[ELSA-2022-7954] podman security and bug fix update
[2:4.2.0-3.0.1]
- Drop nmap-ncat requirement and skip ignore-socket test case [Orabug: 34117404]
[2:4.2.0-3]
- fix dependency in test subpackage
- Related: #2061316
[2:4.2.0-2]
- readd catatonit
- Related: #2061316
[2:4.2.0-1]
- update to latest content of https://github.com/containers/podman/releases/tag/4.2.0
(https://github.com/containers/podman/commit/7fe5a419cfd2880df2028ad3d7fd9378a88a04f4)
- Related: #2061316
[2:4.2.0-0.3rc3]
- require catatonit for gating tests
- Related: #2061316
[2:4.2.0-0.2rc3]
- update to 4.2.0-rc3
- Related: #2061316
[2:4.2.0-0.1rc2]
- update to 4.2.0-rc2
- Related: #2061316
[2:4.1.1-6]
- convert catatonit dependency to soft dep as catatonit is
no longer in Appstream but in CRB
- Related: #2061316
[2:4.1.1-5]
- rebuild for combined gating with catatonit
- Related: #2097694
[2:4.1.1-4]
- catatonit is now a standalone package
- Related: #2097694
[2:4.1.1-3]
- update to the latest content of https://github.com/containers/podman/tree/v4.1.1-rhel
(https://github.com/containers/podman/commit/fa692a6)
- Related: #2097694
[2:4.1.1-2]
- be sure podman services/sockets are stopped upon package removal
- Related: #2061316
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/podman?distro=oraclelinux-9 | < 4.2.0-3.0.1.el9 |
pkg:rpm/oraclelinux/podman-tests?distro=oraclelinux-9 | < 4.2.0-3.0.1.el9 |
pkg:rpm/oraclelinux/podman-remote?distro=oraclelinux-9 | < 4.2.0-3.0.1.el9 |
pkg:rpm/oraclelinux/podman-plugins?distro=oraclelinux-9 | < 4.2.0-3.0.1.el9 |
pkg:rpm/oraclelinux/podman-gvproxy?distro=oraclelinux-9 | < 4.2.0-3.0.1.el9 |
pkg:rpm/oraclelinux/podman-docker?distro=oraclelinux-9 | < 4.2.0-3.0.1.el9 |
pkg:rpm/oraclelinux/podman-catatonit?distro=oraclelinux-9 | < 4.2.0-3.0.1.el9 |
- ID
- ELSA-2022-7954
- Severity
- moderate
- URL
- https://linux.oracle.com/errata/ELSA-2022-7954.html
- Published
-
2022-11-22T00:00:00
(22 months ago) - Modified
-
2022-11-22T00:00:00
(22 months ago) - Rights
- Copyright 2022 Oracle, Inc.
- Other Advisories
-
- ALAS-2021-1527
- ALAS-2022-1635
- ALAS-2023-1825
- ALAS2-2021-1694
- ALAS2-2022-1830
- ALAS2-2022-1846
- ALAS2-2022-1847
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALAS2-2023-2238
- ALBA-2022:0348
- ALPINE:CVE-2021-20199
- ALPINE:CVE-2021-33197
- ALPINE:CVE-2021-34558
- ALPINE:CVE-2021-4024
- ALPINE:CVE-2022-27191
- ALSA-2021:1796
- ALSA-2021:3076
- ALSA-2021:4154
- ALSA-2021:4156
- ALSA-2021:4226
- ALSA-2022:7129
- ALSA-2022:7469
- ALSA-2022:7954
- ALSA-2022:7955
- ALSA-2022:8008
- ASA-202106-42
- ASA-202107-42
- ELSA-2021-1796
- ELSA-2021-3076
- ELSA-2021-4154
- ELSA-2021-4226
- ELSA-2022-7129
- ELSA-2022-7457
- ELSA-2022-7469
- ELSA-2022-7955
- ELSA-2022-8008
- ELSA-2024-2988
- FEDORA-2021-07e4d20196
- FEDORA-2021-1bfb61f77c
- FEDORA-2021-25c0011e78
- FEDORA-2021-3a55403080
- FEDORA-2021-47d259d3cf
- FEDORA-2021-54f88bebd4
- FEDORA-2021-6ac9b98f9e
- FEDORA-2021-6bc3fe7129
- FEDORA-2021-6bd024d2a7
- FEDORA-2021-83b3740389
- FEDORA-2021-a3703b9dc8
- FEDORA-2021-c35235c250
- FEDORA-2021-c56a213327
- FEDORA-2021-ec00da7faa
- FEDORA-2021-ffa749f7f7
- FEDORA-2022-08ae2dd481
- FEDORA-2022-13ad572b5a
- FEDORA-2022-14712f9699
- FEDORA-2022-30c5ed5625
- FEDORA-2022-3969b64d4b
- FEDORA-2022-3a63897745
- FEDORA-2022-3e1ade35db
- FEDORA-2022-4a48180f3f
- FEDORA-2022-4b5537c44c
- FEDORA-2022-5038c3236c
- FEDORA-2022-53e0f427dd
- FEDORA-2022-5cbd6de569
- FEDORA-2022-5e637f6cc6
- FEDORA-2022-5ef0bd9a27
- FEDORA-2022-6716cd0da2
- FEDORA-2022-739c7a0058
- FEDORA-2022-741325e9a0
- FEDORA-2022-8bf5635efc
- FEDORA-2022-9986fbb3d7
- FEDORA-2022-9a9a638d09
- FEDORA-2022-a4c9009f3e
- FEDORA-2022-b0bd0219ff
- FEDORA-2022-ba365d3703
- FEDORA-2022-c87047f163
- FEDORA-2022-d37fb34309
- FEDORA-2022-e674d52438
- FEDORA-2022-ea8f4e232d
- FEDORA-2022-fae3ecee19
- FEDORA-2023-e8c27ba884
- FEDORA-2024-80e062d21a
- FEDORA-2024-9cc0e0c63e
- FEDORA-2024-d652859efb
- FREEBSD:079B3641-C4BD-11EB-A22A-693F0544AE52
- FREEBSD:C365536D-E3CF-11EB-9D8D-B37B683944C2
- GLSA-202208-02
- GLSA-202407-12
- GO-2021-0100
- GO-2021-0241
- GO-2021-0243
- GO-2021-0356
- MS:CVE-2021-20199
- MS:CVE-2021-34558
- openSUSE-SU-2021:0950-1
- openSUSE-SU-2021:1078-1
- openSUSE-SU-2021:1079-1
- openSUSE-SU-2021:2186-1
- openSUSE-SU-2021:2214-1
- openSUSE-SU-2021:2392-1
- openSUSE-SU-2021:2398-1
- RHBA-2022:0348
- RHSA-2021:1796
- RHSA-2021:3076
- RHSA-2021:4154
- RHSA-2021:4156
- RHSA-2021:4226
- RHSA-2022:7129
- RHSA-2022:7457
- RHSA-2022:7469
- RHSA-2022:7954
- RHSA-2022:7955
- RHSA-2022:8008
- RHSA-2024:2988
- RLBA-2022:0348
- RLSA-2021:1796
- RLSA-2021:4154
- RLSA-2022:7129
- RLSA-2022:7457
- RLSA-2022:7469
- SUSE-SU-2021:2186-1
- SUSE-SU-2021:2214-1
- SUSE-SU-2021:2392-1
- SUSE-SU-2021:2398-1
- SUSE-SU-2022:1507-1
- SUSE-SU-2022:1689-1
- SUSE-SU-2022:2834-1
- SUSE-SU-2022:2839-1
- SUSE-SU-2022:2839-2
- SUSE-SU-2022:3312-1
- SUSE-SU-2022:4409-1
- SUSE-SU-2022:4463-1
- SUSE-SU-2023:0187-1
- SUSE-SU-2023:0326-1
- SUSE-SU-2023:2183-1
- SUSE-SU-2023:2185-1
- SUSE-SU-2023:2187-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2024:0191-1
- USN-5873-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2022-7954 | https://linux.oracle.com/errata/ELSA-2022-7954.html | |
CVE | CVE-2020-28851 | https://linux.oracle.com/cve/CVE-2020-28851.html | |
CVE | CVE-2021-20291 | https://linux.oracle.com/cve/CVE-2021-20291.html | |
CVE | CVE-2021-20199 | https://linux.oracle.com/cve/CVE-2021-20199.html | |
CVE | CVE-2020-28852 | https://linux.oracle.com/cve/CVE-2020-28852.html | |
CVE | CVE-2021-4024 | https://linux.oracle.com/cve/CVE-2021-4024.html | |
CVE | CVE-2021-33197 | https://linux.oracle.com/cve/CVE-2021-33197.html | |
CVE | CVE-2021-34558 | https://linux.oracle.com/cve/CVE-2021-34558.html | |
CVE | CVE-2022-27191 | https://linux.oracle.com/cve/CVE-2022-27191.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/podman?distro=oraclelinux-9 | oraclelinux | podman | < 4.2.0-3.0.1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/podman-tests?distro=oraclelinux-9 | oraclelinux | podman-tests | < 4.2.0-3.0.1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/podman-remote?distro=oraclelinux-9 | oraclelinux | podman-remote | < 4.2.0-3.0.1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/podman-plugins?distro=oraclelinux-9 | oraclelinux | podman-plugins | < 4.2.0-3.0.1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/podman-gvproxy?distro=oraclelinux-9 | oraclelinux | podman-gvproxy | < 4.2.0-3.0.1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/podman-docker?distro=oraclelinux-9 | oraclelinux | podman-docker | < 4.2.0-3.0.1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/podman-catatonit?distro=oraclelinux-9 | oraclelinux | podman-catatonit | < 4.2.0-3.0.1.el9 | oraclelinux-9 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |