Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-20909

Опубликовано: 25 нояб. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-20909: podman security update (IMPORTANT)

[5.6.0-6.0.1]

  • Add devices on container startup, not on creation
  • overlay: Put should ignore ENINVAL for Unmount [Orabug: 36234694]
  • Drop nmap-ncat requirement and skip ignore-socket test case [Orabug: 34117404]

[6:5.6.0-6]

[6:5.6.0-5]

  • rebuild as last build was built in the wrong tag
  • Related: RHEL-110317

[6:5.6.0-4]

[6:5.6.0-3]

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

podman

5.6.0-6.0.1.el9_7

podman-docker

5.6.0-6.0.1.el9_7

podman-plugins

5.6.0-6.0.1.el9_7

podman-remote

5.6.0-6.0.1.el9_7

podman-tests

5.6.0-6.0.1.el9_7

Oracle Linux x86_64

podman

5.6.0-6.0.1.el9_7

podman-docker

5.6.0-6.0.1.el9_7

podman-plugins

5.6.0-6.0.1.el9_7

podman-remote

5.6.0-6.0.1.el9_7

podman-tests

5.6.0-6.0.1.el9_7

Связанные CVE

Связанные уязвимости

oracle-oval
17 дней назад

ELSA-2025-20983: podman security update (IMPORTANT)

CVSS3: 8.1
ubuntu
4 месяца назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

CVSS3: 8.1
redhat
4 месяца назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

CVSS3: 8.1
nvd
4 месяца назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

msrc
3 месяца назад

Podman: podman kube play command may overwrite host files