Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-4246

Опубликовано: 03 июл. 2024
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2024-4246: container-tools security update (MODERATE)

aardvark-dns [2:1.10.0-1]

[2:1.9.0-1]

[2:1.8.0-1]

buildah [2:1.33.8-1]

cockpit-podman conmon containernetworking-plugins containers-common container-selinux criu [3.18-5]

  • rebuild to preserve upgrade path
  • Related: RHEL-32671

crun fuse-overlayfs libslirp [4.4.0-2]

  • rebuild to preserve upgrade path 8.9 -> 8.10
  • Related: RHEL-32671

netavark oci-seccomp-bpf-hook podman [4.9.4-4.0.1]

  • Add devices on container startup, not on creation

[4:4.9.4-4]

python-podman runc skopeo [2:1.14.4-1]

slirp4netns udica [0.2.6-21]

  • bump release to preserve update path
  • Resolves: RHEL-32671

[0.2.6-20]

  • bump release to preserve update path
  • Related: #2139052

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

Module container-tools:ol8 is enabled

aardvark-dns

1.10.0-1.module+el8.10.0+90298+77a9814d

buildah

1.33.8-1.module+el8.10.0+90360+0c35d233

buildah-tests

1.33.8-1.module+el8.10.0+90360+0c35d233

cockpit-podman

84.1-1.module+el8.10.0+90298+77a9814d

conmon

2.1.10-1.module+el8.10.0+90298+77a9814d

container-selinux

2.229.0-2.module+el8.10.0+90298+77a9814d

containernetworking-plugins

1.4.0-2.module+el8.10.0+90298+77a9814d

containers-common

1-81.0.1.module+el8.10.0+90298+77a9814d

crit

3.18-5.module+el8.10.0+90337+0d7b6e74

criu

3.18-5.module+el8.10.0+90337+0d7b6e74

criu-devel

3.18-5.module+el8.10.0+90337+0d7b6e74

criu-libs

3.18-5.module+el8.10.0+90337+0d7b6e74

crun

1.14.3-2.module+el8.10.0+90298+77a9814d

fuse-overlayfs

1.13-1.module+el8.10.0+90298+77a9814d

libslirp

4.4.0-2.module+el8.10.0+90337+0d7b6e74

libslirp-devel

4.4.0-2.module+el8.10.0+90337+0d7b6e74

netavark

1.10.3-1.module+el8.10.0+90298+77a9814d

oci-seccomp-bpf-hook

1.2.10-1.module+el8.10.0+90298+77a9814d

podman

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-catatonit

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-docker

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-gvproxy

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-plugins

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-remote

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-tests

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

python3-criu

3.18-5.module+el8.10.0+90337+0d7b6e74

python3-podman

4.9.0-1.module+el8.10.0+90298+77a9814d

runc

1.1.12-1.module+el8.10.0+90298+77a9814d

skopeo

1.14.4-1.module+el8.10.0+90360+0c35d233

skopeo-tests

1.14.4-1.module+el8.10.0+90360+0c35d233

slirp4netns

1.2.3-1.module+el8.10.0+90298+77a9814d

udica

0.2.6-21.module+el8.10.0+90337+0d7b6e74

Oracle Linux x86_64

Module container-tools:ol8 is enabled

aardvark-dns

1.10.0-1.module+el8.10.0+90298+77a9814d

buildah

1.33.8-1.module+el8.10.0+90360+0c35d233

buildah-tests

1.33.8-1.module+el8.10.0+90360+0c35d233

cockpit-podman

84.1-1.module+el8.10.0+90298+77a9814d

conmon

2.1.10-1.module+el8.10.0+90298+77a9814d

container-selinux

2.229.0-2.module+el8.10.0+90298+77a9814d

containernetworking-plugins

1.4.0-2.module+el8.10.0+90298+77a9814d

containers-common

1-81.0.1.module+el8.10.0+90298+77a9814d

crit

3.18-5.module+el8.10.0+90337+0d7b6e74

criu

3.18-5.module+el8.10.0+90337+0d7b6e74

criu-devel

3.18-5.module+el8.10.0+90337+0d7b6e74

criu-libs

3.18-5.module+el8.10.0+90337+0d7b6e74

crun

1.14.3-2.module+el8.10.0+90298+77a9814d

fuse-overlayfs

1.13-1.module+el8.10.0+90298+77a9814d

libslirp

4.4.0-2.module+el8.10.0+90337+0d7b6e74

libslirp-devel

4.4.0-2.module+el8.10.0+90337+0d7b6e74

netavark

1.10.3-1.module+el8.10.0+90298+77a9814d

oci-seccomp-bpf-hook

1.2.10-1.module+el8.10.0+90298+77a9814d

podman

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-catatonit

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-docker

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-gvproxy

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-plugins

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-remote

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

podman-tests

4.9.4-4.0.1.module+el8.10.0+90360+0c35d233

python3-criu

3.18-5.module+el8.10.0+90337+0d7b6e74

python3-podman

4.9.0-1.module+el8.10.0+90298+77a9814d

runc

1.1.12-1.module+el8.10.0+90298+77a9814d

skopeo

1.14.4-1.module+el8.10.0+90360+0c35d233

skopeo-tests

1.14.4-1.module+el8.10.0+90360+0c35d233

slirp4netns

1.2.3-1.module+el8.10.0+90298+77a9814d

udica

0.2.6-21.module+el8.10.0+90337+0d7b6e74

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.

CVSS3: 5.9
redhat
больше 1 года назад

The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.

CVSS3: 7.5
nvd
больше 1 года назад

The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.

CVSS3: 7.5
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
больше 1 года назад

The protojson.Unmarshal function can enter an infinite loop when unmar ...