CVE-2024-34158 Affecting buildah package, versions <2:1.37.5-1.el9_5
Threat Intelligence
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-BUILDAH-8224883
- published 16 Oct 2024
- disclosed 12 Nov 2024
Introduced: 16 Oct 2024
CVE-2024-34158 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
buildah
to version 2:1.37.5-1.el9_5 or higher.
This issue was patched in ALSA-2024:9459
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream buildah
package and not the buildah
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.
References
- https://errata.almalinux.org/8/ALSA-2024-6908.html
- https://errata.almalinux.org/9/ALSA-2024-6913.html
- https://errata.almalinux.org/8/ALSA-2024-8038.html
- https://errata.almalinux.org/9/ALSA-2024-8039.html
- https://errata.almalinux.org/9/ALSA-2024-8112.html
- https://errata.almalinux.org/9/ALSA-2024-9454.html
- https://errata.almalinux.org/9/ALSA-2024-9459.html
- https://access.redhat.com/security/cve/CVE-2024-34158
- https://access.redhat.com/errata/RHSA-2024:6908
- https://access.redhat.com/errata/RHSA-2024:6913
- https://access.redhat.com/errata/RHSA-2024:8038
- https://access.redhat.com/errata/RHSA-2024:8039
- https://access.redhat.com/errata/RHSA-2024:8112
- https://access.redhat.com/errata/RHSA-2024:9454
- https://access.redhat.com/errata/RHSA-2024:9459
- https://go.dev/cl/611240
- https://go.dev/issue/69141
- https://groups.google.com/g/golang-dev/c/S9POB9NCTdk
- https://pkg.go.dev/vuln/GO-2024-3107
- https://security.netapp.com/advisory/ntap-20241004-0003/
CVSS Scores
version 3.1