Описание
ELSA-2022-7822: container-tools:ol8 security, bug fix, and enhancement update (LOW)
aardvark-dns [2:1.1.0-5]
- fix 'Two aardvark-dns instances trying to use the same port on the same interface'
- Resolves: #2130234
buildah [1:1.27.2-2]
- update to the latest content of https://github.com/containers/buildah/tree/release-1.27 (https://github.com/containers/buildah/commit/c43a389)
- Resolves: #2136438
[1:1.27.2-1]
- update to the latest content of https://github.com/containers/buildah/tree/release-1.27 (https://github.com/containers/buildah/commit/13622b1)
- Resolves: #2129767
containers-common [1-43.0.1]
- Updated removed references [Orabug: 33473101] (Alex Burmashev)
- Adjust registries.conf (Nikita Gerasimov)
- remove references to RedHat registry (Nikita Gerasimov)
[2:1-43]
- update vendored components and configuration files
- Resolves: #2136438
[2:1-42]
- add beta GPG key
- Resolves: #2125686
[2:1-41]
- update vendored components and configuration files
- Resolves: #2125241
netavark [2:1.1.0-7]
- fix 'Two aardvark-dns instances trying to use the same port on the same interface'
- Resolves: #2130234
podman [3:4.2.0-4]
- update to the latest content of https://github.com/containers/podman/tree/v4.2.0-rhel (https://github.com/containers/podman/commit/35c0df3)
- Resolves: #2125645
[3:4.2.0-3]
- update to the latest content of https://github.com/containers/podman/tree/v4.2.0-rhel (https://github.com/containers/podman/commit/d520a5c)
- Resolves: #2136433
[3:4.2.0-2]
- update to the latest content of https://github.com/containers/podman/tree/v4.2.0-rhel (https://github.com/containers/podman/commit/4978898)
- Resolves: #2125241
python-podman [4.2.1-1]
- update to 4.2.1 release
- Resolves: #2132360
[4.2.0-2]
- fix '[RFE] python-podman: Podman support to perform custom actions on unhealthy containers'
- Resolves: #2132360
skopeo [2:1.9.3-1]
- update to https://github.com/containers/skopeo/releases/tag/v1.9.3
- Related: #2135973
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
Module container-tools:ol8 is enabled
aardvark-dns
1.1.0-5.module+el8.7.0+20877+e0f9ac15
buildah
1.27.2-2.module+el8.7.0+20877+e0f9ac15
buildah-tests
1.27.2-2.module+el8.7.0+20877+e0f9ac15
cockpit-podman
53-1.module+el8.7.0+20877+e0f9ac15
conmon
2.1.4-1.module+el8.7.0+20877+e0f9ac15
container-selinux
2.189.0-1.module+el8.7.0+20877+e0f9ac15
containernetworking-plugins
1.1.1-3.module+el8.7.0+20877+e0f9ac15
containers-common
1-43.0.1.module+el8.7.0+20877+e0f9ac15
crit
3.15-3.module+el8.7.0+20877+e0f9ac15
criu
3.15-3.module+el8.7.0+20877+e0f9ac15
criu-devel
3.15-3.module+el8.7.0+20877+e0f9ac15
criu-libs
3.15-3.module+el8.7.0+20877+e0f9ac15
crun
1.5-1.module+el8.7.0+20877+e0f9ac15
fuse-overlayfs
1.9-1.module+el8.7.0+20877+e0f9ac15
libslirp
4.4.0-1.module+el8.7.0+20877+e0f9ac15
libslirp-devel
4.4.0-1.module+el8.7.0+20877+e0f9ac15
netavark
1.1.0-7.module+el8.7.0+20877+e0f9ac15
oci-seccomp-bpf-hook
1.2.6-1.module+el8.7.0+20877+e0f9ac15
podman
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-catatonit
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-docker
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-gvproxy
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-plugins
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-remote
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-tests
4.2.0-4.module+el8.7.0+20877+e0f9ac15
python3-criu
3.15-3.module+el8.7.0+20877+e0f9ac15
python3-podman
4.2.1-1.module+el8.7.0+20877+e0f9ac15
runc
1.1.4-1.module+el8.7.0+20877+e0f9ac15
skopeo
1.9.3-1.module+el8.7.0+20877+e0f9ac15
skopeo-tests
1.9.3-1.module+el8.7.0+20877+e0f9ac15
slirp4netns
1.2.0-2.module+el8.7.0+20877+e0f9ac15
udica
0.2.6-3.module+el8.7.0+20877+e0f9ac15
Oracle Linux x86_64
Module container-tools:ol8 is enabled
aardvark-dns
1.1.0-5.module+el8.7.0+20877+e0f9ac15
buildah
1.27.2-2.module+el8.7.0+20877+e0f9ac15
buildah-tests
1.27.2-2.module+el8.7.0+20877+e0f9ac15
cockpit-podman
53-1.module+el8.7.0+20877+e0f9ac15
conmon
2.1.4-1.module+el8.7.0+20877+e0f9ac15
container-selinux
2.189.0-1.module+el8.7.0+20877+e0f9ac15
containernetworking-plugins
1.1.1-3.module+el8.7.0+20877+e0f9ac15
containers-common
1-43.0.1.module+el8.7.0+20877+e0f9ac15
crit
3.15-3.module+el8.7.0+20877+e0f9ac15
criu
3.15-3.module+el8.7.0+20877+e0f9ac15
criu-devel
3.15-3.module+el8.7.0+20877+e0f9ac15
criu-libs
3.15-3.module+el8.7.0+20877+e0f9ac15
crun
1.5-1.module+el8.7.0+20877+e0f9ac15
fuse-overlayfs
1.9-1.module+el8.7.0+20877+e0f9ac15
libslirp
4.4.0-1.module+el8.7.0+20877+e0f9ac15
libslirp-devel
4.4.0-1.module+el8.7.0+20877+e0f9ac15
netavark
1.1.0-7.module+el8.7.0+20877+e0f9ac15
oci-seccomp-bpf-hook
1.2.6-1.module+el8.7.0+20877+e0f9ac15
podman
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-catatonit
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-docker
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-gvproxy
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-plugins
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-remote
4.2.0-4.module+el8.7.0+20877+e0f9ac15
podman-tests
4.2.0-4.module+el8.7.0+20877+e0f9ac15
python3-criu
3.15-3.module+el8.7.0+20877+e0f9ac15
python3-podman
4.2.1-1.module+el8.7.0+20877+e0f9ac15
runc
1.1.4-1.module+el8.7.0+20877+e0f9ac15
skopeo
1.9.3-1.module+el8.7.0+20877+e0f9ac15
skopeo-tests
1.9.3-1.module+el8.7.0+20877+e0f9ac15
slirp4netns
1.2.0-2.module+el8.7.0+20877+e0f9ac15
udica
0.2.6-3.module+el8.7.0+20877+e0f9ac15
Связанные CVE
Связанные уязвимости
Low: container-tools:rhel8 security, bug fix, and enhancement update
ELSA-2022-8431: podman security, bug fix, and enhancement update (LOW)
ELSA-2022-8008: buildah security and bug fix update (MODERATE)
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.