Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-2193

Опубликовано: 03 мая 2024
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2024-2193: podman security update (MODERATE)

[2:4.9.4-0.1.0.1]

  • Add devices on container startup, not on creation
  • Backport fast gzip for compression [Orabug: 36420418]
  • overlay: Put should ignore ENINVAL for Unmount [Orabug: 36234694]
  • Drop nmap-ncat requirement and skip ignore-socket test case [Orabug: 34117404]

[2:4.9.4-0.1]

[2:4.9.3-0.1]

[2:4.9.2-1]

[2:4.9.1-1]

  • switch to v4.9.1-rhel branch
  • update dnsname to the latest commit
  • Related: Jira:RHEL-2112

[2:4.9.0-1]

[2:4.8.3-1]

[2:4.8.2-1]

[2:4.8.1-1]

[2:4.7.2-3]

  • Rebuild for following CVEs: CVE-2023-39318 CVE-2023-39319 CVE-2023-39321 CVE-2023-39322
  • Related: Jira:RHEL-2785

[2:4.7.2-2]

[2:4.7.2-1]

[2:4.6.1-6]

[2:4.6.1-5]

[2:4.6.1-4]

  • amend podmansh provides
  • Related: #2176063

[2:4.6.1-3]

[2:4.6.1-2]

[2:4.6.1-1]

[2:4.6.0-3]

  • build podman 4.6.0 off main branch for early testing of zstd compression
  • Related: #2176063

[2:4.6.0-2]

  • update license token to be SPDX compatible
  • Related: #2176063

[2:4.6.0-1]

[2:4.6.0-0.3]

  • rebuild with the new bats
  • Related: #2176063

[2:4.6.0-0.2]

  • update to 4.6.0-rc2
  • Related: #2176063

[2:4.6.0-0.1]

  • update to 4.6.0-rc1
  • Related: #2176063

[2:4.5.1-5]

  • rebuild for following CVEs: CVE-2023-25173 CVE-2022-41724 CVE-2022-41725 CVE-2023-24537 CVE-2023-24538 CVE-2023-24534 CVE-2023-24536 CVE-2022-41723 CVE-2023-24539 CVE-2023-24540 CVE-2023-29400
  • Resolves: #2175071
  • Resolves: #2179950
  • Resolves: #2187318
  • Resolves: #2187366
  • Resolves: #2203681
  • Resolves: #2207512

[2:4.5.1-4]

[2:4.5.1-3]

  • rebuild for following CVEs: CVE-2023-25173 CVE-2022-41724 CVE-2022-41725 CVE-2023-24537 CVE-2023-24538 CVE-2023-24534 CVE-2023-24536 CVE-2022-41723 CVE-2023-24539 CVE-2023-24540 CVE-2023-29400
  • Resolves: #2175074
  • Resolves: #2179966
  • Resolves: #2187322
  • Resolves: #2187383
  • Resolves: #2203702
  • Resolves: #2207522

[2:4.5.1-2]

  • rebuild
  • Resolves: #2177611

[2:4.5.1-1]

[2:4.5.0-1]

  • update to 4.5.0
  • Related: #2176063

[2:4.4.1-10]

  • build and add missing docker man pages
  • Resolves: #2187187

[2:4.4.1-9]

[2:4.4.1-8]

[2:4.4.1-7]

[2:4.4.1-6]

[2:4.4.1-5]

[2:4.4.1-4]

[2:4.4.1-3]

[2:4.4.1-2]

[2:4.4.1-1]

[2:4.4.1-0.1]

[2:4.4.0-1]

  • update to podman-4.4 release
  • Related: #2124478

[2:4.4.0-0.10]

[2:4.4.0-0.9]

[2:4.4.0-0.8]

[2:4.4.0-0.7]

[2:4.4.0-0.6]

  • add quadlet to tests
  • Related: #2124478

[2:4.4.0-0.5]

  • obsolete podman-catatonit in order to not to file conflict with catatonit
  • Related: #2124478

[2:4.4.0-0.4]

  • build v4.4.0-rc2
  • Related: #2124478

[2:4.4.0-0.3]

  • remove podman-machine-cni, it is now part of podman 4.0 or newer
  • Related: #2124478

[2:4.4.0-0.2]

[2:4.4.0-0.1]

[2:4.3.1-4]

  • podman shouldn't provide and file conflict with catatonit in CRB
  • Resolves: #2151322

[2:4.3.1-3]

  • fix 'podman manifest add' is not concurrent safe
  • Resolves: #2105173

[2:4.3.1-2]

  • properly obsolete catatonit
  • Resolves: #2123319

[2:4.3.1-1]

[2:4.3.0-2]

  • rebuild to fix CVE-2022-30629
  • Related: #2102994

[2:4.3.0-1]

[2:4.2.0-3]

  • fix dependency in test subpackage
  • Related: #2061316

[2:4.2.0-2]

  • readd catatonit
  • Related: #2061316

[2:4.2.0-1]

[2:4.2.0-0.3rc3]

  • require catatonit for gating tests
  • Related: #2061316

[2:4.2.0-0.2rc3]

  • update to 4.2.0-rc3
  • Related: #2061316

[2:4.2.0-0.1rc2]

  • update to 4.2.0-rc2
  • Related: #2061316

[2:4.1.1-6]

  • convert catatonit dependency to soft dep as catatonit is no longer in Appstream but in CRB
  • Related: #2061316

[2:4.1.1-5]

  • rebuild for combined gating with catatonit
  • Related: #2097694

[2:4.1.1-4]

  • catatonit is now a standalone package
  • Related: #2097694

[2:4.1.1-3]

[2:4.1.1-2]

  • be sure podman services/sockets are stopped upon package removal
  • Related: #2061316

[2:4.1.1-1]

[2:4.1.0-4]

  • don't require runc and Recommends: crun
  • Related: #2061316

[2:4.1.0-3]

  • Re-enable LTO and debuginfo
  • Related: #2061316

[2:4.1.0-2]

  • update gvisor-tap-vsock to 0.2.0 to fix compilation with golang 1.18
  • Related: #2061316

[2:4.1.0-1]

[2:4.0.3-2]

  • require netavark and move CNI to soft dependencies
  • Related: #2061316

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

podman

4.9.4-0.1.0.1.el9

podman-docker

4.9.4-0.1.0.1.el9

podman-plugins

4.9.4-0.1.0.1.el9

podman-remote

4.9.4-0.1.0.1.el9

podman-tests

4.9.4-0.1.0.1.el9

Oracle Linux x86_64

podman

4.9.4-0.1.0.1.el9

podman-docker

4.9.4-0.1.0.1.el9

podman-plugins

4.9.4-0.1.0.1.el9

podman-remote

4.9.4-0.1.0.1.el9

podman-tests

4.9.4-0.1.0.1.el9

Связанные CVE

Связанные уязвимости

oracle-oval
около 1 года назад

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

oracle-oval
около 1 года назад

ELSA-2024-2245: buildah security update (MODERATE)

CVSS3: 7.5
ubuntu
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
nvd
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
debian
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...

Уязвимость ELSA-2024-2193