CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS
Percentile
30.9%
An update is available for podman, buildah, module.toolbox, module.podman, cockpit-podman, containers-common, module.criu, module.conmon, module.aardvark-dns, module.containers-common, module.python-podman, oci-seccomp-bpf-hook, module.fuse-overlayfs, module.oci-seccomp-bpf-hook, module.udica, module.crun, container-selinux, module.runc, crun, conmon, module.netavark, module.containernetworking-plugins, module.cockpit-podman, toolbox, module.skopeo, criu, runc, module.slirp4netns, netavark, slirp4netns, udica, skopeo, libslirp, fuse-overlayfs, python-podman, module.buildah, module.container-selinux, module.libslirp, containernetworking-plugins, aardvark-dns.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
containers/image: digest type does not guarantee valid type (CVE-2024-3727)
golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789)
go-retryablehttp: url might write sensitive information to log file (CVE-2024-6104)
gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization (CVE-2024-37298)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.