podman-4.9.4-3.el9
エラータID: AXSA:2024-8089:04
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fixes:
* podman: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* podman: buildah: full container escape at build time (CVE-2024-1753)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fixes:
* liveness probe not called by podman when using httpGet (JIRA:RHEL-28633)
* Unable to copy image from one virtual machine to another using "podman image scp" (JIRA:RHEL-28629)
* [v4.9] Backport two docker CLI compatibility fixes (JIRA:RHEL-28636)
* Issue in podman causing S2I to fail in overwriting ENTRYPOINT (JIRA:RHEL-14922)
* Need to backport podman fix for SIGSEGV in RHEL 9.3/8.9 for UBI based containers (JIRA:RHEL-26843)
CVE-2024-1753
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
CVE-2024-24786
The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.
Update packages.
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.
N/A
SRPMS
- podman-4.9.4-3.el9.src.rpm
MD5: 88bfb2755f118656859d9767326e474b
SHA-256: 80c6acff4659de5ec5c773903a154d13a4b622d3025a656ee2bf688fbb26153b
Size: 22.72 MB
Asianux Server 9 for x86_64
- podman-4.9.4-3.el9.x86_64.rpm
MD5: b2eba172866fa206027bc2677230f076
SHA-256: d3a4a4f917a5a4febd68704324958edc5c70d0df5125d99498657844accf784c
Size: 15.53 MB - podman-docker-4.9.4-3.el9.noarch.rpm
MD5: 32658250077ad9bb706df7e3a59e2406
SHA-256: fc07de8cbf54067b154e5d842e1bbd6134e78089511ffbdd1b32a1ed47f04402
Size: 56.32 kB - podman-plugins-4.9.4-3.el9.x86_64.rpm
MD5: cdb51ca6db711884c55393a143a80ee8
SHA-256: 4f79fb0e38fb9031cb1184b67fa6cfd2b42ff160cba0fe43c7d4a7adec16439d
Size: 1.28 MB - podman-remote-4.9.4-3.el9.x86_64.rpm
MD5: e23c3415fd8e3c98cb28e85921d317a3
SHA-256: 64c53580543db0270262ee2312dbebcbf763f48fa06b1647c07baacfe3270834
Size: 10.22 MB - podman-tests-4.9.4-3.el9.x86_64.rpm
MD5: e01cd4060e791f936cd6172d80b79a0d
SHA-256: 2de0fec8e582e5c774975937e2cfca8a67c9b2b2f4738ad3d94ebe33f9ba7603
Size: 191.10 kB