• 公告ID (KylinSec-SA-2025-1138)

摘要:

podman security update

安全等级: High

公告ID: KylinSec-SA-2025-1138

发布日期: 2025年2月28日

关联CVE: CVE-2022-32189   CVE-2024-24791   CVE-2022-41715   CVE-2019-9514   CVE-2022-2880   CVE-2024-9355   CVE-2022-1962  

  • 详细介绍

1. 漏洞描述

   

Podman manages the entire container ecosystem which includes pods, containers, container images, and container volumes using the libpod library.

Security Fix(es):

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.(CVE-2019-9514)

Uncontrolled recursion in the Parse functions in go/parser before Go 1.17.12 and Go 1.18.4 allow an attacker to cause a panic due to stack exhaustion via deeply nested types or declarations.(CVE-2022-1962)

Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparsable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparsable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.(CVE-2022-2880)

A too-short encoded message can cause a panic in Float.GobDecode and Rat GobDecode in math/big in Go before 1.17.13 and 1.18.5, potentially allowing a denial of service.(CVE-2022-32189)

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.(CVE-2022-41715)

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.(CVE-2024-24791)

A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.(CVE-2024-9355)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-32189 KY3.4-5A golang Fixed
CVE-2024-24791 KY3.4-5A golang Fixed
CVE-2022-41715 KY3.4-5A golang Fixed
CVE-2019-9514 KY3.4-5A podman Fixed
CVE-2022-2880 KY3.4-5A golang Fixed
CVE-2024-9355 KY3.4-5A podman Fixed
CVE-2022-1962 KY3.4-5A golang Fixed

3. 影响组件

    podman

4. 修复版本

   

KY3.4-5A

软件名称 架构 版本号
podman-docker noarch 0.10.1-10.kb1.ky3_4
python3-podman noarch 0.10.1-10.kb1.ky3_4
python3-pypodman noarch 0.10.1-10.kb1.ky3_4
podman x86_64 0.10.1-10.kb1.ky3_4
podman-help x86_64 0.10.1-10.kb1.ky3_4
podman aarch64 0.10.1-10.kb1.ky3_4
podman-help aarch64 0.10.1-10.kb1.ky3_4

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.4-5A:

x86_64:

     podman-docker   

     python3-podman   

     python3-pypodman   

     podman   

     podman-help   

aarch64:

     podman-docker   

     python3-podman   

     python3-pypodman   

     podman   

     podman-help   

上一篇:KylinSec-SA-2025-1136 下一篇:KylinSec-SA-2025-1139