{"affected":[{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150300.9.43.1","podman-remote":"4.9.5-150300.9.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP3-LTSS","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150300.9.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150300.9.43.1","podman-remote":"4.9.5-150300.9.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150300.9.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150300.9.43.1","podman-remote":"4.9.5-150300.9.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150300.9.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150300.9.43.1","podman-remote":"4.9.5-150300.9.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150300.9.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150300.9.43.1","podman-remote":"4.9.5-150300.9.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150300.9.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150300.9.43.1","podman-remote":"4.9.5-150300.9.43.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150300.9.43.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for podman fixes the following issues:\n\n- CVE-2025-27144: Fixed denial of service in parsing function of embedded library Go JOSE (bsc#1237641)\n- CVE-2024-9676: github.com/containers/storage: Fixed symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) (bsc#1231698) \n- CVE-2024-9675: Fixed cache arbitrary directory mount in buildah (bsc#1231499)\n- CVE-2024-9407: Fixed Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction in buildah (bsc#1231208)\n- CVE-2024-9341: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (bsc#1231230)\n- CVE-2024-1753: Fixed full container escape at build time in buildah (bsc#1221677)\n- CVE-2024-11218: Fixed a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. (bsc#1236270)\n- CVE-2024-6104: Fixed hashicorp/go-retryablehttp writing sensitive information to log files (bsc#1227052)\n- CVE-2023-45288: Fixed golang.org/x/net/http2 excessive resource consumption when receiving too many headers (bsc#1236507)\n  \n\n- Load ip_tables and ip6_tables kernel module (bsc#1214612)\n  * Required for rootless mode as a regular user has no permission\n    to load kernel modules\n\n\n- Refactor network backend dependencies:\n  * podman requires either netavark or cni-plugins. On ALP, require\n    netavark, otherwise prefer netavark but don't force it.\n  * This fixes missing cni-plugins in some scenarios\n  * Default to netavark everywhere where it's available\n","id":"SUSE-SU-2025:0775-1","modified":"2025-03-04T12:51:39Z","published":"2025-03-04T12:51:39Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250775-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215807"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215926"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217828"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227052"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231698"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236270"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237641"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-11218"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1753"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-6104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9341"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9407"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-27144"}],"related":["CVE-2023-45288","CVE-2024-11218","CVE-2024-1753","CVE-2024-6104","CVE-2024-9341","CVE-2024-9407","CVE-2024-9675","CVE-2024-9676","CVE-2025-27144"],"summary":"Security update for podman","upstream":["CVE-2023-45288","CVE-2024-11218","CVE-2024-1753","CVE-2024-6104","CVE-2024-9341","CVE-2024-9407","CVE-2024-9675","CVE-2024-9676","CVE-2025-27144"]}