Описание
ELSA-2022-8431: podman security, bug fix, and enhancement update (LOW)
[4.2.0-7.0.1]
- Drop nmap-ncat requirement and skip ignore-socket test case [Orabug: 34117404]
[2:4.2.0-7]
- update to the latest content of https://github.com/containers/podman/tree/v4.2.0-rhel (https://github.com/containers/podman/commit/35c0df3)
- Resolves: #2120436
[2:4.2.0-6]
- update to the latest content of https://github.com/containers/podman/tree/v4.2.0-rhel (https://github.com/containers/podman/commit/d520a5c)
- Resolves: #2136845
[2:4.2.0-5]
- properly obsolete catatonit
- Resolves: #2123319
[2:4.2.0-4]
- update to the latest content of https://github.com/containers/podman/tree/v4.2.0-rhel (https://github.com/containers/podman/commit/4978898)
- Resolves: #2124676
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
podman
4.2.0-7.0.1.el9_1
podman-catatonit
4.2.0-7.0.1.el9_1
podman-docker
4.2.0-7.0.1.el9_1
podman-gvproxy
4.2.0-7.0.1.el9_1
podman-plugins
4.2.0-7.0.1.el9_1
podman-remote
4.2.0-7.0.1.el9_1
podman-tests
4.2.0-7.0.1.el9_1
Oracle Linux x86_64
podman
4.2.0-7.0.1.el9_1
podman-catatonit
4.2.0-7.0.1.el9_1
podman-docker
4.2.0-7.0.1.el9_1
podman-gvproxy
4.2.0-7.0.1.el9_1
podman-plugins
4.2.0-7.0.1.el9_1
podman-remote
4.2.0-7.0.1.el9_1
podman-tests
4.2.0-7.0.1.el9_1
Связанные CVE
Связанные уязвимости
Low: container-tools:rhel8 security, bug fix, and enhancement update
ELSA-2022-7822: container-tools:ol8 security, bug fix, and enhancement update (LOW)
ELSA-2022-8008: buildah security and bug fix update (MODERATE)
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.