You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa source-to-image

Sigurnosni nedostatak programskog paketa source-to-image

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: source-to-image security, bug fix, and enhancement update
Advisory ID: RHSA-2019:0036-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0036
Issue date: 2019-01-08
CVE Names: CVE-2018-1102
=====================================================================

1. Summary:

An update for source-to-image is now available for Red Hat Software
Collections.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) – x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) – x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) – x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) – x86_64

3. Description:

Source-to-Image (S2I) is a tool for building reproducible container images.
It produces ready-to-run images by injecting a user source into a container
image and assembling a new container image. The new image incorporates the
base image (the builder) and built source, and is ready to use with the
“docker run” command. S2I supports incremental builds, which re-use
previously downloaded dependencies, previously built artifacts, and more.

The following packages have been upgraded to a later upstream version:
source-to-image (1.1.13). (BZ#1654243)

Security Fix(es):

* source-to-image: Improper path sanitization in
ExtractTarStreamFromTarReader in tar/tar.go (CVE-2018-1102)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting
this issue.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1336631 – Incorrect file name in s2i build help page for flag –use-config
1450131 – RFE: Update official RPMs to enable the –runtime-image feature
1562246 – CVE-2018-1102 source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go

6. Package List:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
source-to-image-1.1.13-1.el7.src.rpm

x86_64:
source-to-image-1.1.13-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4):

Source:
source-to-image-1.1.13-1.el7.src.rpm

x86_64:
source-to-image-1.1.13-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):

Source:
source-to-image-1.1.13-1.el7.src.rpm

x86_64:
source-to-image-1.1.13-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):

Source:
source-to-image-1.1.13-1.el7.src.rpm

x86_64:
source-to-image-1.1.13-1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-1102
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=3gkI
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa krb5

Otkriven je sigurnosni nedostatak u programskom paketu krb5 za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja....

Close