[FEDORA-2023-327346caa5] Fedora 39: podman-tui
Severity
High
Affected Packages
1
CVEs
3
podman-tui v0.12.0 + security fix for CVE-2023-39325 and CVE-2022-41717 and
CVE-2022-41723
Package | Affected Version |
---|---|
pkg:rpm/fedora/podman-tui?distro=fedora-39 | < 0.12.0.1.fc39 |
- ID
- FEDORA-2023-327346caa5
- Severity
- high
- Severity from
- CVE-2023-39325
- URL
- https://bodhi.fedoraproject.org/updates/FEDORA-2023-327346caa5
- Published
-
2023-11-20T01:22:12
(10 months ago) - Modified
-
2023-11-20T01:22:12
(10 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1731
- ALAS-2023-1825
- ALAS-2023-1848
- ALAS-2023-1849
- ALAS-2023-1866
- ALAS-2023-1871
- ALAS-2023-1881
- ALAS-2024-1920
- ALAS2-2023-1926
- ALAS2-2023-2015
- ALAS2-2023-2143
- ALAS2-2023-2192
- ALAS2-2023-2193
- ALAS2-2023-2194
- ALAS2-2023-2238
- ALAS2-2023-2303
- ALAS2-2023-2313
- ALAS2-2023-2324
- ALAS2-2023-2325
- ALAS2-2023-2326
- ALAS2-2023-2339
- ALAS2-2024-2424
- ALAS2-2024-2458
- ALPINE:CVE-2022-41717
- ALPINE:CVE-2022-41723
- ALPINE:CVE-2023-39325
- ALSA-2023:2204
- ALSA-2023:2222
- ALSA-2023:2236
- ALSA-2023:2253
- ALSA-2023:2282
- ALSA-2023:2283
- ALSA-2023:2357
- ALSA-2023:2367
- ALSA-2023:2758
- ALSA-2023:2780
- ALSA-2023:2802
- ALSA-2023:2866
- ALSA-2023:5721
- ALSA-2023:5738
- ALSA-2023:5863
- ALSA-2023:5867
- ALSA-2023:6077
- ALSA-2023:6346
- ALSA-2023:6363
- ALSA-2023:6402
- ALSA-2023:6420
- ALSA-2023:6473
- ALSA-2023:6474
- ALSA-2023:6938
- ALSA-2023:6939
- ELSA-2023-13028
- ELSA-2023-13029
- ELSA-2023-13053
- ELSA-2023-13054
- ELSA-2023-18908
- ELSA-2023-2204
- ELSA-2023-2222
- ELSA-2023-2253
- ELSA-2023-2282
- ELSA-2023-2283
- ELSA-2023-2357
- ELSA-2023-2367
- ELSA-2023-2758
- ELSA-2023-2780
- ELSA-2023-2802
- ELSA-2023-2866
- ELSA-2023-5721
- ELSA-2023-5738
- ELSA-2023-5863
- ELSA-2023-5867
- ELSA-2023-6363
- ELSA-2023-6402
- ELSA-2023-6420
- ELSA-2023-6473
- ELSA-2023-6474
- ELSA-2023-6938
- ELSA-2023-6939
- FEDORA-2023-0c354a3f9a
- FEDORA-2023-0d46257314
- FEDORA-2023-0fa7715821
- FEDORA-2023-0fff8bc164
- FEDORA-2023-257f33c602
- FEDORA-2023-2663dc67d8
- FEDORA-2023-267503a090
- FEDORA-2023-28c182b657
- FEDORA-2023-2df9d60e4c
- FEDORA-2023-322314ad50
- FEDORA-2023-3737bc1c0a
- FEDORA-2023-3a895ff65c
- FEDORA-2023-3baf3f43a0
- FEDORA-2023-3dba09f630
- FEDORA-2023-4bf641255e
- FEDORA-2023-4e2068ba5d
- FEDORA-2023-5029b92850
- FEDORA-2023-548163deb1
- FEDORA-2023-5eca6a8326
- FEDORA-2023-62ce942e75
- FEDORA-2023-6550d9323b
- FEDORA-2023-66966ae3d0
- FEDORA-2023-6cfe7492c1
- FEDORA-2023-6d71ff268e
- FEDORA-2023-6f4c5b6331
- FEDORA-2023-70eb8ba61e
- FEDORA-2023-74e5545901
- FEDORA-2023-822aab0a5a
- FEDORA-2023-8b700042ac
- FEDORA-2023-8c02aee138
- FEDORA-2023-8ecc0e487e
- FEDORA-2023-946dfaf17f
- FEDORA-2023-a5a5542890
- FEDORA-2023-aa7c75ed4a
- FEDORA-2023-abb47e24d8
- FEDORA-2023-ac4651c9b2
- FEDORA-2023-af2e3d1c18
- FEDORA-2023-b43faebc9f
- FEDORA-2023-b60ff8c9ec
- FEDORA-2023-b75ee820ce
- FEDORA-2023-c0149844e2
- FEDORA-2023-c858d2c53b
- FEDORA-2023-c9b2182a4e
- FEDORA-2023-ca444fdecf
- FEDORA-2023-cb20f08a4e
- FEDORA-2023-cb3a59a3df
- FEDORA-2023-ccaf5538dd
- FEDORA-2023-ce2836acfa
- FEDORA-2023-d58c8eeb7c
- FEDORA-2023-e16469fdec
- FEDORA-2023-e359fd31d2
- FEDORA-2023-e3e4e3f51a
- FEDORA-2023-e82fd2abcb
- FEDORA-2023-e8c27ba884
- FEDORA-2023-ee472c698c
- FEDORA-2023-f4bd7ab2f7
- FEDORA-2023-fa2d7b25d9
- FEDORA-2023-fa2ec3d3e0
- FEDORA-2023-fe53e13b5b
- FEDORA-2024-07c811c7a5
- FEDORA-2024-0ac454dafc
- FEDORA-2024-0d4d9925a2
- FEDORA-2024-35c28f59d1
- FEDORA-2024-5d8e87ec66
- FEDORA-2024-80e062d21a
- FEDORA-2024-9cc0e0c63e
- FEDORA-2024-ae653fb07b
- FEDORA-2024-b85b97c0e9
- FEDORA-2024-c3e32c5635
- FEDORA-2024-cafa04a149
- FEDORA-2024-d652859efb
- FEDORA-2024-f99ecead66
- FEDORA-2024-fb32950d11
- FEDORA-2024-fd3545a844
- FREEBSD:3D73E384-AD1F-11ED-983C-83FE35862E3A
- FREEBSD:6F5192F5-75A7-11ED-83C0-411D43CE7FE4
- FREEBSD:7A1B2624-6A89-11EE-AF06-5404A68AD561
- GLSA-202311-09
- GO-2022-1144
- GO-2023-1571
- GO-2023-2102
- MS:CVE-2022-41717
- MS:CVE-2022-41723
- openSUSE-SU-2023:0360-1
- RHBA-2023:2181
- RHSA-2023:0328
- RHSA-2023:0446
- RHSA-2023:2204
- RHSA-2023:2222
- RHSA-2023:2236
- RHSA-2023:2253
- RHSA-2023:2282
- RHSA-2023:2283
- RHSA-2023:2357
- RHSA-2023:2367
- RHSA-2023:2758
- RHSA-2023:2780
- RHSA-2023:2802
- RHSA-2023:2866
- RHSA-2023:3083
- RHSA-2023:5721
- RHSA-2023:5738
- RHSA-2023:5835
- RHSA-2023:5863
- RHSA-2023:5867
- RHSA-2023:6077
- RHSA-2023:6346
- RHSA-2023:6363
- RHSA-2023:6402
- RHSA-2023:6420
- RHSA-2023:6473
- RHSA-2023:6474
- RHSA-2023:6938
- RHSA-2023:6939
- RHSA-2023:7058
- RLSA-2023:5863
- RLSA-2023:6077
- SUSE-SU-2022:4397-1
- SUSE-SU-2022:4398-1
- SUSE-SU-2023:0733-1
- SUSE-SU-2023:0735-1
- SUSE-SU-2023:0811-1
- SUSE-SU-2023:0812-1
- SUSE-SU-2023:0821-1
- SUSE-SU-2023:0869-1
- SUSE-SU-2023:0871-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2598-1
- SUSE-SU-2023:3867-1
- SUSE-SU-2023:3868-1
- SUSE-SU-2023:3875-1
- SUSE-SU-2023:4068-1
- SUSE-SU-2023:4069-1
- SUSE-SU-2023:4124-1
- SUSE-SU-2023:4469-1
- SUSE-SU-2023:4472-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:3094-1
- SUSE-SU-2024:3097-1
- SUSE-SU-2024:3098-1
- SUSE-SU-2024:3288-1
- USN-6038-1
- USN-6038-2
- USN-6574-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2248400 | Bug #2248400 - podman-tui: golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-39325) [fedora-all] | https://bugzilla.redhat.com/show_bug.cgi?id=2248400 |
Bugzilla | 2163285 | Bug #2163285 - CVE-2022-41717 podman-tui: golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests [fedora-all] | https://bugzilla.redhat.com/show_bug.cgi?id=2163285 |
Bugzilla | 2178479 | Bug #2178479 - CVE-2022-41723 podman-tui: golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding [fedora-all] | https://bugzilla.redhat.com/show_bug.cgi?id=2178479 |
Bugzilla | 2174538 | Bug #2174538 - podman-tui: containerd: Supplementary groups are not set up properly [fedora-all] | https://bugzilla.redhat.com/show_bug.cgi?id=2174538 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/fedora/podman-tui?distro=fedora-39 | fedora | podman-tui | < 0.12.0.1.fc39 | fedora-39 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |