{"id":"RHSA-2024:9454","summary":"Red Hat Security Advisory: podman security update","modified":"2026-04-19T10:08:09Z","published":"2024-11-13T21:19:29Z","related":["GO-2024-3105","GO-2024-3106","GO-2024-3107"],"upstream":["CVE-2024-34155","CVE-2024-34156","CVE-2024-34158","CVE-2024-9341","CVE-2024-9407","CVE-2024-9675","CVE-2024-9676"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:9454"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310527"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310529"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315691"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315887"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317458"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317467"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-60263"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-61249"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9454.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-9341"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-9341"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9341"},{"type":"ARTICLE","url":"https://github.com/containers/common/blob/384f77532f67afc8a73d8e0c4adb0d195df57714/pkg/subscriptions/subscriptions.go#L169"},{"type":"ARTICLE","url":"https://github.com/containers/common/blob/384f77532f67afc8a73d8e0c4adb0d195df57714/pkg/subscriptions/subscriptions.go#L349"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-9407"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-9407"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9407"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-fhqq-8f65-5xfc"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-9675"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-9675"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9675"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-9676"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-9676"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9676"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-wq2p-5pc6-wpgf"},{"type":"ARTICLE","url":"https://github.com/containers/storage/commit/935c58f4b3e364a9c9d33ed06476a831e6ad5679"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-34155"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-34155"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34155"},{"type":"ARTICLE","url":"https://go.dev/cl/611238"},{"type":"ARTICLE","url":"https://go.dev/issue/69138"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2024-3105"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-34156"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-34156"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34156"},{"type":"ARTICLE","url":"https://go.dev/cl/611239"},{"type":"ARTICLE","url":"https://go.dev/issue/69139"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2024-3106"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-34158"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-34158"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34158"},{"type":"ARTICLE","url":"https://go.dev/cl/611240"},{"type":"ARTICLE","url":"https://go.dev/issue/69141"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2024-3107"}],"affected":[{"package":{"name":"podman","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/podman"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:5.2.2-9.el9_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:9454.json"}},{"package":{"name":"podman-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/podman-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:5.2.2-9.el9_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:9454.json"}},{"package":{"name":"podman-debugsource","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/podman-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:5.2.2-9.el9_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:9454.json"}},{"package":{"name":"podman-docker","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/podman-docker"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:5.2.2-9.el9_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:9454.json"}},{"package":{"name":"podman-plugins","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/podman-plugins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:5.2.2-9.el9_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:9454.json"}},{"package":{"name":"podman-plugins-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/podman-plugins-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:5.2.2-9.el9_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:9454.json"}},{"package":{"name":"podman-remote","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/podman-remote"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:5.2.2-9.el9_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:9454.json"}},{"package":{"name":"podman-remote-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/podman-remote-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:5.2.2-9.el9_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:9454.json"}},{"package":{"name":"podman-tests","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/podman-tests"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:5.2.2-9.el9_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:9454.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}