[ALSA-2021:2291] Important: container-tools:2.0 security update
Type:
security
Severity:
important
Release date:
2021-06-08
Description:
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 slirp4netns-0.4.2-3.git21fdece.module_el8.5.0+2635+e4386a39.aarch64.rpm 2786570cbf046a16552fe8233eee3a7d5ab9166149e4f93c34d0866eac85f4b0
aarch64 crit-3.12-9.module_el8.4.0+2496+12421f43.aarch64.rpm 374a246998b4b262308633d7e90f023f83fee938bc4e2ecaf58b602e38a98add
aarch64 containernetworking-plugins-0.8.3-4.module_el8.5.0+2635+e4386a39.aarch64.rpm 3fc278dc589b45a61931e18a3858f4df6df283432593810e12a22135486e5628
aarch64 criu-3.12-9.module_el8.4.0+2496+12421f43.aarch64.rpm 5e7dc0cc2c02e609705b15993b9bce828f64048241164018a52e4031851b8101
aarch64 containers-common-0.1.41-4.module_el8.5.0+2635+e4386a39.aarch64.rpm 9812f3e2cf6fddb560311be34ae4d3272cbd87fff15c253c982f8ada5de9ceef
aarch64 python3-criu-3.12-9.module_el8.4.0+2496+12421f43.aarch64.rpm 9d828e00185af8431441a1fcb18cf256576f1e02aa9861e324a61837ad139359
aarch64 conmon-2.0.15-1.module_el8.5.0+2635+e4386a39.aarch64.rpm aaeff4826f038c158b4b76831ed5ae88efea3b4113aedd94d5963e512f96c4f2
aarch64 skopeo-tests-0.1.41-4.module_el8.5.0+2635+e4386a39.aarch64.rpm c8eb51ad20abb61689bd3f1cca438d3c9db2d218077dca3ef4779f304e0337bd
aarch64 fuse-overlayfs-0.7.8-1.module_el8.5.0+2635+e4386a39.aarch64.rpm e1fe7c323b5a26069d1dcece5f370795baccbd7645b3ca4074d44a903a4da41a
aarch64 skopeo-0.1.41-4.module_el8.5.0+2635+e4386a39.aarch64.rpm ea69bd9964b00d478e38074f5dfb58880fab352139315147240b42a3457ad462
noarch container-selinux-2.130.0-1.module_el8.5.0+2635+e4386a39.noarch.rpm 0369a76ca292304e16f105662076a0f91f516308a6ddb0673ee148a2f4a3e468
noarch toolbox-0.0.7-1.module_el8.5.0+108+00865455.noarch.rpm 0bf9725aab286a475c46f365919cf3ff3b684b71112e5ddcea85fde85136c1d7
noarch toolbox-0.0.7-1.module_el8.5.0+2635+e4386a39.noarch.rpm 2a26195b240f74ef12f6e381516294c3983a2873382d2940167dcff48cdf6e2c
noarch cockpit-podman-11-1.module_el8.5.0+108+00865455.noarch.rpm 3525134cda7e981fe2ded68c4813ce09c7efece2c6d8c3f8f4b4da268c647f86
noarch udica-0.2.1-2.module_el8.5.0+108+00865455.noarch.rpm 49cfff6dc507f3d74fb6e02a7fd3da4cf45ab5291e37c150c487a8bd14eb2884
noarch python-podman-api-1.2.0-0.2.gitd0a45fe.module_el8.5.0+2635+e4386a39.noarch.rpm 6014c5c3fb0e8b251cf8fe13d9dc538fe94d16ae2bfbf82206773d07378a433e
noarch cockpit-podman-11-1.module_el8.5.0+2635+e4386a39.noarch.rpm 691ee7e18ff98e8dcd548dbb4737bb9dd7755779f6aba83e688b66a32fdf2ecf
noarch udica-0.2.1-2.module_el8.5.0+2635+e4386a39.noarch.rpm 9b886f6e05c447d885e09a28818a3bd3b96d150c5b5498cf2e71df0a54c891a0
noarch container-selinux-2.130.0-1.module_el8.5.0+108+00865455.noarch.rpm a3bd5627c6fa15266773bd9ee170fbb95cb92b15cc605f0da01120fcdce16cd9
noarch python-podman-api-1.2.0-0.2.gitd0a45fe.module_el8.5.0+108+00865455.noarch.rpm bb7cecd971e77ee0ad43f29b3351871450f3fb08b180f0fae99cc0bf904cc0b5
ppc64le containers-common-0.1.41-4.module_el8.5.0+108+00865455.ppc64le.rpm 0f9f64e6612cd19a136059986dc2dbcde99abb4f11567bb9266318254eb08832
ppc64le skopeo-tests-0.1.41-4.module_el8.5.0+108+00865455.ppc64le.rpm 20fa21876a022fe437fb0fa661db60923bb0990b641d8f89d698ea0408422c57
ppc64le containernetworking-plugins-0.8.3-4.module_el8.5.0+108+00865455.ppc64le.rpm 4aa34a1d9ae2e5e4d3d582b8f88a5a4be19dee53577dc43de68c41652f3715d1
ppc64le fuse-overlayfs-0.7.8-1.module_el8.5.0+108+00865455.ppc64le.rpm 6260f64147f1f79fbdfba8d5bf2fdfcb0228753c869cfe934357788328e6d809
ppc64le conmon-2.0.15-1.module_el8.5.0+108+00865455.ppc64le.rpm 9997dafd93a1153260c538734759649c7daa8398cf6fc33f673da6b0171e30e2
ppc64le slirp4netns-0.4.2-3.git21fdece.module_el8.5.0+108+00865455.ppc64le.rpm a33c8ba5b6acbf644a149fd9f64317b4443ae46ebe4b2f7f30ab6ca7c953eca3
ppc64le crit-3.12-9.module_el8.5.0+119+9a9ec082.ppc64le.rpm b8dbaf91a2da4141f9fdcf2c921381f730daa7eac1571c129942866c33c5e327
ppc64le criu-3.12-9.module_el8.5.0+119+9a9ec082.ppc64le.rpm bcea4da7655728ba18650cd0bd81a4d010af90b71006167821aee191b021d442
ppc64le skopeo-0.1.41-4.module_el8.5.0+108+00865455.ppc64le.rpm edcee27f26f5e1da2b36579a28aa7b915ce015f8b579dbb3ab607bbb35dcc722
ppc64le python3-criu-3.12-9.module_el8.5.0+119+9a9ec082.ppc64le.rpm ef0097fef0bd6b1b1c65098059f5e5627c67535f0213dd41ddd25a10dae2d4cf
x86_64 crit-3.12-9.module_el8.3.0+2044+12421f43.x86_64.rpm 16c4565749c2a57835be9f8828b93fa8473bcdeb89754224acfe6e2be2dcd8b5
x86_64 containernetworking-plugins-0.8.3-4.module_el8.5.0+2635+e4386a39.x86_64.rpm 1fe0f63af6df749a7c1a66a5706677b9d98308002b72f928c89bc8835a22a6a3
x86_64 python3-criu-3.12-9.module_el8.3.0+2044+12421f43.x86_64.rpm 3343763ab060b64aa3b643a5148bd26dcd362a89289752d0b7fe4d70be2577aa
x86_64 containers-common-0.1.41-4.module_el8.5.0+2635+e4386a39.x86_64.rpm 3b5376631796afb2ac8f982931fdfb9b6a7ebb85858bc10cba8bdc3ec8ba8d44
x86_64 skopeo-tests-0.1.41-4.module_el8.5.0+2635+e4386a39.x86_64.rpm 3ccb5656439b7a992d7ea37c6399ee3f3998b42dfbb11ef07f9037b9b64e700d
x86_64 skopeo-0.1.41-4.module_el8.5.0+2635+e4386a39.x86_64.rpm 6825ba8e3536c8b56dfc093f4fbd7fb2c78b985c6f6939a0c6282904941ec921
x86_64 fuse-overlayfs-0.7.8-1.module_el8.5.0+2635+e4386a39.x86_64.rpm 68ca74d1076ba283a400daa5b16bac2348caa47f841a53c848c364358df9062d
x86_64 slirp4netns-0.4.2-3.git21fdece.module_el8.5.0+2635+e4386a39.x86_64.rpm 872ed560d33d70e3e657deeedd8b39852165aed41071d03fdfc22107a83e0b37
x86_64 criu-3.12-9.module_el8.3.0+2044+12421f43.x86_64.rpm 9dd3b82c1674bfa0186fcf5a66c216a74cdd5c91de3236ece6d091b21f871963
x86_64 conmon-2.0.15-1.module_el8.5.0+2635+e4386a39.x86_64.rpm f4735ff5b7e08fb1b9808a9d22e93d4069d3197a3f820901504c92ca54eb9984
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.