Описание
ELSA-2023-7202: container-tools:4.0 security and bug fix update (MODERATE)
buildah [1:1.24.6-7]
- rebuild for CVE-2023-29406
- Related: #2176055
cockpit-podman conmon containernetworking-plugins containers-common container-selinux criu crun fuse-overlayfs libslirp oci-seccomp-bpf-hook podman [2:4.0.2-24]
- rebuild for CVE-2023-29406
- Related: #2176055
python-podman runc skopeo [2:1.6.2-9]
- rebuild because of CVE-2023-29406
- Resolves: #2236831
slirp4netns udica
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
Module container-tools:4.0 is enabled
aardvark-dns
1.0.1-38.0.1.module+el8.9.0+90086+8f2d6fb1
buildah
1.24.6-7.module+el8.9.0+90086+8f2d6fb1
buildah-tests
1.24.6-7.module+el8.9.0+90086+8f2d6fb1
cockpit-podman
46-1.module+el8.9.0+90086+8f2d6fb1
conmon
2.1.4-2.module+el8.9.0+90086+8f2d6fb1
container-selinux
2.205.0-3.module+el8.9.0+90086+8f2d6fb1
containernetworking-plugins
1.1.1-5.module+el8.9.0+90086+8f2d6fb1
containers-common
1-38.0.1.module+el8.9.0+90086+8f2d6fb1
crit
3.15-3.module+el8.9.0+90086+8f2d6fb1
criu
3.15-3.module+el8.9.0+90086+8f2d6fb1
criu-devel
3.15-3.module+el8.9.0+90086+8f2d6fb1
criu-libs
3.15-3.module+el8.9.0+90086+8f2d6fb1
crun
1.8.7-1.module+el8.9.0+90086+8f2d6fb1
fuse-overlayfs
1.9-2.module+el8.9.0+90086+8f2d6fb1
libslirp
4.4.0-1.module+el8.9.0+90086+8f2d6fb1
libslirp-devel
4.4.0-1.module+el8.9.0+90086+8f2d6fb1
netavark
1.0.1-38.0.1.module+el8.9.0+90086+8f2d6fb1
oci-seccomp-bpf-hook
1.2.5-2.module+el8.9.0+90086+8f2d6fb1
podman
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-catatonit
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-docker
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-gvproxy
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-plugins
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-remote
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-tests
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
python3-criu
3.15-3.module+el8.9.0+90086+8f2d6fb1
python3-podman
4.0.0-2.module+el8.9.0+90086+8f2d6fb1
runc
1.1.5-2.module+el8.9.0+90086+8f2d6fb1
skopeo
1.6.2-9.module+el8.9.0+90086+8f2d6fb1
skopeo-tests
1.6.2-9.module+el8.9.0+90086+8f2d6fb1
slirp4netns
1.1.8-3.module+el8.9.0+90086+8f2d6fb1
udica
0.2.6-4.module+el8.9.0+90086+8f2d6fb1
Oracle Linux x86_64
Module container-tools:4.0 is enabled
aardvark-dns
1.0.1-38.0.1.module+el8.9.0+90086+8f2d6fb1
buildah
1.24.6-7.module+el8.9.0+90086+8f2d6fb1
buildah-tests
1.24.6-7.module+el8.9.0+90086+8f2d6fb1
cockpit-podman
46-1.module+el8.9.0+90086+8f2d6fb1
conmon
2.1.4-2.module+el8.9.0+90086+8f2d6fb1
container-selinux
2.205.0-3.module+el8.9.0+90086+8f2d6fb1
containernetworking-plugins
1.1.1-5.module+el8.9.0+90086+8f2d6fb1
containers-common
1-38.0.1.module+el8.9.0+90086+8f2d6fb1
crit
3.15-3.module+el8.9.0+90086+8f2d6fb1
criu
3.15-3.module+el8.9.0+90086+8f2d6fb1
criu-devel
3.15-3.module+el8.9.0+90086+8f2d6fb1
criu-libs
3.15-3.module+el8.9.0+90086+8f2d6fb1
crun
1.8.7-1.module+el8.9.0+90086+8f2d6fb1
fuse-overlayfs
1.9-2.module+el8.9.0+90086+8f2d6fb1
libslirp
4.4.0-1.module+el8.9.0+90086+8f2d6fb1
libslirp-devel
4.4.0-1.module+el8.9.0+90086+8f2d6fb1
netavark
1.0.1-38.0.1.module+el8.9.0+90086+8f2d6fb1
oci-seccomp-bpf-hook
1.2.5-2.module+el8.9.0+90086+8f2d6fb1
podman
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-catatonit
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-docker
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-gvproxy
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-plugins
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-remote
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
podman-tests
4.0.2-24.module+el8.9.0+90086+8f2d6fb1
python3-criu
3.15-3.module+el8.9.0+90086+8f2d6fb1
python3-podman
4.0.0-2.module+el8.9.0+90086+8f2d6fb1
runc
1.1.5-2.module+el8.9.0+90086+8f2d6fb1
skopeo
1.6.2-9.module+el8.9.0+90086+8f2d6fb1
skopeo-tests
1.6.2-9.module+el8.9.0+90086+8f2d6fb1
slirp4netns
1.1.8-3.module+el8.9.0+90086+8f2d6fb1
udica
0.2.6-4.module+el8.9.0+90086+8f2d6fb1
Связанные CVE
Связанные уязвимости
The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
The HTTP/1 client does not fully validate the contents of the Host hea ...