Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2022-7457

Опубликовано: 15 нояб. 2022
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2022-7457: container-tools:ol8 security, bug fix, and enhancement update (MODERATE)

aardvark-dns [2:1.1.0-4]

  • remove windows binaries and regenerate vendor tarball
  • Related: #2061390

[2:1.1.0-3]

  • add gating.yaml
  • Related: #2061390

[2:1.1.0-2]

  • bump Epoch to preserve upgrade path
  • Related: #2061390

[1.1.0-1]

  • initial import
  • Related: #2061390

buildah [1:1.27.0-2]

  • fix CVE-2022-2990
  • Related: #2061390

[1:1.27.0-1]

[1:1.26.4-3]

  • add buildah-tutorial to test subpackage
  • Related: #2061390

[1:1.26.4-1]

[1:1.26.3-1]

cockpit-podman [53-1]

[52-1]

[51.1-1]

[50-1]

conmon [3:2.1.4-1]

[3:2.1.2-2]

  • revert conmon to 2.1.2
  • Related: #2061390

containers-common [2:1-40.0.1]

  • Updated removed references [Orabug: 33473101] (Alex Burmashev)
  • Adjust registries.conf (Nikita Gerasimov)
  • remove references to RedHat registry (Nikita Gerasimov)

[2:1-40]

  • add beta keys to default-policy.json
  • Related: #2061390

netavark [2:1.1.0-6]

  • bump Epoch to preserve upgrade path
  • Related: #2061390

[1.1.0-5]

  • remove dependency on md2man
  • Related: #2061390

[1.1.0-4]

  • fix arches
  • Related: #2061390

[1.1.0-3]

  • add gating.yaml
  • Related: #2061390

[1.1.0-2]

  • require /usr/bin/go-md2man directly

[1.1.0-1]

  • initial import
  • Related: #2061390

podman [2:4.2.0-1]

[2:4.2.1-1]

python-podman [4.2.0-1]

[4.0.0-1]

  • bump to v4.0.0
  • Related: #2001445

runc [1:1.1.4-1]

skopeo [2:1.9.2-1]

udica [0.2.6-3]

  • Make sure each section of the inspect exists before accessing (#2027662)

[0.2.6-2]

  • Require container-selinux shipping policy templates (#2005866)

[0.2.6-1]

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

Module container-tools:ol8 is enabled

aardvark-dns

1.1.0-4.module+el8.7.0+20873+328b8baa

buildah

1.27.0-2.module+el8.7.0+20873+328b8baa

buildah-tests

1.27.0-2.module+el8.7.0+20873+328b8baa

cockpit-podman

53-1.module+el8.7.0+20873+328b8baa

conmon

2.1.4-1.module+el8.7.0+20873+328b8baa

container-selinux

2.189.0-1.module+el8.7.0+20873+328b8baa

containernetworking-plugins

1.1.1-3.module+el8.7.0+20873+328b8baa

containers-common

1-40.0.1.module+el8.7.0+20876+328b8baa

crit

3.15-3.module+el8.7.0+20873+328b8baa

criu

3.15-3.module+el8.7.0+20873+328b8baa

criu-devel

3.15-3.module+el8.7.0+20873+328b8baa

criu-libs

3.15-3.module+el8.7.0+20873+328b8baa

crun

1.5-1.module+el8.7.0+20873+328b8baa

fuse-overlayfs

1.9-1.module+el8.7.0+20873+328b8baa

libslirp

4.4.0-1.module+el8.7.0+20873+328b8baa

libslirp-devel

4.4.0-1.module+el8.7.0+20873+328b8baa

netavark

1.1.0-6.module+el8.7.0+20873+328b8baa

oci-seccomp-bpf-hook

1.2.6-1.module+el8.7.0+20873+328b8baa

podman

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-catatonit

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-docker

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-gvproxy

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-plugins

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-remote

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-tests

4.2.0-1.module+el8.7.0+20873+328b8baa

python3-criu

3.15-3.module+el8.7.0+20873+328b8baa

python3-podman

4.2.0-1.module+el8.7.0+20873+328b8baa

runc

1.1.4-1.module+el8.7.0+20873+328b8baa

skopeo

1.9.2-1.module+el8.7.0+20873+328b8baa

skopeo-tests

1.9.2-1.module+el8.7.0+20873+328b8baa

slirp4netns

1.2.0-2.module+el8.7.0+20873+328b8baa

udica

0.2.6-3.module+el8.7.0+20873+328b8baa

Oracle Linux x86_64

Module container-tools:ol8 is enabled

aardvark-dns

1.1.0-4.module+el8.7.0+20873+328b8baa

buildah

1.27.0-2.module+el8.7.0+20873+328b8baa

buildah-tests

1.27.0-2.module+el8.7.0+20873+328b8baa

cockpit-podman

53-1.module+el8.7.0+20873+328b8baa

conmon

2.1.4-1.module+el8.7.0+20873+328b8baa

container-selinux

2.189.0-1.module+el8.7.0+20873+328b8baa

containernetworking-plugins

1.1.1-3.module+el8.7.0+20873+328b8baa

containers-common

1-40.0.1.module+el8.7.0+20876+328b8baa

crit

3.15-3.module+el8.7.0+20873+328b8baa

criu

3.15-3.module+el8.7.0+20873+328b8baa

criu-devel

3.15-3.module+el8.7.0+20873+328b8baa

criu-libs

3.15-3.module+el8.7.0+20873+328b8baa

crun

1.5-1.module+el8.7.0+20873+328b8baa

fuse-overlayfs

1.9-1.module+el8.7.0+20873+328b8baa

libslirp

4.4.0-1.module+el8.7.0+20873+328b8baa

libslirp-devel

4.4.0-1.module+el8.7.0+20873+328b8baa

netavark

1.1.0-6.module+el8.7.0+20873+328b8baa

oci-seccomp-bpf-hook

1.2.6-1.module+el8.7.0+20873+328b8baa

podman

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-catatonit

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-docker

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-gvproxy

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-plugins

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-remote

4.2.0-1.module+el8.7.0+20873+328b8baa

podman-tests

4.2.0-1.module+el8.7.0+20873+328b8baa

python3-criu

3.15-3.module+el8.7.0+20873+328b8baa

python3-podman

4.2.0-1.module+el8.7.0+20873+328b8baa

runc

1.1.4-1.module+el8.7.0+20873+328b8baa

skopeo

1.9.2-1.module+el8.7.0+20873+328b8baa

skopeo-tests

1.9.2-1.module+el8.7.0+20873+328b8baa

slirp4netns

1.2.0-2.module+el8.7.0+20873+328b8baa

udica

0.2.6-3.module+el8.7.0+20873+328b8baa

Связанные уязвимости

rocky
больше 2 лет назад

Moderate: container-tools:rhel8 security, bug fix, and enhancement update

CVSS3: 3
ubuntu
больше 3 лет назад

The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are ...

CVSS3: 5
redhat
больше 3 лет назад

The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are ...

CVSS3: 3
nvd
больше 3 лет назад

The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are una

suse-cvrf
около 3 лет назад

Security update for containerd, docker

Уязвимость ELSA-2022-7457