Rocky Linux: RLSA-2022:7954 podman security and bug fix update | L...
{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2022:7954","synopsis":"Moderate: podman security and bug fix update","severity":"SEVERITY_MODERATE","topic":"An update for podman is now available for Rocky Linux 9.\nRocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.","description":"The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nAdditional Changes:\nFor detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.","solution":null,"affectedProducts":["Rocky Linux 9"],"fixes":[{"ticket":"1913333","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1913333","description":"CVE-2020-28851 golang.org\/x\/text: Panic in language.ParseAcceptLanguage while parsing -u- extension"},{"ticket":"1913338","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1913338","description":"CVE-2020-28852 golang.org\/x\/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag"},{"ticket":"1919050","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1919050","description":"CVE-2021-20199 podman: Remote traffic to rootless containers is seen as orginating from localhost"},{"ticket":"1939485","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1939485","description":"CVE-2021-20291 containers\/storage: DoS via malicious image"},{"ticket":"1972303","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1972303","description":"TMPDIR is not working in podman pull and podman load [rhel-9.0 beta]"},{"ticket":"1983596","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1983596","description":"CVE-2021-34558 golang: crypto\/tls: certificate of wrong type is causing TLS client to panic"},{"ticket":"1989570","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1989570","description":"CVE-2021-33197 golang: net\/http\/httputil: ReverseProxy forwards connection headers if first one is empty"},{"ticket":"2026675","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2026675","description":"CVE-2021-4024 podman: podman machine spawns gvproxy with port bound to all IPs"},{"ticket":"2040379","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2040379","description":"Podman exe failed to cleanup dir with NFS"},{"ticket":"2064702","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2064702","description":"CVE-2022-27191 golang: crash in a golang.org\/x\/crypto\/ssh server"},{"ticket":"2081349","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2081349","description":"podman defaults to old network stack on RHEL9"},{"ticket":"2088116","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2088116","description":"podman does not require netavark"},{"ticket":"2092798","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2092798","description":"podman installation includes runc as a dependency"},{"ticket":"2097694","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2097694","description":"Allow mounting -v \/run:\/run without leaking .containerenv file to the host"}],"cves":[{"name":"CVE-2022-27191","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-27191.json","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-327"}],"references":[],"publishedAt":"2023-01-25T21:21:29.163181Z","rpms":{},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2022:7954 podman security and bug fix update

January 25, 2023
An update for podman is now available for Rocky Linux 9. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Moderate

Summary

An update for podman is now available for Rocky Linux 9. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.

RPMs

References

No References

CVEs

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27191.json

Severity
Name: RLSA-2022:7954
Affected Products: Rocky Linux 9

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=1913333

https://bugzilla.redhat.com/show_bug.cgi?id=1913338

https://bugzilla.redhat.com/show_bug.cgi?id=1919050

https://bugzilla.redhat.com/show_bug.cgi?id=1939485

https://bugzilla.redhat.com/show_bug.cgi?id=1972303

https://bugzilla.redhat.com/show_bug.cgi?id=1983596

https://bugzilla.redhat.com/show_bug.cgi?id=1989570

https://bugzilla.redhat.com/show_bug.cgi?id=2026675

https://bugzilla.redhat.com/show_bug.cgi?id=2040379

https://bugzilla.redhat.com/show_bug.cgi?id=2064702

https://bugzilla.redhat.com/show_bug.cgi?id=2081349

https://bugzilla.redhat.com/show_bug.cgi?id=2088116

https://bugzilla.redhat.com/show_bug.cgi?id=2092798

https://bugzilla.redhat.com/show_bug.cgi?id=2097694


We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.