Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-15900

Опубликовано: 16 сент. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-15900: podman security update (IMPORTANT)

[5.4.0-13.0.1]

  • Fix a potential deadlock during podman cp [Orabug: 38252957]
  • Add devices on container startup, not on creation
  • overlay: Put should ignore ENINVAL for Unmount [Orabug: 36234694]
  • Drop nmap-ncat requirement and skip ignore-socket test case [Orabug: 34117404]

[5:5.4.0-13]

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

podman

5.4.0-13.0.1.el9_6

podman-docker

5.4.0-13.0.1.el9_6

podman-plugins

5.4.0-13.0.1.el9_6

podman-remote

5.4.0-13.0.1.el9_6

podman-tests

5.4.0-13.0.1.el9_6

Oracle Linux x86_64

podman

5.4.0-13.0.1.el9_6

podman-docker

5.4.0-13.0.1.el9_6

podman-plugins

5.4.0-13.0.1.el9_6

podman-remote

5.4.0-13.0.1.el9_6

podman-tests

5.4.0-13.0.1.el9_6

Связанные CVE

Связанные уязвимости

CVSS3: 8.1
ubuntu
4 месяца назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

CVSS3: 8.1
redhat
4 месяца назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

CVSS3: 8.1
nvd
4 месяца назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

msrc
3 месяца назад

Podman: podman kube play command may overwrite host files

CVSS3: 8.1
debian
4 месяца назад

There's a vulnerability in podman where an attacker may use the kube p ...