podman-4.9.4-3.el9

エラータID: AXSA:2024-8089:04

Release date: 
Friday, May 31, 2024 - 20:58
Subject: 
podman-4.9.4-3.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fixes:

* podman: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* podman: buildah: full container escape at build time (CVE-2024-1753)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fixes:

* liveness probe not called by podman when using httpGet (JIRA:RHEL-28633)
* Unable to copy image from one virtual machine to another using "podman image scp" (JIRA:RHEL-28629)
* [v4.9] Backport two docker CLI compatibility fixes (JIRA:RHEL-28636)
* Issue in podman causing S2I to fail in overwriting ENTRYPOINT (JIRA:RHEL-14922)
* Need to backport podman fix for SIGSEGV in RHEL 9.3/8.9 for UBI based containers (JIRA:RHEL-26843)

CVE-2024-1753
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
CVE-2024-24786
The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. podman-4.9.4-3.el9.src.rpm
    MD5: 88bfb2755f118656859d9767326e474b
    SHA-256: 80c6acff4659de5ec5c773903a154d13a4b622d3025a656ee2bf688fbb26153b
    Size: 22.72 MB

Asianux Server 9 for x86_64
  1. podman-4.9.4-3.el9.x86_64.rpm
    MD5: b2eba172866fa206027bc2677230f076
    SHA-256: d3a4a4f917a5a4febd68704324958edc5c70d0df5125d99498657844accf784c
    Size: 15.53 MB
  2. podman-docker-4.9.4-3.el9.noarch.rpm
    MD5: 32658250077ad9bb706df7e3a59e2406
    SHA-256: fc07de8cbf54067b154e5d842e1bbd6134e78089511ffbdd1b32a1ed47f04402
    Size: 56.32 kB
  3. podman-plugins-4.9.4-3.el9.x86_64.rpm
    MD5: cdb51ca6db711884c55393a143a80ee8
    SHA-256: 4f79fb0e38fb9031cb1184b67fa6cfd2b42ff160cba0fe43c7d4a7adec16439d
    Size: 1.28 MB
  4. podman-remote-4.9.4-3.el9.x86_64.rpm
    MD5: e23c3415fd8e3c98cb28e85921d317a3
    SHA-256: 64c53580543db0270262ee2312dbebcbf763f48fa06b1647c07baacfe3270834
    Size: 10.22 MB
  5. podman-tests-4.9.4-3.el9.x86_64.rpm
    MD5: e01cd4060e791f936cd6172d80b79a0d
    SHA-256: 2de0fec8e582e5c774975937e2cfca8a67c9b2b2f4738ad3d94ebe33f9ba7603
    Size: 191.10 kB