podman-4.9.4-13.el9_4

エラータID: AXSA:2024-8900:09

Release date: 
Wednesday, October 16, 2024 - 13:43
Subject: 
podman-4.9.4-13.el9_4
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fix(es):

* go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
* Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (CVE-2024-9341)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2024-34155
Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.
CVE-2024-34156
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
CVE-2024-34158
Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.
CVE-2024-9341
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. podman-4.9.4-13.el9_4.src.rpm
    MD5: 0fb984e0844cd83f2c2ae4d77049967f
    SHA-256: 6f4d7f6d3283e32d87f7de64931b0cd7b97528fbe8a5b427fae5e2f7fa3976f3
    Size: 22.76 MB

Asianux Server 9 for x86_64
  1. podman-4.9.4-13.el9_4.x86_64.rpm
    MD5: 3f6c94dbb5814efe22ca9e9289e176b5
    SHA-256: e2f8a6f7d80e79d30c4799bc15bcd9f6479c0635ecd574b0c7a89ca7c94ebf03
    Size: 15.58 MB
  2. podman-docker-4.9.4-13.el9_4.noarch.rpm
    MD5: 86c962ff8edfa6f5e7ca54bb25bb70bd
    SHA-256: b263253b316f0990aeda1b1413a1a056f1b901147c390c397ed2fc5292338580
    Size: 105.80 kB
  3. podman-plugins-4.9.4-13.el9_4.x86_64.rpm
    MD5: de7967f7d15c37e500b3263faa638994
    SHA-256: 98efeb5591ed0400caf53004e4eac21163d303ed2fbe99ec7808553cdbf34515
    Size: 1.28 MB
  4. podman-remote-4.9.4-13.el9_4.x86_64.rpm
    MD5: b04ff8634575d6eec43a125d31689608
    SHA-256: ce01f02b8c99684c76a15cc3e4af23e160bff50c2cb6e37fb30632102be791de
    Size: 10.24 MB
  5. podman-tests-4.9.4-13.el9_4.x86_64.rpm
    MD5: 7473c9e1399aa6c86a125f02e505f230
    SHA-256: cb823bae6a0d5844668f2aa741b2a97265376e8d1b7883ecc259255d68ed12f3
    Size: 210.40 kB