Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update module github.com/containers/common to v0.60.4 [security] (v1.2) #3014

Merged

Conversation

cilium-renovate[bot]
Copy link
Contributor

This PR contains the following updates:

Package Type Update Change
github.com/containers/common require patch v0.60.2 -> v0.60.4

Link Following in github.com/containers/common

CVE-2024-9341 / GHSA-mc76-5925-c5p6 / GO-2024-3171

More information

Details

Link Following in github.com/containers/common

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Link Following in github.com/containers/common

CVE-2024-9341 / GHSA-mc76-5925-c5p6 / GO-2024-3171

More information

Details

A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.

Severity

  • CVSS Score: 5.4 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

containers/common (github.com/containers/common)

v0.60.4

Compare Source

What's Changed

Full Changelog: containers/common@v0.60.3...v0.60.4

v0.60.3

Compare Source

What's Changed

Full Changelog: containers/common@v0.60.2...v0.60.3


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

…urity]

Signed-off-by: cilium-renovate[bot] <134692979 cilium-renovate[bot]@users.noreply.github.com>
@cilium-renovate cilium-renovate bot requested a review from a team as a code owner October 18, 2024 11:39
@cilium-renovate cilium-renovate bot added release-blocker This PR or issue is blocking the next release. release-note/dependency This PR updates one or multiple dependencies labels Oct 18, 2024
@cilium-renovate cilium-renovate bot requested review from jrfastab and removed request for a team October 18, 2024 11:39
@kkourt kkourt merged commit 32f026c into v1.2 Oct 18, 2024
42 checks passed
@kkourt kkourt deleted the renovate/v1.2-go-github.com-containers-common-vulnerability branch October 18, 2024 12:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
release-blocker This PR or issue is blocking the next release. release-note/dependency This PR updates one or multiple dependencies
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant