- Issued:
- 2019-01-08
- Updated:
- 2019-01-08
RHSA-2019:0036 - Security Advisory
Synopsis
Important: source-to-image security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for source-to-image is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Source-to-Image (S2I) is a tool for building reproducible container images. It produces ready-to-run images by injecting a user source into a container image and assembling a new container image. The new image incorporates the base image (the builder) and built source, and is ready to use with the "docker run" command. S2I supports incremental builds, which re-use previously downloaded dependencies, previously built artifacts, and more.
The following packages have been upgraded to a later upstream version: source-to-image (1.1.13). (BZ#1654243)
Security Fix(es):
- source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go (CVE-2018-1102)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting this issue.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.7 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.6 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.5 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.4 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
Fixes
- BZ - 1336631 - Incorrect file name in s2i build help page for flag --use-config
- BZ - 1450131 - RFE: Update official RPMs to enable the --runtime-image feature
- BZ - 1562246 - CVE-2018-1102 source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
CVEs
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.7
SRPM | |
---|---|
source-to-image-1.1.13-1.el7.src.rpm | SHA-256: c84ca0609f39947512a627b5bc1df0a73211c833e28cea5dfe7bbf2c7245cab2 |
x86_64 | |
source-to-image-1.1.13-1.el7.x86_64.rpm | SHA-256: 08cdc61646095116e1fa25fac06b4393a4c78642979c6de2367897bc6a127790 |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.6
SRPM | |
---|---|
source-to-image-1.1.13-1.el7.src.rpm | SHA-256: c84ca0609f39947512a627b5bc1df0a73211c833e28cea5dfe7bbf2c7245cab2 |
x86_64 | |
source-to-image-1.1.13-1.el7.x86_64.rpm | SHA-256: 08cdc61646095116e1fa25fac06b4393a4c78642979c6de2367897bc6a127790 |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.5
SRPM | |
---|---|
source-to-image-1.1.13-1.el7.src.rpm | SHA-256: c84ca0609f39947512a627b5bc1df0a73211c833e28cea5dfe7bbf2c7245cab2 |
x86_64 | |
source-to-image-1.1.13-1.el7.x86_64.rpm | SHA-256: 08cdc61646095116e1fa25fac06b4393a4c78642979c6de2367897bc6a127790 |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.4
SRPM | |
---|---|
source-to-image-1.1.13-1.el7.src.rpm | SHA-256: c84ca0609f39947512a627b5bc1df0a73211c833e28cea5dfe7bbf2c7245cab2 |
x86_64 | |
source-to-image-1.1.13-1.el7.x86_64.rpm | SHA-256: 08cdc61646095116e1fa25fac06b4393a4c78642979c6de2367897bc6a127790 |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7
SRPM | |
---|---|
source-to-image-1.1.13-1.el7.src.rpm | SHA-256: c84ca0609f39947512a627b5bc1df0a73211c833e28cea5dfe7bbf2c7245cab2 |
x86_64 | |
source-to-image-1.1.13-1.el7.x86_64.rpm | SHA-256: 08cdc61646095116e1fa25fac06b4393a4c78642979c6de2367897bc6a127790 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.