[RLSA-2024:3826] podman security and bug fix update
Severity
Moderate
Affected Packages
9
CVEs
3
An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fixes:
podman: jose-go: improper handling of highly compressed data (CVE-2024-28180)
podman: golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
podman: jose: resource exhaustion (CVE-2024-28176)
Package | Affected Version |
---|---|
pkg:rpm/rockylinux/podman?arch=x86_64&distro=rockylinux-9.4 | < 4.9.4-4.el9_4 |
pkg:rpm/rockylinux/podman?arch=aarch64&distro=rockylinux-9.4 | < 4.9.4-4.el9_4 |
pkg:rpm/rockylinux/podman-tests?arch=x86_64&distro=rockylinux-9.4 | < 4.9.4-4.el9_4 |
pkg:rpm/rockylinux/podman-tests?arch=aarch64&distro=rockylinux-9.4 | < 4.9.4-4.el9_4 |
pkg:rpm/rockylinux/podman-remote?arch=x86_64&distro=rockylinux-9.4 | < 4.9.4-4.el9_4 |
pkg:rpm/rockylinux/podman-remote?arch=aarch64&distro=rockylinux-9.4 | < 4.9.4-4.el9_4 |
pkg:rpm/rockylinux/podman-plugins?arch=x86_64&distro=rockylinux-9.4 | < 4.9.4-4.el9_4 |
pkg:rpm/rockylinux/podman-plugins?arch=aarch64&distro=rockylinux-9.4 | < 4.9.4-4.el9_4 |
pkg:rpm/rockylinux/podman-docker?arch=noarch&distro=rockylinux-9.4 | < 4.9.4-4.el9_4 |
- ID
- RLSA-2024:3826
- Severity
- moderate
- URL
- https://errata.rockylinux.org/RLSA-2024:3826
- Published
-
2024-06-14T14:00:40
(3 months ago) - Modified
-
2024-06-14T14:02:44
(3 months ago) - Rights
- Copyright 2024 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALAS2-2024-2554
- ALAS2-2024-2618
- ALPINE:CVE-2023-45290
- ALPINE:CVE-2024-28180
- ALSA-2024:2549
- ALSA-2024:2562
- ALSA-2024:2724
- ALSA-2024:3254
- ALSA-2024:3259
- ALSA-2024:3346
- ALSA-2024:3826
- ALSA-2024:3827
- ALSA-2024:3830
- ALSA-2024:3831
- ALSA-2024:3968
- ALSA-2024:5258
- ALSA-2024:5294
- ELSA-2024-2549
- ELSA-2024-2562
- ELSA-2024-2724
- ELSA-2024-3254
- ELSA-2024-3259
- ELSA-2024-3346
- ELSA-2024-3826
- ELSA-2024-3827
- ELSA-2024-3830
- ELSA-2024-3831
- ELSA-2024-3968
- ELSA-2024-5258
- ELSA-2024-5294
- FEDORA-2024-22f1e313dd
- FEDORA-2024-453ee0b3b9
- FEDORA-2024-45f0a1df95
- FEDORA-2024-529fe8a802
- FEDORA-2024-560a7aca85
- FEDORA-2024-831bad8f8f
- FEDORA-2024-9231308a4f
- FEDORA-2024-a8a4ce2864
- FEDORA-2024-c95d3199c5
- FREEBSD:B1B039EC-DBFC-11EE-9165-901B0E9408DC
- GLSA-202408-07
- GO-2024-2599
- GO-2024-2631
- NPM:GHSA-HHHV-Q57G-882Q
- RHSA-2024:2549
- RHSA-2024:2562
- RHSA-2024:2724
- RHSA-2024:3254
- RHSA-2024:3259
- RHSA-2024:3346
- RHSA-2024:3826
- RHSA-2024:3827
- RHSA-2024:3830
- RHSA-2024:3831
- RHSA-2024:3968
- RHSA-2024:5258
- RHSA-2024:5294
- RLSA-2024:2549
- RLSA-2024:2562
- RLSA-2024:2724
- RLSA-2024:3346
- RLSA-2024:3827
- RLSA-2024:3830
- SUSE-SU-2024:0800-1
- SUSE-SU-2024:0811-1
- SUSE-SU-2024:0812-1
- SUSE-SU-2024:0936-1
- SUSE-SU-2024:1987-1
- SUSE-SU-2024:1987-2
- SUSE-SU-2024:2754-1
- SUSE-SU-2024:3089-1
- SUSE-SU-2024:3120-1
- SUSE-SU-2024:3151-1
- SUSE-SU-2024:3186-1
- USN-6886-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2023-45290 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45290 | |
CVE | CVE-2024-28176 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28176 | |
CVE | CVE-2024-28180 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28180 | |
Bugzilla | 2268017 | https://bugzilla.redhat.com/show_bug.cgi?id=2268017 | |
Bugzilla | 2268820 | https://bugzilla.redhat.com/show_bug.cgi?id=2268820 | |
Bugzilla | 2268854 | https://bugzilla.redhat.com/show_bug.cgi?id=2268854 | |
Self | RLSA-2024:3826 | https://errata.rockylinux.org/RLSA-2024:3826 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/podman?arch=x86_64&distro=rockylinux-9.4 | rockylinux | podman | < 4.9.4-4.el9_4 | rockylinux-9.4 | x86_64 | |
Affected | pkg:rpm/rockylinux/podman?arch=aarch64&distro=rockylinux-9.4 | rockylinux | podman | < 4.9.4-4.el9_4 | rockylinux-9.4 | aarch64 | |
Affected | pkg:rpm/rockylinux/podman-tests?arch=x86_64&distro=rockylinux-9.4 | rockylinux | podman-tests | < 4.9.4-4.el9_4 | rockylinux-9.4 | x86_64 | |
Affected | pkg:rpm/rockylinux/podman-tests?arch=aarch64&distro=rockylinux-9.4 | rockylinux | podman-tests | < 4.9.4-4.el9_4 | rockylinux-9.4 | aarch64 | |
Affected | pkg:rpm/rockylinux/podman-remote?arch=x86_64&distro=rockylinux-9.4 | rockylinux | podman-remote | < 4.9.4-4.el9_4 | rockylinux-9.4 | x86_64 | |
Affected | pkg:rpm/rockylinux/podman-remote?arch=aarch64&distro=rockylinux-9.4 | rockylinux | podman-remote | < 4.9.4-4.el9_4 | rockylinux-9.4 | aarch64 | |
Affected | pkg:rpm/rockylinux/podman-plugins?arch=x86_64&distro=rockylinux-9.4 | rockylinux | podman-plugins | < 4.9.4-4.el9_4 | rockylinux-9.4 | x86_64 | |
Affected | pkg:rpm/rockylinux/podman-plugins?arch=aarch64&distro=rockylinux-9.4 | rockylinux | podman-plugins | < 4.9.4-4.el9_4 | rockylinux-9.4 | aarch64 | |
Affected | pkg:rpm/rockylinux/podman-docker?arch=noarch&distro=rockylinux-9.4 | rockylinux | podman-docker | < 4.9.4-4.el9_4 | rockylinux-9.4 | noarch |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |