摘要:
podman security update
安全等级: Medium
公告ID: KylinSec-SA-2025-1607
发布日期: 2025年3月18日
关联CVE: CVE-2024-24785 CVE-2024-28176
Podman manages the entire container ecosystem which includes pods, containers, container images, and container volumes using the libpod library.
Security Fix(es):
If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.(CVE-2024-24785)
jose is JavaScript module for JSON Object Signing and Encryption, providing support for JSON Web Tokens (JWT), JSON Web Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), JSON Web Key Set (JWKS), and more. A vulnerability has
been identified in the JSON Web Encryption (JWE) decryption interfaces, specifically related to the support for decompressing plaintext after its decryption. Under certain conditions it is possible to have the user's environment consume unreasonable amount of CPU time or memory during JWE Decryption operations. This issue has been patched in versions 2.0.7 and 4.15.5.(CVE-2024-28176)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-24785 | V6 | golang | Fixed |
CVE-2024-28176 | V6 | podman | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
podman-docker | noarch | 4.9.4-14.ks6 |
podman-help | noarch | 4.9.4-14.ks6 |
podman | x86_64 | 4.9.4-14.ks6 |
podman-gvproxy | x86_64 | 4.9.4-14.ks6 |
podman-plugins | x86_64 | 4.9.4-14.ks6 |
podman-remote | x86_64 | 4.9.4-14.ks6 |
podman-tests | x86_64 | 4.9.4-14.ks6 |
podmansh | x86_64 | 4.9.4-14.ks6 |
podman | aarch64 | 4.9.4-14.ks6 |
podman-gvproxy | aarch64 | 4.9.4-14.ks6 |
podman-plugins | aarch64 | 4.9.4-14.ks6 |
podman-remote | aarch64 | 4.9.4-14.ks6 |
podman-tests | aarch64 | 4.9.4-14.ks6 |
podmansh | aarch64 | 4.9.4-14.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名