Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:3210

Опубликовано: 29 июл. 2025
Источник: rocky
Оценка: Important

Описание

Important: container-tools:rhel8 security update

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

  • golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
aardvark-dnsx86_642.module+el8.10.0+2001+6a33db9faardvark-dns-1.10.1-2.module+el8.10.0+2001+6a33db9f.x86_64.rpm
aardvark-dnsx86_642.module+el8.10.0+1948+4b5cd4a9aardvark-dns-1.10.1-2.module+el8.10.0+1948+4b5cd4a9.x86_64.rpm
aardvark-dnsx86_642.module+el8.10.0+1896+b18fa106aardvark-dns-1.10.1-2.module+el8.10.0+1896+b18fa106.x86_64.rpm
aardvark-dnsx86_642.module+el8.10.0+1880+8e896d1baardvark-dns-1.10.1-2.module+el8.10.0+1880+8e896d1b.x86_64.rpm
aardvark-dnsx86_642.module+el8.10.0+1874+ce489889aardvark-dns-1.10.1-2.module+el8.10.0+1874+ce489889.x86_64.rpm
buildahx86_641.module+el8.10.0+1948+4b5cd4a9buildah-1.33.12-1.module+el8.10.0+1948+4b5cd4a9.x86_64.rpm
buildahx86_641.module+el8.10.0+1933+1fc610b1buildah-1.33.12-1.module+el8.10.0+1933+1fc610b1.x86_64.rpm
buildah-testsx86_641.module+el8.10.0+1948+4b5cd4a9buildah-tests-1.33.12-1.module+el8.10.0+1948+4b5cd4a9.x86_64.rpm
buildah-testsx86_641.module+el8.10.0+1933+1fc610b1buildah-tests-1.33.12-1.module+el8.10.0+1933+1fc610b1.x86_64.rpm
cockpit-podmannoarch1.module+el8.10.0+1872+2e18eb19cockpit-podman-84.1-1.module+el8.10.0+1872+2e18eb19.noarch.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7.5
ubuntu
10 месяцев назад

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

CVSS3: 7.5
redhat
10 месяцев назад

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

CVSS3: 7.5
nvd
10 месяцев назад

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

CVSS3: 7.5
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
10 месяцев назад

SSH servers which implement file transfer protocols are vulnerable to ...