Описание
ELSA-2024-2988: container-tools:ol8 security update (MODERATE)
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
Module container-tools:ol8 is enabled
aardvark-dns
1.10.0-1.module+el8.10.0+90298+77a9814d
buildah
1.33.6-2.module+el8.10.0+90298+77a9814d
buildah-tests
1.33.6-2.module+el8.10.0+90298+77a9814d
cockpit-podman
84.1-1.module+el8.10.0+90298+77a9814d
conmon
2.1.10-1.module+el8.10.0+90298+77a9814d
container-selinux
2.229.0-2.module+el8.10.0+90298+77a9814d
containernetworking-plugins
1.4.0-2.module+el8.10.0+90298+77a9814d
containers-common
1-81.0.1.module+el8.10.0+90298+77a9814d
crit
3.18-4.module+el8.9.0+90147+a4870853
criu
3.18-4.module+el8.9.0+90147+a4870853
criu-devel
3.18-4.module+el8.9.0+90147+a4870853
criu-libs
3.18-4.module+el8.9.0+90147+a4870853
crun
1.14.3-2.module+el8.10.0+90298+77a9814d
fuse-overlayfs
1.13-1.module+el8.10.0+90298+77a9814d
libslirp
4.4.0-1.module+el8.9.0+90147+a4870853
libslirp-devel
4.4.0-1.module+el8.9.0+90147+a4870853
netavark
1.10.3-1.module+el8.10.0+90298+77a9814d
oci-seccomp-bpf-hook
1.2.10-1.module+el8.10.0+90298+77a9814d
podman
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-catatonit
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-docker
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-gvproxy
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-plugins
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-remote
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-tests
4.9.4-0.1.module+el8.10.0+90298+77a9814d
python3-criu
3.18-4.module+el8.9.0+90147+a4870853
python3-podman
4.9.0-1.module+el8.10.0+90298+77a9814d
runc
1.1.12-1.module+el8.10.0+90298+77a9814d
skopeo
1.14.3-0.1.module+el8.10.0+90298+77a9814d
skopeo-tests
1.14.3-0.1.module+el8.10.0+90298+77a9814d
slirp4netns
1.2.3-1.module+el8.10.0+90298+77a9814d
udica
0.2.6-20.module+el8.9.0+90147+a4870853
Oracle Linux x86_64
Module container-tools:ol8 is enabled
aardvark-dns
1.10.0-1.module+el8.10.0+90298+77a9814d
buildah
1.33.6-2.module+el8.10.0+90298+77a9814d
buildah-tests
1.33.6-2.module+el8.10.0+90298+77a9814d
cockpit-podman
84.1-1.module+el8.10.0+90298+77a9814d
conmon
2.1.10-1.module+el8.10.0+90298+77a9814d
container-selinux
2.229.0-2.module+el8.10.0+90298+77a9814d
containernetworking-plugins
1.4.0-2.module+el8.10.0+90298+77a9814d
containers-common
1-81.0.1.module+el8.10.0+90298+77a9814d
crit
3.18-4.module+el8.9.0+90147+a4870853
criu
3.18-4.module+el8.9.0+90147+a4870853
criu-devel
3.18-4.module+el8.9.0+90147+a4870853
criu-libs
3.18-4.module+el8.9.0+90147+a4870853
crun
1.14.3-2.module+el8.10.0+90298+77a9814d
fuse-overlayfs
1.13-1.module+el8.10.0+90298+77a9814d
libslirp
4.4.0-1.module+el8.9.0+90147+a4870853
libslirp-devel
4.4.0-1.module+el8.9.0+90147+a4870853
netavark
1.10.3-1.module+el8.10.0+90298+77a9814d
oci-seccomp-bpf-hook
1.2.10-1.module+el8.10.0+90298+77a9814d
podman
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-catatonit
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-docker
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-gvproxy
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-plugins
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-remote
4.9.4-0.1.module+el8.10.0+90298+77a9814d
podman-tests
4.9.4-0.1.module+el8.10.0+90298+77a9814d
python3-criu
3.18-4.module+el8.9.0+90147+a4870853
python3-podman
4.9.0-1.module+el8.10.0+90298+77a9814d
runc
1.1.12-1.module+el8.10.0+90298+77a9814d
skopeo
1.14.3-0.1.module+el8.10.0+90298+77a9814d
skopeo-tests
1.14.3-0.1.module+el8.10.0+90298+77a9814d
slirp4netns
1.2.3-1.module+el8.10.0+90298+77a9814d
udica
0.2.6-20.module+el8.9.0+90147+a4870853
Ссылки на источники
Связанные уязвимости
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
The crypto/tls package of Go through 1.16.5 does not properly assert t ...