buildah-1.41.8-3.el9_7

エラータID: AXSA:2026-524:03

Release date: 
Monday, May 4, 2026 - 10:14
Subject: 
buildah-1.41.8-3.el9_7
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.

Security Fix(es):

* github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object (CVE-2026-34986)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2026-34986
Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. Prior to 4.1.4 and 3.0.5, decrypting a JSON Web Encryption (JWE) object will panic if the alg field indicates a key wrapping algorithm (one ending in KW, with the exception of A128GCMKW, A192GCMKW, and A256GCMKW) and the encrypted_key field is empty. The panic happens when cipher.KeyUnwrap() in key_wrap.go attempts to allocate a slice with a zero or negative length based on the length of the encrypted_key. This code path is reachable from ParseEncrypted() / ParseEncryptedJSON() / ParseEncryptedCompact() followed by Decrypt() on the resulting object. Note that the parse functions take a list of accepted key algorithms. If the accepted key algorithms do not include any key wrapping algorithms, parsing will fail and the application will be unaffected. This panic is also reachable by calling cipher.KeyUnwrap() directly with any ciphertext parameter less than 16 bytes long, but calling this function directly is less common. Panics can lead to denial of service. This vulnerability is fixed in 4.1.4 and 3.0.5.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. buildah-1.41.8-3.el9_7.src.rpm
    MD5: 98c947bb35e3fabd361bf5babe089206
    SHA-256: 3236026ffe38b42d4ae4641ce25484c1df70943bf1929f06cd32ad4f4d891ea7
    Size: 11.35 MB

Asianux Server 9 for x86_64
  1. buildah-1.41.8-3.el9_7.x86_64.rpm
    MD5: c8203f5497ad28821c049e245f420b9a
    SHA-256: 1d10a38d550f840fafb7d2592fd04010de06d9642e3a08034bf3e79665641937
    Size: 10.40 MB
  2. buildah-tests-1.41.8-3.el9_7.x86_64.rpm
    MD5: 08c2c76c5ce792539dc4648ef30a22b2
    SHA-256: 5ed1b412daab9143777ac5cd832f89de0f7a1d903a3946e3492c4baaa15b2f7d
    Size: 29.18 MB