<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for buildah is now available for openEuler-24.03-LTS-SP2</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-2177</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-09-05</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-09-05</InitialReleaseDate>
		<CurrentReleaseDate>2025-09-05</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-09-05</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">buildah security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for buildah is now available for openEuler-24.03-LTS-SP2</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">The  package provides a command line tool which can be used to * create a working container from scratch or * create a working container from an image as a starting point * mount/umount a working container&amp;apos;s root file system for manipulation * save container&amp;apos;s root file system layer to create a new image * delete a working container or an image

Security Fix(es):

Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code used strings.Split(token, &quot;.&quot;) to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters.  An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service. Version 4.0.5 fixes this issue. As a workaround, applications could pre-validate that payloads passed to Go JOSE do not contain an excessive number of `.` characters.(CVE-2025-27144)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for buildah is now available for openEuler-24.03-LTS-SP2.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">buildah</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2177</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-27144</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-27144</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openEuler-24.03-LTS-SP2</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="buildah-1.34.1-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">buildah-1.34.1-7.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="buildah-debuginfo-1.34.1-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">buildah-debuginfo-1.34.1-7.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="buildah-debugsource-1.34.1-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">buildah-debugsource-1.34.1-7.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="buildah-tests-1.34.1-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">buildah-tests-1.34.1-7.oe2403sp2.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="buildah-1.34.1-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">buildah-1.34.1-7.oe2403sp2.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="buildah-1.34.1-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">buildah-1.34.1-7.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="buildah-debuginfo-1.34.1-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">buildah-debuginfo-1.34.1-7.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="buildah-debugsource-1.34.1-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">buildah-debugsource-1.34.1-7.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="buildah-tests-1.34.1-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">buildah-tests-1.34.1-7.oe2403sp2.x86_64.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code used strings.Split(token, &quot;.&quot;) to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters.  An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service. Version 4.0.5 fixes this issue. As a workaround, applications could pre-validate that payloads passed to Go JOSE do not contain an excessive number of `.` characters.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-27144</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>buildah security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2177</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>