<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for buildah</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2022:3655-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-10-19T10:34:23Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-10-19T10:34:23Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-10-19T10:34:23Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for buildah</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for buildah fixes the following issues:
  
Buildah was updated to version 1.27.1:

- CVE-2021-20206: Fixed an issue in libcni that could allow an attacker
  to execute arbitrary binaries on the host (bsc#1181961).
- CVE-2020-10696: Fixed an issue that could lead to files being
  overwritten during the image building process (bsc#1167864).
- CVE-2022-2990: Fixed a possible information disclosure and modification (bsc#1202812).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2022-3655,SUSE-SLE-Module-Containers-15-SP4-2022-3655,openSUSE-SLE-15.4-2022-3655</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223655-1/</URL>
      <Description>Link for SUSE-SU-2022:3655-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2022-October/012578.html</URL>
      <Description>E-Mail link for SUSE-SU-2022:3655-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167864</URL>
      <Description>SUSE Bug 1167864</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181961</URL>
      <Description>SUSE Bug 1181961</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202812</URL>
      <Description>SUSE Bug 1202812</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10696/</URL>
      <Description>SUSE CVE CVE-2020-10696 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20206/</URL>
      <Description>SUSE CVE CVE-2021-20206 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2990/</URL>
      <Description>SUSE CVE CVE-2022-2990 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Containers 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 15 SP4" CPE="cpe:/o:suse:sle-module-containers:15:sp4">SUSE Linux Enterprise Module for Containers 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="buildah-1.27.1-150400.3.8.1">
      <FullProductName ProductID="buildah-1.27.1-150400.3.8.1">buildah-1.27.1-150400.3.8.1</FullProductName>
    </Branch>
    <Relationship ProductReference="buildah-1.27.1-150400.3.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 15 SP4:buildah-1.27.1-150400.3.8.1">buildah-1.27.1-150400.3.8.1 as a component of SUSE Linux Enterprise Module for Containers 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="buildah-1.27.1-150400.3.8.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:buildah-1.27.1-150400.3.8.1">buildah-1.27.1-150400.3.8.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.</Note>
    </Notes>
    <CVE>CVE-2020-10696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP4:buildah-1.27.1-150400.3.8.1</ProductID>
        <ProductID>openSUSE Leap 15.4:buildah-1.27.1-150400.3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223655-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10696.html</URL>
        <Description>CVE-2020-10696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1167864</URL>
        <Description>SUSE Bug 1167864</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2021-20206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP4:buildah-1.27.1-150400.3.8.1</ProductID>
        <ProductID>openSUSE Leap 15.4:buildah-1.27.1-150400.3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223655-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20206.html</URL>
        <Description>CVE-2021-20206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181961</URL>
        <Description>SUSE Bug 1181961</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.</Note>
    </Notes>
    <CVE>CVE-2022-2990</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP4:buildah-1.27.1-150400.3.8.1</ProductID>
        <ProductID>openSUSE Leap 15.4:buildah-1.27.1-150400.3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223655-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2990.html</URL>
        <Description>CVE-2022-2990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202812</URL>
        <Description>SUSE Bug 1202812</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
