                            <li>buildah-1.35.4-150400.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
                    <ul>
                        
                            <li>buildah-1.35.4-150400.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64)
                    <ul>
                        
                            <li>buildah-1.35.4-150400.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64)
                    <ul>
                        
                            <li>buildah-1.35.4-150400.3.30.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-1753.html">https://www.suse.com/security/cve/CVE-2024-1753.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-24786.html">https://www.suse.com/security/cve/CVE-2024-24786.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-28180.html">https://www.suse.com/security/cve/CVE-2024-28180.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-3727.html">https://www.suse.com/security/cve/CVE-2024-3727.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221243">https://bugzilla.suse.com/show_bug.cgi?id=1221243</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221677">https://bugzilla.suse.com/show_bug.cgi?id=1221677</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224117">https://bugzilla.suse.com/show_bug.cgi?id=1224117</a>
                    </li>
                
            
        </ul>
    
</div>