First published: Tue Nov 15 2022(Updated: )
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.<br>Security Fix(es):<br><li> golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)</li> <li> golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)</li> <li> podman: podman machine spawns gvproxy with port bound to all IPs (CVE-2021-4024)</li> <li> podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)</li> <li> containers/storage: DoS via malicious image (CVE-2021-20291)</li> <li> golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)</li> <li> golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)</li> <li> golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/podman | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-catatonit-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-debugsource | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-docker | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-gvproxy | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-gvproxy-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-plugins | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-plugins-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-remote | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-remote-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-tests | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-catatonit-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-debugsource | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-gvproxy | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-gvproxy-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-plugins | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-plugins-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-remote | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-remote-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-tests | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-catatonit-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-debugsource | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-gvproxy | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-gvproxy-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-plugins | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-plugins-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-remote | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-remote-debuginfo | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman-tests | <4.2.0-3.el9 | 4.2.0-3.el9 |
redhat/podman | <4.2.0-3.el9.aa | 4.2.0-3.el9.aa |
redhat/podman-catatonit-debuginfo | <4.2.0-3.el9.aa | 4.2.0-3.el9.aa |
redhat/podman-debuginfo | <4.2.0-3.el9.aa | 4.2.0-3.el9.aa |
redhat/podman-debugsource | <4.2.0-3.el9.aa | 4.2.0-3.el9.aa |
redhat/podman-gvproxy | <4.2.0-3.el9.aa | 4.2.0-3.el9.aa |
redhat/podman-gvproxy-debuginfo | <4.2.0-3.el9.aa | 4.2.0-3.el9.aa |
redhat/podman-plugins | <4.2.0-3.el9.aa | 4.2.0-3.el9.aa |
redhat/podman-plugins-debuginfo | <4.2.0-3.el9.aa | 4.2.0-3.el9.aa |
redhat/podman-remote | <4.2.0-3.el9.aa | 4.2.0-3.el9.aa |
redhat/podman-remote-debuginfo | <4.2.0-3.el9.aa | 4.2.0-3.el9.aa |
redhat/podman-tests | <4.2.0-3.el9.aa | 4.2.0-3.el9.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.