Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-1726 (GCVE-0-2020-1726)
Vulnerability from cvelistv5
Published
2020-02-11 19:45
Modified
2024-08-04 06:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.890Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726" }, { "name": "RHSA-2020:0680", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0680" }, { "name": "openSUSE-SU-2020:1552", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html" }, { "name": "openSUSE-SU-2020:1559", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "podman", "vendor": "The ", "versions": [ { "status": "affected", "version": "from 1.6.0 onwards" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "CWE-552", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-28T14:06:06", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726" }, { "name": "RHSA-2020:0680", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0680" }, { "name": "openSUSE-SU-2020:1552", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html" }, { "name": "openSUSE-SU-2020:1559", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-1726", "datePublished": "2020-02-11T19:45:26", "dateReserved": "2019-11-27T00:00:00", "dateUpdated": "2024-08-04T06:46:30.890Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-1726\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2020-02-11T20:15:12.070\",\"lastModified\":\"2024-11-21T05:11:15.030\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un fallo en Podman donde permite incorrectamente que los contenedores cuando se crean sobrescriban los archivos existentes en vol\u00famenes, incluso si est\u00e1n montados como de solo lectura. Cuando un usuario ejecuta un contenedor malicioso o un contenedor basado en una imagen maliciosa con un volumen adjunto que se usa por primera vez, es posible desencadenar el fallo y sobrescribir archivos en el volumen. Este problema fue introducido en la versi\u00f3n 1.6.0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:P\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-552\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-552\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpod_project:libpod:1.6.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"64FC5FEB-2FF7-4EF5-ACC9-0B3A60FDB3DD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E57E25E-342F-411A-8840-6AF01078D09F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0680\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
fkie_cve-2020-1726
Vulnerability from fkie_nvd
Published
2020-02-11 20:15
Modified
2024-11-21 05:11
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html | ||
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2020:0680 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2020:0680 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726 | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libpod_project | libpod | 1.6.0 | |
redhat | openshift_container_platform | 4.3 | |
redhat | enterprise_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libpod_project:libpod:1.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "64FC5FEB-2FF7-4EF5-ACC9-0B3A60FDB3DD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "6E57E25E-342F-411A-8840-6AF01078D09F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0." }, { "lang": "es", "value": "Se detect\u00f3 un fallo en Podman donde permite incorrectamente que los contenedores cuando se crean sobrescriban los archivos existentes en vol\u00famenes, incluso si est\u00e1n montados como de solo lectura. Cuando un usuario ejecuta un contenedor malicioso o un contenedor basado en una imagen maliciosa con un volumen adjunto que se usa por primera vez, es posible desencadenar el fallo y sobrescribir archivos en el volumen. Este problema fue introducido en la versi\u00f3n 1.6.0." } ], "id": "CVE-2020-1726", "lastModified": "2024-11-21T05:11:15.030", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-11T20:15:12.070", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2020:0680" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2020:0680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
ghsa-vmhj-p9hw-vgrf
Vulnerability from github
Published
2022-05-24 17:08
Modified
2023-02-08 18:07
Severity ?
VLAI Severity ?
Summary
Podman has Files or Directories Accessible to External Parties
Details
A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume. This issue was introduced in version 1.6.0.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/containers/podman" }, "ranges": [ { "events": [ { "introduced": "1.6.0" }, { "fixed": "2.0.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/containers/podman/v2" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.0.6" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-1726" ], "database_specific": { "cwe_ids": [ "CWE-552" ], "github_reviewed": true, "github_reviewed_at": "2023-02-08T18:07:43Z", "nvd_published_at": "2020-02-11T20:15:00Z", "severity": "MODERATE" }, "details": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume. This issue was introduced in version 1.6.0.", "id": "GHSA-vmhj-p9hw-vgrf", "modified": "2023-02-08T18:07:43Z", "published": "2022-05-24T17:08:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1726" }, { "type": "WEB", "url": "https://github.com/containers/podman/commit/c140ecdc9b416ab4efd4d21d14acd63b6adbdd42" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0680" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:1650" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2020-1726" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801152" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726" }, { "type": "PACKAGE", "url": "https://github.com/containers/podman" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Podman has Files or Directories Accessible to External Parties" }
opensuse-su-2024:11177-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
podman-3.3.1-2.1 on GA media
Notes
Title of the patch
podman-3.3.1-2.1 on GA media
Description of the patch
These are all security issues fixed in the podman-3.3.1-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11177
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "podman-3.3.1-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the podman-3.3.1-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11177", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11177-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10856 page", "url": "https://www.suse.com/security/cve/CVE-2018-10856/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10152 page", "url": "https://www.suse.com/security/cve/CVE-2019-10152/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10214 page", "url": "https://www.suse.com/security/cve/CVE-2019-10214/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14370 page", "url": "https://www.suse.com/security/cve/CVE-2020-14370/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1726 page", "url": "https://www.suse.com/security/cve/CVE-2020-1726/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20199 page", "url": "https://www.suse.com/security/cve/CVE-2021-20199/" } ], "title": "podman-3.3.1-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11177-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "podman-3.3.1-2.1.aarch64", "product": { "name": "podman-3.3.1-2.1.aarch64", "product_id": "podman-3.3.1-2.1.aarch64" } }, { "category": "product_version", "name": "podman-cni-config-3.3.1-2.1.aarch64", "product": { "name": "podman-cni-config-3.3.1-2.1.aarch64", "product_id": "podman-cni-config-3.3.1-2.1.aarch64" } }, { "category": "product_version", "name": "podman-docker-3.3.1-2.1.aarch64", "product": { "name": "podman-docker-3.3.1-2.1.aarch64", "product_id": "podman-docker-3.3.1-2.1.aarch64" } }, { "category": "product_version", "name": "podman-remote-3.3.1-2.1.aarch64", "product": { "name": "podman-remote-3.3.1-2.1.aarch64", "product_id": "podman-remote-3.3.1-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "podman-3.3.1-2.1.ppc64le", "product": { "name": "podman-3.3.1-2.1.ppc64le", "product_id": "podman-3.3.1-2.1.ppc64le" } }, { "category": "product_version", "name": "podman-cni-config-3.3.1-2.1.ppc64le", "product": { "name": "podman-cni-config-3.3.1-2.1.ppc64le", "product_id": "podman-cni-config-3.3.1-2.1.ppc64le" } }, { "category": "product_version", "name": "podman-docker-3.3.1-2.1.ppc64le", "product": { "name": "podman-docker-3.3.1-2.1.ppc64le", "product_id": "podman-docker-3.3.1-2.1.ppc64le" } }, { "category": "product_version", "name": "podman-remote-3.3.1-2.1.ppc64le", "product": { "name": "podman-remote-3.3.1-2.1.ppc64le", "product_id": "podman-remote-3.3.1-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "podman-3.3.1-2.1.s390x", "product": { "name": "podman-3.3.1-2.1.s390x", "product_id": "podman-3.3.1-2.1.s390x" } }, { "category": "product_version", "name": "podman-cni-config-3.3.1-2.1.s390x", "product": { "name": "podman-cni-config-3.3.1-2.1.s390x", "product_id": "podman-cni-config-3.3.1-2.1.s390x" } }, { "category": "product_version", "name": "podman-docker-3.3.1-2.1.s390x", "product": { "name": "podman-docker-3.3.1-2.1.s390x", "product_id": "podman-docker-3.3.1-2.1.s390x" } }, { "category": "product_version", "name": "podman-remote-3.3.1-2.1.s390x", "product": { "name": "podman-remote-3.3.1-2.1.s390x", "product_id": "podman-remote-3.3.1-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "podman-3.3.1-2.1.x86_64", "product": { "name": "podman-3.3.1-2.1.x86_64", "product_id": "podman-3.3.1-2.1.x86_64" } }, { "category": "product_version", "name": "podman-cni-config-3.3.1-2.1.x86_64", "product": { "name": "podman-cni-config-3.3.1-2.1.x86_64", "product_id": "podman-cni-config-3.3.1-2.1.x86_64" } }, { "category": "product_version", "name": "podman-docker-3.3.1-2.1.x86_64", "product": { "name": "podman-docker-3.3.1-2.1.x86_64", "product_id": "podman-docker-3.3.1-2.1.x86_64" } }, { "category": "product_version", "name": "podman-remote-3.3.1-2.1.x86_64", "product": { "name": "podman-remote-3.3.1-2.1.x86_64", "product_id": "podman-remote-3.3.1-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "podman-3.3.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64" }, "product_reference": "podman-3.3.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3.3.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le" }, "product_reference": "podman-3.3.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3.3.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x" }, "product_reference": "podman-3.3.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3.3.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64" }, "product_reference": "podman-3.3.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-3.3.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64" }, "product_reference": "podman-cni-config-3.3.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-3.3.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le" }, "product_reference": "podman-cni-config-3.3.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-3.3.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x" }, "product_reference": "podman-cni-config-3.3.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-3.3.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64" }, "product_reference": "podman-cni-config-3.3.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3.3.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64" }, "product_reference": "podman-docker-3.3.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3.3.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le" }, "product_reference": "podman-docker-3.3.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3.3.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x" }, "product_reference": "podman-docker-3.3.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3.3.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64" }, "product_reference": "podman-docker-3.3.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3.3.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64" }, "product_reference": "podman-remote-3.3.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3.3.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le" }, "product_reference": "podman-remote-3.3.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3.3.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x" }, "product_reference": "podman-remote-3.3.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3.3.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" }, "product_reference": "podman-remote-3.3.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10856" } ], "notes": [ { "category": "general", "text": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10856", "url": "https://www.suse.com/security/cve/CVE-2018-10856" }, { "category": "external", "summary": "SUSE Bug 1097970 for CVE-2018-10856", "url": "https://bugzilla.suse.com/1097970" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10856" }, { "cve": "CVE-2019-10152", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10152" } ], "notes": [ { "category": "general", "text": "A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10152", "url": "https://www.suse.com/security/cve/CVE-2019-10152" }, { "category": "external", "summary": "SUSE Bug 1136974 for CVE-2019-10152", "url": "https://bugzilla.suse.com/1136974" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-10152" }, { "cve": "CVE-2019-10214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10214" } ], "notes": [ { "category": "general", "text": "The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10214", "url": "https://www.suse.com/security/cve/CVE-2019-10214" }, { "category": "external", "summary": "SUSE Bug 1144065 for CVE-2019-10214", "url": "https://bugzilla.suse.com/1144065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10214" }, { "cve": "CVE-2020-14370", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14370" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability was found in containers/podman in versions before 2.0.5. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container will get leaked into subsequent containers. An attacker who has control over the subsequent containers could use this flaw to gain access to sensitive information stored in such variables.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14370", "url": "https://www.suse.com/security/cve/CVE-2020-14370" }, { "category": "external", "summary": "SUSE Bug 1176804 for CVE-2020-14370", "url": "https://bugzilla.suse.com/1176804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14370" }, { "cve": "CVE-2020-1726", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1726" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1726", "url": "https://www.suse.com/security/cve/CVE-2020-1726" }, { "category": "external", "summary": "SUSE Bug 1164090 for CVE-2020-1726", "url": "https://bugzilla.suse.com/1164090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-1726" }, { "cve": "CVE-2021-20199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20199" } ], "notes": [ { "category": "general", "text": "Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20199", "url": "https://www.suse.com/security/cve/CVE-2021-20199" }, { "category": "external", "summary": "SUSE Bug 1181640 for CVE-2021-20199", "url": "https://bugzilla.suse.com/1181640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2021-20199" } ] }
opensuse-su-2020:1552-1
Vulnerability from csaf_opensuse
Published
2020-09-27 10:22
Modified
2020-09-27 10:22
Summary
Security update for conmon, fuse-overlayfs, libcontainers-common, podman
Notes
Title of the patch
Security update for conmon, fuse-overlayfs, libcontainers-common, podman
Description of the patch
This update for conmon, fuse-overlayfs, libcontainers-common, podman fixes the following issues:
podman was updated to v2.0.6 (bsc#1175821)
- install missing systemd units for the new Rest API (bsc#1175957)
and a few man-pages that where missing before
- Drop varlink API related bits (in favor of the new API)
- fix install location for zsh completions
* Fixed a bug where running systemd in a container on a cgroups v1 system would fail.
* Fixed a bug where /etc/passwd could be re-created every time a container
is restarted if the container's /etc/passwd did not contain an entry
for the user the container was started as.
* Fixed a bug where containers without an /etc/passwd file specifying
a non-root user would not start.
* Fixed a bug where the --remote flag would sometimes not make
remote connections and would instead attempt to run Podman locally.
Update to v2.0.6:
* Features
- Rootless Podman will now add an entry to /etc/passwd for the user who ran Podman if run with --userns=keep-id.
- The podman system connection command has been reworked to support multiple connections, and reenabled for use!
- Podman now has a new global flag, --connection, to specify a connection to a remote Podman API instance.
* Changes
- Podman's automatic systemd integration (activated by the --systemd=true flag, set by default) will now activate for containers using /usr/local/sbin/init as their command, instead of just /usr/sbin/init and /sbin/init (and any path ending in systemd).
- Seccomp profiles specified by the --security-opt seccomp=... flag to podman create and podman run will now be honored even if the container was created using --privileged.
* Bugfixes
- Fixed a bug where the podman play kube would not honor the hostIP field for port forwarding (#5964).
- Fixed a bug where the podman generate systemd command would panic on an invalid restart policy being specified (#7271).
- Fixed a bug where the podman images command could take a very long time (several minutes) to complete when a large number of images were present.
- Fixed a bug where the podman logs command with the --tail flag would not work properly when a large amount of output would be printed ((#7230)[https://github.com//issues/7230]).
- Fixed a bug where the podman exec command with remote Podman would not return a non-zero exit code when the exec session failed to start (e.g. invoking a non-existent command) (#6893).
- Fixed a bug where the podman load command with remote Podman would did not honor user-specified tags (#7124).
- Fixed a bug where the podman system service command, when run as a non-root user by Systemd, did not properly handle the Podman pause process and would not restart properly as a result (#7180).
- Fixed a bug where the --publish flag to podman create, podman run, and podman pod create did not properly handle a host IP of 0.0.0.0 (attempting to bind to literal 0.0.0.0, instead of all IPs on the system) (#7104).
- Fixed a bug where the podman start --attach command would not print the container's exit code when the command exited due to the container exiting.
- Fixed a bug where the podman rm command with remote Podman would not remove volumes, even if the --volumes flag was specified (#7128).
- Fixed a bug where the podman run command with remote Podman and the --rm flag could exit before the container was fully removed.
- Fixed a bug where the --pod new:... flag to podman run and podman create would create a pod that did not share any namespaces.
- Fixed a bug where the --preserve-fds flag to podman run and podman exec could close the wrong file descriptors while trying to close user-provided descriptors after passing them into the container.
- Fixed a bug where default environment variables ($PATH and $TERM) were not set in containers when not provided by the image.
- Fixed a bug where pod infra containers were not properly unmounted after exiting.
- Fixed a bug where networks created with podman network create with an IPv6 subnet did not properly set an IPv6 default route.
- Fixed a bug where the podman save command would not work properly when its output was piped to another command (#7017).
- Fixed a bug where containers using a systemd init on a cgroups v1 system could leak mounts under /sys/fs/cgroup/systemd to the host.
- Fixed a bug where podman build would not generate an event on completion (#7022).
- Fixed a bug where the podman history command with remote Podman printed incorrect creation times for layers (#7122).
- Fixed a bug where Podman would not create working directories specified by the container image if they did not exist.
- Fixed a bug where Podman did not clear CMD from the container image if the user overrode ENTRYPOINT (#7115).
- Fixed a bug where error parsing image names were not fully reported (part of the error message containing the exact issue was dropped).
- Fixed a bug where the podman images command with remote Podman did not support printing image tags in Go templates supplied to the --format flag (#7123).
- Fixed a bug where the podman rmi --force command would not attempt to unmount containers it was removing, which could cause a failure to remove the image.
- Fixed a bug where the podman generate systemd --new command could incorrectly quote arguments to Podman that contained whitespace, leading to nonfunctional unit files (#7285).
- Fixed a bug where the podman version command did not properly include build time and Git commit.
- Fixed a bug where running systemd in a Podman container on a system that did not use the systemd cgroup manager would fail (#6734).
- Fixed a bug where capabilities from --cap-add were not properly added when a container was started as a non-root user via --user.
- Fixed a bug where Pod infra containers were not properly cleaned up when they stopped, causing networking issues (#7103).
* API
- Fixed a bug where the libpod and compat Build endpoints did not accept the application/tar content type (instead only accepting application/x-tar) (#7185).
- Fixed a bug where the libpod Exists endpoint would attempt to write a second header in some error conditions (#7197).
- Fixed a bug where compat and libpod Network Inspect and Network Remove endpoints would return a 500 instead of 404 when the requested network was not found.
- Added a versioned _ping endpoint (e.g. http://localhost/v1.40/_ping).
- Fixed a bug where containers started through a systemd-managed instance of the REST API would be shut down when podman system service shut down due to its idle timeout (#7294).
- Added stronger parameter verification for the libpod Network Create endpoint to ensure subnet mask is a valid value.
- The Pod URL parameter to the Libpod Container List endpoint has been deprecated; the information previously gated by the Pod boolean will now be included in the response unconditionally.
- Change hard requires for AppArmor to Recommends. They are not
needed for runtime or with SELinux but already installed if
AppArmor is used [jsc#SMO-15]
- Add BuildRequires for pkg-config(libselinux) to build with
SELinux support [jsc#SMO-15]
Update to v2.0.4
* Fixed a bug where the output of podman image search did not
populate the Description field as it was mistakenly assigned to
the ID field.
* Fixed a bug where podman build - and podman build on an HTTP
target would fail.
* Fixed a bug where rootless Podman would improperly chown the
copied-up contents of anonymous volumes (#7130).
* Fixed a bug where Podman would sometimes HTML-escape special
characters in its CLI output.
* Fixed a bug where the podman start --attach --interactive
command would print the container ID of the container attached
to when exiting (#7068).
* Fixed a bug where podman run --ipc=host --pid=host would only
set --pid=host and not --ipc=host (#7100).
* Fixed a bug where the --publish argument to podman run, podman
create and podman pod create would not allow binding the same
container port to more than one host port (#7062).
* Fixed a bug where incorrect arguments to podman images --format
could cause Podman to segfault.
* Fixed a bug where podman rmi --force on an image ID with more
than one name and at least one container using the image would
not completely remove containers using the image (#7153).
* Fixed a bug where memory usage in bytes and memory use
percentage were swapped in the output of podman stats
--format=json.
* Fixed a bug where the libpod and compat events endpoints would
fail if no filters were specified (#7078).
* Fixed a bug where the CgroupVersion field in responses from the
compat Info endpoint was prefixed by 'v' (instead of just being
'1' or '2', as is documented).
- Suggest katacontainers instead of recommending it. It's not
enabled by default, so it's just bloat
Update to v2.0.3
* Fix handling of entrypoint
* log API: add context to allow for cancelling
* fix API: Create container with an invalid configuration
* Remove all instances of named return 'err' from Libpod
* Fix: Correct connection counters for hijacked connections
* Fix: Hijacking v2 endpoints to follow rfc 7230 semantics
* Remove hijacked connections from active connections list
* version/info: format: allow more json variants
* Correctly print STDOUT on non-terminal remote exec
* Fix container and pod create commands for remote create
* Mask out /sys/dev to prevent information leak from the host
* Ensure sig-proxy default is propagated in start
* Add SystemdMode to inspect for containers
* When determining systemd mode, use full command
* Fix lint
* Populate remaining unused fields in `pod inspect`
* Include infra container information in `pod inspect`
* play-kube: add suport for 'IfNotPresent' pull type
* docs: user namespace can't be shared in pods
* Fix 'Error: unrecognized protocol \'TCP\' in port mapping'
* Error on rootless mac and ip addresses
* Fix & add notes regarding problematic language in codebase
* abi: set default umask and rlimits
* Used reference package with errors for parsing tag
* fix: system df error when an image has no name
* Fix Generate API title/description
* Add noop function disable-content-trust
* fix play kube doesn't override dockerfile ENTRYPOINT
* Support default profile for apparmor
* Bump github.com/containers/common to v0.14.6
* events endpoint: backwards compat to old type
* events endpoint: fix panic and race condition
* Switch references from libpod.conf to containers.conf
* podman.service: set type to simple
* podman.service: set doc to podman-system-service
* podman.service: use default registries.conf
* podman.service: use default killmode
* podman.service: remove stop timeout
* systemd: symlink user->system
* vendor golang.org/x/text@v0.3.3
* Fix a bug where --pids-limit was parsed incorrectly
* search: allow wildcards
* [CI:DOCS]Do not copy policy.json into gating image
* Fix systemd pid 1 test
* Cirrus: Rotate keys post repo. rename
* The libpod.conf(5) man page got removed and all references are
now pointing towards containers.conf(5), which will be part
of the libcontainers-common package.
Update to podman v2.0.2
* fix race condition in `libpod.GetEvents(...)`
* Fix bug where `podman mount` didn't error as rootless
* remove podman system connection
* Fix imports to ensure v2 is used with libpod
* Update release notes for v2.0.2
* specgen: fix order for setting rlimits
* Ensure umask is set appropriately for 'system service'
* generate systemd: improve pod-flags filter
* Fix a bug with APIv2 compat network remove to log an ErrNetworkNotFound instead of nil
* Fixes --remote flag issues
* Pids-limit should only be set if the user set it
* Set console mode for windows
* Allow empty host port in --publish flag
* Add a note on the APIs supported by `system service`
* fix: Don't override entrypoint if it's `nil`
* Set TMPDIR to /var/tmp by default if not set
* test: add tests for --user and volumes
* container: move volume chown after spec generation
* libpod: volume copyup honors namespace mappings
* Fix `system service` panic from early hangup in events
* stop podman service in e2e tests
* Print errors from individual containers in pods
* auto-update: clarify systemd-unit requirements
* podman ps truncate the command
* move go module to v2
* Vendor containers/common v0.14.4
* Bump to imagebuilder v1.1.6 on v2 branch
* Account for non-default port number in image name
- Changes since v2.0.1
* Update release notes with further v2.0.1 changes
* Fix inspect to display multiple label: changes
* Set syslog for exit commands on log-level=debug
* Friendly amendment for pr 6751
* podman run/create: support all transports
* systemd generate: allow manual restart of container units in pods
* Revert sending --remote flag to containers
* Print port mappings in `ps` for ctrs sharing network
* vendor github.com/containers/common@v0.14.3
* Update release notes for v2.0.1
* utils: drop default mapping when running uid!=0
* Set stop signal to 15 when not explicitly set
* podman untag: error if tag doesn't exist
* Reformat inspect network settings
* APIv2: Return `StatusCreated` from volume creation
* APIv2:fix: Remove `/json` from compat network EPs
* Fix ssh-agent support
* libpod: specify mappings to the storage
* APIv2:doc: Fix swagger doc to refer to volumes
* Add podman network to bash command completions
* Fix typo in manpage for `podman auto update`.
* Add JSON output field for ps
* V2 podman system connection
* image load: no args required
* Re-add PODMAN_USERNS environment variable
* Fix conflicts between privileged and other flags
* Bump required go version to 1.13
* Add explicit command to alpine container in test case.
* Use POLL_DURATION for timer
* Stop following logs using timers
* 'pod' was being truncated to 'po' in the names of the generated systemd unit files.
* rootless_linux: improve error message
* Fix podman build handling of --http-proxy flag
* correct the absolute path of `rm` executable
* Makefile: allow customizable GO_BUILD
* Cirrus: Change DEST_BRANCH to v2.0
Update to podman v2.0.0
* The `podman generate systemd` command now supports the `--new`
flag when used with pods, allowing portable services for pods
to be created.
* The `podman play kube` command now supports running Kubernetes
Deployment YAML.
* The `podman exec` command now supports the `--detach` flag to
run commands in the container in the background.
* The `-p` flag to `podman run` and `podman create` now supports
forwarding ports to IPv6 addresses.
* The `podman run`, `podman create` and `podman pod create`
command now support a `--replace` flag to remove and replace any
existing container (or, for `pod create`, pod) with the same name
* The `--restart-policy` flag to `podman run` and `podman create`
now supports the `unless-stopped` restart policy.
* The `--log-driver` flag to `podman run` and `podman create`
now supports the `none` driver, which does not log the
container's output.
* The `--mount` flag to `podman run` and `podman create` now
accepts `readonly` option as an alias to `ro`.
* The `podman generate systemd` command now supports the `--container-prefix`,
`--pod-prefix`, and `--separator` arguments to control the
name of generated unit files.
* The `podman network ls` command now supports the `--filter`
flag to filter results.
* The `podman auto-update` command now supports specifying an
authfile to use when pulling new images on a per-container
basis using the `io.containers.autoupdate.authfile` label.
* Fixed a bug where the `podman exec` command would log to journald
when run in containers loggined to journald
([#6555](https://github.com/containers/libpod/issues/6555)).
* Fixed a bug where the `podman auto-update` command would not
preserve the OS and architecture of the original image when
pulling a replacement
([#6613](https://github.com/containers/libpod/issues/6613)).
* Fixed a bug where the `podman cp` command could create an extra
`merged` directory when copying into an existing directory
([#6596](https://github.com/containers/libpod/issues/6596)).
* Fixed a bug where the `podman pod stats` command would crash
on pods run with `--network=host`
([#5652](https://github.com/containers/libpod/issues/5652)).
* Fixed a bug where containers logs written to journald did not
include the name of the container.
* Fixed a bug where the `podman network inspect` and
`podman network rm` commands did not properly handle non-default
CNI configuration paths ([#6212](https://github.com/containers/libpod/issues/6212)).
* Fixed a bug where Podman did not properly remove containers
when using the Kata containers OCI runtime.
* Fixed a bug where `podman inspect` would sometimes incorrectly
report the network mode of containers started with `--net=none`.
* Podman is now better able to deal with cases where `conmon`
is killed before the container it is monitoring.
Update to podman v1.9.3:
* Fixed a bug where, on FIPS enabled hosts, FIPS mode secrets
were not properly mounted into containers
* Fixed a bug where builds run over Varlink would hang
* Fixed a bug where podman save would fail when the target
image was specified by digest
* Fixed a bug where rootless containers with ports forwarded to them
could panic and dump core due to a concurrency issue (#6018)
* Fixed a bug where rootless Podman could race when opening the
rootless user namespace, resulting in commands failing to run
* Fixed a bug where HTTP proxy environment variables forwarded into
the container by the --http-proxy flag could not be overridden by --env or --env-file
* Fixed a bug where rootless Podman was setting resource limits on cgroups
v2 systems that were not using systemd-managed cgroups
(and thus did not support resource limits), resulting in containers failing to start
Update podman to v1.9.1:
* Bugfixes
- Fixed a bug where healthchecks could become nonfunctional if
container log paths were manually set with --log-path and
multiple container logs were placed in the same directory
- Fixed a bug where rootless Podman could, when using an older
libpod.conf, print numerous warning messages about an invalid
CGroup manager config
- Fixed a bug where rootless Podman would sometimes fail to
close the rootless user namespace when joining it
Update podman to v1.9.0:
* Features
- Experimental support has been added for podman run
--userns=auto, which automatically allocates a unique UID and
GID range for the new container's user namespace
- The podman play kube command now has a --network flag to
place the created pod in one or more CNI networks
- The podman commit command now supports an --iidfile flag to
write the ID of the committed image to a file
- Initial support for the new containers.conf configuration
file has been added. containers.conf allows for much more
detailed configuration of some Podman functionality
* Changes
- There has been a major cleanup of the podman info command
resulting in breaking changes. Many fields have been renamed
to better suit usage with APIv2
- All uses of the --timeout flag have been switched to prefer
the alternative --time. The --timeout flag will continue to
work, but man pages and --help will use the --time flag
instead
* Bugfixes
- Fixed a bug where some volume mounts from the host would
sometimes not properly determine the flags they should use
when mounting
- Fixed a bug where Podman was not propagating $PATH to Conmon
and the OCI runtime, causing issues for some OCI runtimes
that required it
- Fixed a bug where rootless Podman would print error messages
about missing support for systemd cgroups when run in a
container with no cgroup support
- Fixed a bug where podman play kube would not properly handle
container-only port mappings (#5610)
- Fixed a bug where the podman container prune command was not
pruning containers in the created and configured states
- Fixed a bug where Podman was not properly removing CNI IP
address allocations after a reboot (#5433)
- Fixed a bug where Podman was not properly applying the
default Seccomp profile when --security-opt was not given at
the command line
* HTTP API
- Many Libpod API endpoints have been added, including Changes,
Checkpoint, Init, and Restore
- Resolved issues where the podman system service command would
time out and exit while there were still active connections
- Stability overall has greatly improved as we prepare the API
for a beta release soon with Podman 2.0
* Misc
- The default infra image for pods has been upgraded to
k8s.gcr.io/pause:3.2 (from 3.1) to address a bug in the
architecture metadata for non-AMD64 images
- The slirp4netns networking utility in rootless Podman now
uses Seccomp filtering where available for improved security
- Updated Buildah to v1.14.8
- Updated containers/storage to v1.18.2
- Updated containers/image to v5.4.3
- Updated containers/common to v0.8.1
- Add 'systemd' BUILDFLAGS to build with support for journald
logging (bsc#1162432)
Update podman to v1.8.2:
* Features
- Initial support for automatically updating containers managed
via Systemd unit files has been merged. This allows
containers to automatically upgrade if a newer version of
their image becomes available
* Bugfixes
- Fixed a bug where unit files generated by podman generate
systemd --new would not force containers to detach, causing
the unit to time out when trying to start
- Fixed a bug where podman system reset could delete important
system directories if run as rootless on installations
created by older Podman (#4831)
- Fixed a bug where image built by podman build would not
properly set the OS and Architecture they were built with
(#5503)
- Fixed a bug where attached podman run with --sig-proxy
enabled (the default), when built with Go 1.14, would
repeatedly send signal 23 to the process in the container and
could generate errors when the container stopped (#5483)
- Fixed a bug where rootless podman run commands could hang
when forwarding ports
- Fixed a bug where rootless Podman would not work when /proc
was mounted with the hidepid option set
- Fixed a bug where the podman system service command would use
large amounts of CPU when --timeout was set to 0 (#5531)
* HTTP API
- Initial support for Libpod endpoints related to creating and
operating on image manifest lists has been added
- The Libpod Healthcheck and Events API endpoints are now
supported
- The Swagger endpoint can now handle cases where no Swagger
documentation has been generated
Update podman to v1.8.1:
* Features
- Many networking-related flags have been added to podman pod
create to enable customization of pod networks, including
--add-host, --dns, --dns-opt, --dns-search, --ip,
--mac-address, --network, and --no-hosts
- The podman ps --format=json command now includes the ID of
the image containers were created with
- The podman run and podman create commands now feature an
--rmi flag to remove the image the container was using after
it exits (if no other containers are using said image)
([#4628](https://github.com/containers/libpod/issues/4628))
- The podman create and podman run commands now support the
--device-cgroup-rule flag (#4876)
- While the HTTP API remains in alpha, many fixes and additions
have landed. These are documented in a separate subsection
below
- The podman create and podman run commands now feature a
--no-healthcheck flag to disable healthchecks for a container
(#5299)
- Containers now recognize the io.containers.capabilities
label, which specifies a list of capabilities required by the
image to run. These capabilities will be used as long as they
are more restrictive than the default capabilities used
- YAML produced by the podman generate kube command now
includes SELinux configuration passed into the container via
--security-opt label=... (#4950)
* Bugfixes
- Fixed CVE-2020-1726, a security issue where volumes manually
populated before first being mounted into a container could
have those contents overwritten on first being mounted into a
container
- Fixed a bug where Podman containers with user namespaces in
CNI networks with the DNS plugin enabled would not have the
DNS plugin's nameserver added to their resolv.conf
([#5256](https://github.com/containers/libpod/issues/5256))
- Fixed a bug where trailing / characters in image volume
definitions could cause them to not be overridden by a
user-specified mount at the same location
([#5219](https://github.com/containers/libpod/issues/5219))
- Fixed a bug where the label option in libpod.conf, used to
disable SELinux by default, was not being respected (#5087)
- Fixed a bug where the podman login and podman logout commands
required the registry to log into be specified (#5146)
- Fixed a bug where detached rootless Podman containers could
not forward ports (#5167)
- Fixed a bug where rootless Podman could fail to run if the
pause process had died
- Fixed a bug where Podman ignored labels that were specified
with only a key and no value (#3854)
- Fixed a bug where Podman would fail to create named volumes
when the backing filesystem did not support SELinux labelling
(#5200)
- Fixed a bug where --detach-keys='' would not disable
detaching from a container (#5166)
- Fixed a bug where the podman ps command was too aggressive
when filtering containers and would force --all on in too
many situations
- Fixed a bug where the podman play kube command was ignoring
image configuration, including volumes, working directory,
labels, and stop signal (#5174)
- Fixed a bug where the Created and CreatedTime fields in
podman images --format=json were misnamed, which also broke
Go template output for those fields
([#5110](https://github.com/containers/libpod/issues/5110))
- Fixed a bug where rootless Podman containers with ports
forwarded could hang when started (#5182)
- Fixed a bug where podman pull could fail to parse registry
names including port numbers
- Fixed a bug where Podman would incorrectly attempt to
validate image OS and architecture when starting containers
- Fixed a bug where Bash completion for podman build -f would
not list available files that could be built (#3878)
- Fixed a bug where podman commit --change would perform
incorrect validation, resulting in valid changes being
rejected (#5148)
- Fixed a bug where podman logs --tail could take large amounts
of memory when the log file for a container was large (#5131)
- Fixed a bug where Podman would sometimes incorrectly generate
firewall rules on systems using firewalld
- Fixed a bug where the podman inspect command would not
display network information for containers properly if a
container joined multiple CNI networks
([#4907](https://github.com/containers/libpod/issues/4907))
- Fixed a bug where the --uts flag to podman create and podman
run would only allow specifying containers by full ID (#5289)
- Fixed a bug where rootless Podman could segfault when passed
a large number of file descriptors
- Fixed a bug where the podman port command was incorrectly
interpreting additional arguments as container names, instead
of port numbers
- Fixed a bug where units created by podman generate systemd
did not depend on network targets, and so could start before
the system network was ready (#4130)
- Fixed a bug where exec sessions in containers which did not
specify a user would not inherit supplemental groups added to
the container via --group-add
- Fixed a bug where Podman would not respect the $TMPDIR
environment variable for placing large temporary files during
some operations (e.g. podman pull)
([#5411](https://github.com/containers/libpod/issues/5411))
* HTTP API
- Initial support for secure connections to servers via SSH
tunneling has been added
- Initial support for the libpod create and logs endpoints for
containers has been added
- Added a /swagger/ endpoint to serve API documentation
- The json endpoint for containers has received many fixes
- Filtering images and containers has been greatly improved,
with many bugs fixed and documentation improved
- Image creation endpoints (commit, pull, etc) have seen many
fixes
- Server timeout has been fixed so that long operations will no
longer trigger the timeout and shut the server down
- The stats endpoint for containers has seen major fixes and
now provides accurate output
- Handling the HTTP 304 status code has been fixed for all
endpoints
- Many fixes have been made to API documentation to ensure it
matches the code
* Misc
- The Created field to podman images --format=json has been
renamed to CreatedSince as part of the fix for (#5110). Go
templates using the old name shou ld still work
- The CreatedTime field to podman images --format=json has been
renamed to CreatedAt as part of the fix for (#5110). Go
templates using the old name should still work
- The before filter to podman images has been renamed to since
for Docker compatibility. Using before will still work, but
documentation has been changed to use the new since filter
- Using the --password flag to podman login now warns that
passwords are being passed in plaintext
- Some common cases where Podman would deadlock have been fixed
to warn the user that podman system renumber must be run to
resolve the deadlock
- Configure br_netfilter for podman automatically (bsc#1165738)
The trigger is only excuted when updating podman-cni-config while the
command was running
conmon was update to v2.0.20 (bsc#1175821)
- journald: fix logging container name
- container logging: Implement none driver - 'off', 'null' or
'none' all work.
- ctrl: warn if we fail to unlink
- Drop fsync calls
- Reap PIDs before running exit command
- Fix log path parsing
- Add --sync option to prevent conmon from double forking
- Add --no-sync-log option to instruct conmon to not sync the
logs of the containers upon shutting down. This feature fixes a
regression where we unconditionally dropped the log sync. It is
possible the container logs could be corrupted on a sudden
power-off. If you need container logs to remain in consistent
state after a sudden shutdown, please update from v2.0.19 to
v2.0.20
- Update to v2.0.17:
- Add option to delay execution of exit command
- Update to v2.0.16:
- tty: flush pending data when fd is ready
- Enable support for journald logging (bsc#1162432)
- Update to v2.0.15:
- store status while waiting for pid
- Update to v2.0.14:
- drop usage of splice(2)
- avoid hanging on stdin
- stdio: sometimes quit main loop after io is done
- ignore sigpipe
- Update to v2.0.12
- oom: fix potential race between verification steps
- Update to v2.0.11
- log: reject --log-tag with k8s-file
- chmod std files pipes
- adjust score to -1000 to prevent conmon from ever being OOM
killed
- container OOM: verify cgroup hasn't been cleaned up before
reporting OOM
- journal logging: write to /dev/null instead of -1
fuse-overlayfs was updated to 1.1.2 (bsc#1175821):
- fix memory leak when creating whiteout files.
- fix lookup for overflow uid when it is different than the overflow gid.
- use openat2(2) when available.
- accept 'ro' as mount option.
- fix set mtime for a symlink.
- fix some issues reported by static analysis.
- fix potential infinite loop on a short read.
- fix creating a directory if the destination already exists
in the upper layer.
- report correctly the number of links for a directory also for
subsequent stat calls
- stop looking up the ino in the lower layers if the file could
not be opened
- make sure the destination is deleted before doing a rename(2).
It prevents a left over directory to cause delete to fail with
EEXIST.
- honor --debug.
libcontainers-common was updated to fix:
- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)
- Added containers/common tarball for containers.conf(5) man page
- Install containers.conf default configuration in
/usr/share/containers
- libpod repository on github got renamed to podman
- Update to image 5.5.1
- Add documentation for credHelpera
- Add defaults for using the rootless policy path
- Update libpod/podman to 2.0.3
- docs: user namespace can't be shared in pods
- Switch references from libpod.conf to containers.conf
- Allow empty host port in --publish flag
- update document login see config.json as valid
- Update storage to 1.20.2
- Add back skip_mount_home
- Remove remaining difference between SLE and openSUSE package and
ship the some mounts.conf default configuration on both platforms.
As the sources for the mount point do not exist on openSUSE by
default this config will basically have no effect on openSUSE.
(jsc#SLE-12122, bsc#1175821)
- Update to image 5.4.4
- Remove registries.conf VERSION 2 references from man page
- Intial authfile man page
- Add $HOME/.config/containers/certs.d to perHostCertDirPath
- Add $HOME/.config/containers/registries.conf to config path
- registries.conf.d: add stances for the registries.conf
- update to libpod 1.9.3
- userns: support --userns=auto
- Switch to using --time as opposed to --timeout to better match Docker
- Add support for specifying CNI networks in podman play kube
- man pages: fix inconsistencies
- Update to storage 1.19.1
- userns: add support for auto
- store: change the default user to containers
- config: honor XDG_CONFIG_HOME
- Remove the /var/lib/ca-certificates/pem/SUSE.pem workaround again.
It never ended up in SLES and a different way to fix the underlying
problem is being worked on.
- Add registry.opensuse.org as default registry [bsc#1171578]
- Add /var/lib/ca-certificates/pem/SUSE.pem to the SLES mounts.
This for making container-suseconnect working in the public
cloud on-demand images. It needs that file for being able to
verify the server certificates of the RMT servers hosted
in the public cloud.
(https://github.com/SUSE/container-suseconnect/issues/41)
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patchnames
openSUSE-2020-1552
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for conmon, fuse-overlayfs, libcontainers-common, podman", "title": "Title of the patch" }, { "category": "description", "text": "This update for conmon, fuse-overlayfs, libcontainers-common, podman fixes the following issues:\n\npodman was updated to v2.0.6 (bsc#1175821)\n\n- install missing systemd units for the new Rest API (bsc#1175957)\n and a few man-pages that where missing before\n- Drop varlink API related bits (in favor of the new API)\n- fix install location for zsh completions\n\n * Fixed a bug where running systemd in a container on a cgroups v1 system would fail.\n * Fixed a bug where /etc/passwd could be re-created every time a container\n is restarted if the container\u0027s /etc/passwd did not contain an entry\n for the user the container was started as.\n * Fixed a bug where containers without an /etc/passwd file specifying\n a non-root user would not start.\n * Fixed a bug where the --remote flag would sometimes not make\n remote connections and would instead attempt to run Podman locally.\n\nUpdate to v2.0.6:\n\n* Features\n\n - Rootless Podman will now add an entry to /etc/passwd for the user who ran Podman if run with --userns=keep-id.\n - The podman system connection command has been reworked to support multiple connections, and reenabled for use!\n - Podman now has a new global flag, --connection, to specify a connection to a remote Podman API instance.\n\n* Changes\n\n - Podman\u0027s automatic systemd integration (activated by the --systemd=true flag, set by default) will now activate for containers using /usr/local/sbin/init as their command, instead of just /usr/sbin/init and /sbin/init (and any path ending in systemd).\n - Seccomp profiles specified by the --security-opt seccomp=... flag to podman create and podman run will now be honored even if the container was created using --privileged.\n\n* Bugfixes\n\n - Fixed a bug where the podman play kube would not honor the hostIP field for port forwarding (#5964).\n - Fixed a bug where the podman generate systemd command would panic on an invalid restart policy being specified (#7271).\n - Fixed a bug where the podman images command could take a very long time (several minutes) to complete when a large number of images were present.\n - Fixed a bug where the podman logs command with the --tail flag would not work properly when a large amount of output would be printed ((#7230)[https://github.com//issues/7230]).\n - Fixed a bug where the podman exec command with remote Podman would not return a non-zero exit code when the exec session failed to start (e.g. invoking a non-existent command) (#6893).\n - Fixed a bug where the podman load command with remote Podman would did not honor user-specified tags (#7124).\n - Fixed a bug where the podman system service command, when run as a non-root user by Systemd, did not properly handle the Podman pause process and would not restart properly as a result (#7180).\n - Fixed a bug where the --publish flag to podman create, podman run, and podman pod create did not properly handle a host IP of 0.0.0.0 (attempting to bind to literal 0.0.0.0, instead of all IPs on the system) (#7104).\n - Fixed a bug where the podman start --attach command would not print the container\u0027s exit code when the command exited due to the container exiting.\n - Fixed a bug where the podman rm command with remote Podman would not remove volumes, even if the --volumes flag was specified (#7128).\n - Fixed a bug where the podman run command with remote Podman and the --rm flag could exit before the container was fully removed.\n - Fixed a bug where the --pod new:... flag to podman run and podman create would create a pod that did not share any namespaces.\n - Fixed a bug where the --preserve-fds flag to podman run and podman exec could close the wrong file descriptors while trying to close user-provided descriptors after passing them into the container.\n - Fixed a bug where default environment variables ($PATH and $TERM) were not set in containers when not provided by the image.\n - Fixed a bug where pod infra containers were not properly unmounted after exiting.\n - Fixed a bug where networks created with podman network create with an IPv6 subnet did not properly set an IPv6 default route.\n - Fixed a bug where the podman save command would not work properly when its output was piped to another command (#7017).\n - Fixed a bug where containers using a systemd init on a cgroups v1 system could leak mounts under /sys/fs/cgroup/systemd to the host.\n - Fixed a bug where podman build would not generate an event on completion (#7022).\n - Fixed a bug where the podman history command with remote Podman printed incorrect creation times for layers (#7122).\n - Fixed a bug where Podman would not create working directories specified by the container image if they did not exist.\n - Fixed a bug where Podman did not clear CMD from the container image if the user overrode ENTRYPOINT (#7115).\n - Fixed a bug where error parsing image names were not fully reported (part of the error message containing the exact issue was dropped).\n - Fixed a bug where the podman images command with remote Podman did not support printing image tags in Go templates supplied to the --format flag (#7123).\n - Fixed a bug where the podman rmi --force command would not attempt to unmount containers it was removing, which could cause a failure to remove the image.\n - Fixed a bug where the podman generate systemd --new command could incorrectly quote arguments to Podman that contained whitespace, leading to nonfunctional unit files (#7285).\n - Fixed a bug where the podman version command did not properly include build time and Git commit.\n - Fixed a bug where running systemd in a Podman container on a system that did not use the systemd cgroup manager would fail (#6734).\n - Fixed a bug where capabilities from --cap-add were not properly added when a container was started as a non-root user via --user.\n - Fixed a bug where Pod infra containers were not properly cleaned up when they stopped, causing networking issues (#7103).\n\n* API\n\n - Fixed a bug where the libpod and compat Build endpoints did not accept the application/tar content type (instead only accepting application/x-tar) (#7185).\n - Fixed a bug where the libpod Exists endpoint would attempt to write a second header in some error conditions (#7197).\n - Fixed a bug where compat and libpod Network Inspect and Network Remove endpoints would return a 500 instead of 404 when the requested network was not found.\n - Added a versioned _ping endpoint (e.g. http://localhost/v1.40/_ping).\n - Fixed a bug where containers started through a systemd-managed instance of the REST API would be shut down when podman system service shut down due to its idle timeout (#7294).\n - Added stronger parameter verification for the libpod Network Create endpoint to ensure subnet mask is a valid value.\n - The Pod URL parameter to the Libpod Container List endpoint has been deprecated; the information previously gated by the Pod boolean will now be included in the response unconditionally.\n\n- Change hard requires for AppArmor to Recommends. They are not\n needed for runtime or with SELinux but already installed if\n AppArmor is used [jsc#SMO-15]\n- Add BuildRequires for pkg-config(libselinux) to build with\n SELinux support [jsc#SMO-15] \n\nUpdate to v2.0.4\n\n* Fixed a bug where the output of podman image search did not\n populate the Description field as it was mistakenly assigned to\n the ID field.\n* Fixed a bug where podman build - and podman build on an HTTP\n target would fail.\n* Fixed a bug where rootless Podman would improperly chown the\n copied-up contents of anonymous volumes (#7130).\n* Fixed a bug where Podman would sometimes HTML-escape special\n characters in its CLI output.\n* Fixed a bug where the podman start --attach --interactive\n command would print the container ID of the container attached\n to when exiting (#7068).\n* Fixed a bug where podman run --ipc=host --pid=host would only\n set --pid=host and not --ipc=host (#7100).\n* Fixed a bug where the --publish argument to podman run, podman\n create and podman pod create would not allow binding the same\n container port to more than one host port (#7062).\n* Fixed a bug where incorrect arguments to podman images --format\n could cause Podman to segfault.\n* Fixed a bug where podman rmi --force on an image ID with more\n than one name and at least one container using the image would\n not completely remove containers using the image (#7153).\n* Fixed a bug where memory usage in bytes and memory use\n percentage were swapped in the output of podman stats\n --format=json.\n* Fixed a bug where the libpod and compat events endpoints would\n fail if no filters were specified (#7078).\n* Fixed a bug where the CgroupVersion field in responses from the\n compat Info endpoint was prefixed by \u0027v\u0027 (instead of just being\n \u00271\u0027 or \u00272\u0027, as is documented).\n\n- Suggest katacontainers instead of recommending it. It\u0027s not\n enabled by default, so it\u0027s just bloat\n\nUpdate to v2.0.3\n\n* Fix handling of entrypoint\n* log API: add context to allow for cancelling\n* fix API: Create container with an invalid configuration\n* Remove all instances of named return \u0027err\u0027 from Libpod\n* Fix: Correct connection counters for hijacked connections\n* Fix: Hijacking v2 endpoints to follow rfc 7230 semantics\n* Remove hijacked connections from active connections list\n* version/info: format: allow more json variants\n* Correctly print STDOUT on non-terminal remote exec\n* Fix container and pod create commands for remote create\n* Mask out /sys/dev to prevent information leak from the host\n* Ensure sig-proxy default is propagated in start\n* Add SystemdMode to inspect for containers\n* When determining systemd mode, use full command\n* Fix lint\n* Populate remaining unused fields in `pod inspect`\n* Include infra container information in `pod inspect`\n* play-kube: add suport for \u0027IfNotPresent\u0027 pull type\n* docs: user namespace can\u0027t be shared in pods\n* Fix \u0027Error: unrecognized protocol \\\u0027TCP\\\u0027 in port mapping\u0027\n* Error on rootless mac and ip addresses\n* Fix \u0026 add notes regarding problematic language in codebase\n* abi: set default umask and rlimits\n* Used reference package with errors for parsing tag\n* fix: system df error when an image has no name\n* Fix Generate API title/description\n* Add noop function disable-content-trust\n* fix play kube doesn\u0027t override dockerfile ENTRYPOINT\n* Support default profile for apparmor\n* Bump github.com/containers/common to v0.14.6\n* events endpoint: backwards compat to old type\n* events endpoint: fix panic and race condition\n* Switch references from libpod.conf to containers.conf\n* podman.service: set type to simple\n* podman.service: set doc to podman-system-service\n* podman.service: use default registries.conf\n* podman.service: use default killmode\n* podman.service: remove stop timeout\n* systemd: symlink user-\u003esystem\n* vendor golang.org/x/text@v0.3.3\n* Fix a bug where --pids-limit was parsed incorrectly\n* search: allow wildcards\n* [CI:DOCS]Do not copy policy.json into gating image\n* Fix systemd pid 1 test\n* Cirrus: Rotate keys post repo. rename\n* The libpod.conf(5) man page got removed and all references are\n now pointing towards containers.conf(5), which will be part\n of the libcontainers-common package.\n\nUpdate to podman v2.0.2\n\n* fix race condition in `libpod.GetEvents(...)`\n* Fix bug where `podman mount` didn\u0027t error as rootless\n* remove podman system connection\n* Fix imports to ensure v2 is used with libpod\n* Update release notes for v2.0.2\n* specgen: fix order for setting rlimits\n* Ensure umask is set appropriately for \u0027system service\u0027\n* generate systemd: improve pod-flags filter\n* Fix a bug with APIv2 compat network remove to log an ErrNetworkNotFound instead of nil\n* Fixes --remote flag issues\n* Pids-limit should only be set if the user set it\n* Set console mode for windows\n* Allow empty host port in --publish flag\n* Add a note on the APIs supported by `system service`\n* fix: Don\u0027t override entrypoint if it\u0027s `nil`\n* Set TMPDIR to /var/tmp by default if not set\n* test: add tests for --user and volumes\n* container: move volume chown after spec generation\n* libpod: volume copyup honors namespace mappings\n* Fix `system service` panic from early hangup in events\n* stop podman service in e2e tests\n* Print errors from individual containers in pods\n* auto-update: clarify systemd-unit requirements\n* podman ps truncate the command\n* move go module to v2\n* Vendor containers/common v0.14.4\n* Bump to imagebuilder v1.1.6 on v2 branch\n* Account for non-default port number in image name\n- Changes since v2.0.1\n* Update release notes with further v2.0.1 changes\n* Fix inspect to display multiple label: changes\n* Set syslog for exit commands on log-level=debug\n* Friendly amendment for pr 6751\n* podman run/create: support all transports\n* systemd generate: allow manual restart of container units in pods\n* Revert sending --remote flag to containers\n* Print port mappings in `ps` for ctrs sharing network\n* vendor github.com/containers/common@v0.14.3\n* Update release notes for v2.0.1\n* utils: drop default mapping when running uid!=0\n* Set stop signal to 15 when not explicitly set\n* podman untag: error if tag doesn\u0027t exist\n* Reformat inspect network settings\n* APIv2: Return `StatusCreated` from volume creation\n* APIv2:fix: Remove `/json` from compat network EPs\n* Fix ssh-agent support\n* libpod: specify mappings to the storage\n* APIv2:doc: Fix swagger doc to refer to volumes\n* Add podman network to bash command completions\n* Fix typo in manpage for `podman auto update`.\n* Add JSON output field for ps\n* V2 podman system connection\n* image load: no args required\n* Re-add PODMAN_USERNS environment variable\n* Fix conflicts between privileged and other flags\n* Bump required go version to 1.13\n* Add explicit command to alpine container in test case.\n* Use POLL_DURATION for timer\n* Stop following logs using timers\n* \u0027pod\u0027 was being truncated to \u0027po\u0027 in the names of the generated systemd unit files.\n* rootless_linux: improve error message\n* Fix podman build handling of --http-proxy flag\n* correct the absolute path of `rm` executable\n* Makefile: allow customizable GO_BUILD\n* Cirrus: Change DEST_BRANCH to v2.0\n\nUpdate to podman v2.0.0\n\n* The `podman generate systemd` command now supports the `--new`\n flag when used with pods, allowing portable services for pods\n to be created.\n* The `podman play kube` command now supports running Kubernetes\n Deployment YAML.\n* The `podman exec` command now supports the `--detach` flag to\n run commands in the container in the background.\n* The `-p` flag to `podman run` and `podman create` now supports\n forwarding ports to IPv6 addresses.\n* The `podman run`, `podman create` and `podman pod create`\n command now support a `--replace` flag to remove and replace any\n existing container (or, for `pod create`, pod) with the same name\n* The `--restart-policy` flag to `podman run` and `podman create`\n now supports the `unless-stopped` restart policy.\n* The `--log-driver` flag to `podman run` and `podman create`\n now supports the `none` driver, which does not log the\n container\u0027s output.\n* The `--mount` flag to `podman run` and `podman create` now\n accepts `readonly` option as an alias to `ro`.\n* The `podman generate systemd` command now supports the `--container-prefix`,\n `--pod-prefix`, and `--separator` arguments to control the\n name of generated unit files.\n* The `podman network ls` command now supports the `--filter`\n flag to filter results.\n* The `podman auto-update` command now supports specifying an\n authfile to use when pulling new images on a per-container\n basis using the `io.containers.autoupdate.authfile` label.\n* Fixed a bug where the `podman exec` command would log to journald\n when run in containers loggined to journald\n ([#6555](https://github.com/containers/libpod/issues/6555)).\n* Fixed a bug where the `podman auto-update` command would not\n preserve the OS and architecture of the original image when\n pulling a replacement\n ([#6613](https://github.com/containers/libpod/issues/6613)).\n* Fixed a bug where the `podman cp` command could create an extra\n `merged` directory when copying into an existing directory\n ([#6596](https://github.com/containers/libpod/issues/6596)).\n* Fixed a bug where the `podman pod stats` command would crash\n on pods run with `--network=host`\n ([#5652](https://github.com/containers/libpod/issues/5652)).\n* Fixed a bug where containers logs written to journald did not\n include the name of the container.\n* Fixed a bug where the `podman network inspect` and\n `podman network rm` commands did not properly handle non-default\n CNI configuration paths ([#6212](https://github.com/containers/libpod/issues/6212)).\n* Fixed a bug where Podman did not properly remove containers\n when using the Kata containers OCI runtime.\n* Fixed a bug where `podman inspect` would sometimes incorrectly\n report the network mode of containers started with `--net=none`.\n* Podman is now better able to deal with cases where `conmon`\n is killed before the container it is monitoring.\n\nUpdate to podman v1.9.3:\n\n* Fixed a bug where, on FIPS enabled hosts, FIPS mode secrets\n were not properly mounted into containers\n* Fixed a bug where builds run over Varlink would hang\n* Fixed a bug where podman save would fail when the target\n image was specified by digest\n* Fixed a bug where rootless containers with ports forwarded to them\n could panic and dump core due to a concurrency issue (#6018)\n* Fixed a bug where rootless Podman could race when opening the\n rootless user namespace, resulting in commands failing to run\n* Fixed a bug where HTTP proxy environment variables forwarded into\n the container by the --http-proxy flag could not be overridden by --env or --env-file\n* Fixed a bug where rootless Podman was setting resource limits on cgroups\n v2 systems that were not using systemd-managed cgroups\n (and thus did not support resource limits), resulting in containers failing to start\n\nUpdate podman to v1.9.1:\n\n* Bugfixes\n\n - Fixed a bug where healthchecks could become nonfunctional if\n container log paths were manually set with --log-path and\n multiple container logs were placed in the same directory\n - Fixed a bug where rootless Podman could, when using an older\n libpod.conf, print numerous warning messages about an invalid\n CGroup manager config\n - Fixed a bug where rootless Podman would sometimes fail to\n close the rootless user namespace when joining it\n\nUpdate podman to v1.9.0:\n\n* Features\n\n - Experimental support has been added for podman run\n --userns=auto, which automatically allocates a unique UID and\n GID range for the new container\u0027s user namespace\n - The podman play kube command now has a --network flag to\n place the created pod in one or more CNI networks\n - The podman commit command now supports an --iidfile flag to\n write the ID of the committed image to a file\n - Initial support for the new containers.conf configuration\n file has been added. containers.conf allows for much more\n detailed configuration of some Podman functionality\n\n* Changes\n\n - There has been a major cleanup of the podman info command\n resulting in breaking changes. Many fields have been renamed\n to better suit usage with APIv2\n - All uses of the --timeout flag have been switched to prefer\n the alternative --time. The --timeout flag will continue to\n work, but man pages and --help will use the --time flag\n instead\n\n* Bugfixes\n\n - Fixed a bug where some volume mounts from the host would\n sometimes not properly determine the flags they should use\n when mounting\n - Fixed a bug where Podman was not propagating $PATH to Conmon\n and the OCI runtime, causing issues for some OCI runtimes\n that required it\n - Fixed a bug where rootless Podman would print error messages\n about missing support for systemd cgroups when run in a\n container with no cgroup support\n - Fixed a bug where podman play kube would not properly handle\n container-only port mappings (#5610)\n - Fixed a bug where the podman container prune command was not\n pruning containers in the created and configured states\n - Fixed a bug where Podman was not properly removing CNI IP\n address allocations after a reboot (#5433)\n - Fixed a bug where Podman was not properly applying the\n default Seccomp profile when --security-opt was not given at\n the command line\n\n* HTTP API\n\n - Many Libpod API endpoints have been added, including Changes,\n Checkpoint, Init, and Restore\n - Resolved issues where the podman system service command would\n time out and exit while there were still active connections\n - Stability overall has greatly improved as we prepare the API\n for a beta release soon with Podman 2.0\n\n* Misc\n\n - The default infra image for pods has been upgraded to\n k8s.gcr.io/pause:3.2 (from 3.1) to address a bug in the\n architecture metadata for non-AMD64 images\n - The slirp4netns networking utility in rootless Podman now\n uses Seccomp filtering where available for improved security\n - Updated Buildah to v1.14.8\n - Updated containers/storage to v1.18.2\n - Updated containers/image to v5.4.3\n - Updated containers/common to v0.8.1\n\n- Add \u0027systemd\u0027 BUILDFLAGS to build with support for journald\n logging (bsc#1162432)\n\nUpdate podman to v1.8.2:\n\n* Features\n\n - Initial support for automatically updating containers managed\n via Systemd unit files has been merged. This allows\n containers to automatically upgrade if a newer version of\n their image becomes available\n\n* Bugfixes\n\n - Fixed a bug where unit files generated by podman generate\n systemd --new would not force containers to detach, causing\n the unit to time out when trying to start\n - Fixed a bug where podman system reset could delete important\n system directories if run as rootless on installations\n created by older Podman (#4831)\n - Fixed a bug where image built by podman build would not\n properly set the OS and Architecture they were built with\n (#5503)\n - Fixed a bug where attached podman run with --sig-proxy\n enabled (the default), when built with Go 1.14, would\n repeatedly send signal 23 to the process in the container and\n could generate errors when the container stopped (#5483)\n - Fixed a bug where rootless podman run commands could hang\n when forwarding ports\n - Fixed a bug where rootless Podman would not work when /proc\n was mounted with the hidepid option set\n - Fixed a bug where the podman system service command would use\n large amounts of CPU when --timeout was set to 0 (#5531)\n\n* HTTP API\n\n - Initial support for Libpod endpoints related to creating and\n operating on image manifest lists has been added\n - The Libpod Healthcheck and Events API endpoints are now\n supported\n - The Swagger endpoint can now handle cases where no Swagger\n documentation has been generated\n\nUpdate podman to v1.8.1:\n\n* Features\n\n - Many networking-related flags have been added to podman pod\n create to enable customization of pod networks, including\n --add-host, --dns, --dns-opt, --dns-search, --ip,\n --mac-address, --network, and --no-hosts\n - The podman ps --format=json command now includes the ID of\n the image containers were created with\n - The podman run and podman create commands now feature an\n --rmi flag to remove the image the container was using after\n it exits (if no other containers are using said image)\n ([#4628](https://github.com/containers/libpod/issues/4628))\n - The podman create and podman run commands now support the\n --device-cgroup-rule flag (#4876)\n - While the HTTP API remains in alpha, many fixes and additions\n have landed. These are documented in a separate subsection\n below\n - The podman create and podman run commands now feature a\n --no-healthcheck flag to disable healthchecks for a container\n (#5299)\n - Containers now recognize the io.containers.capabilities\n label, which specifies a list of capabilities required by the\n image to run. These capabilities will be used as long as they\n are more restrictive than the default capabilities used\n - YAML produced by the podman generate kube command now\n includes SELinux configuration passed into the container via\n --security-opt label=... (#4950)\n\n* Bugfixes\n\n - Fixed CVE-2020-1726, a security issue where volumes manually\n populated before first being mounted into a container could\n have those contents overwritten on first being mounted into a\n container\n - Fixed a bug where Podman containers with user namespaces in\n CNI networks with the DNS plugin enabled would not have the\n DNS plugin\u0027s nameserver added to their resolv.conf\n ([#5256](https://github.com/containers/libpod/issues/5256))\n - Fixed a bug where trailing / characters in image volume\n definitions could cause them to not be overridden by a\n user-specified mount at the same location\n ([#5219](https://github.com/containers/libpod/issues/5219))\n - Fixed a bug where the label option in libpod.conf, used to\n disable SELinux by default, was not being respected (#5087)\n - Fixed a bug where the podman login and podman logout commands\n required the registry to log into be specified (#5146)\n - Fixed a bug where detached rootless Podman containers could\n not forward ports (#5167)\n - Fixed a bug where rootless Podman could fail to run if the\n pause process had died\n - Fixed a bug where Podman ignored labels that were specified\n with only a key and no value (#3854)\n - Fixed a bug where Podman would fail to create named volumes\n when the backing filesystem did not support SELinux labelling\n (#5200)\n - Fixed a bug where --detach-keys=\u0027\u0027 would not disable\n detaching from a container (#5166)\n - Fixed a bug where the podman ps command was too aggressive\n when filtering containers and would force --all on in too\n many situations\n - Fixed a bug where the podman play kube command was ignoring\n image configuration, including volumes, working directory,\n labels, and stop signal (#5174)\n - Fixed a bug where the Created and CreatedTime fields in\n podman images --format=json were misnamed, which also broke\n Go template output for those fields\n ([#5110](https://github.com/containers/libpod/issues/5110))\n - Fixed a bug where rootless Podman containers with ports\n forwarded could hang when started (#5182)\n - Fixed a bug where podman pull could fail to parse registry\n names including port numbers\n - Fixed a bug where Podman would incorrectly attempt to\n validate image OS and architecture when starting containers\n - Fixed a bug where Bash completion for podman build -f would\n not list available files that could be built (#3878)\n - Fixed a bug where podman commit --change would perform\n incorrect validation, resulting in valid changes being\n rejected (#5148)\n - Fixed a bug where podman logs --tail could take large amounts\n of memory when the log file for a container was large (#5131)\n - Fixed a bug where Podman would sometimes incorrectly generate\n firewall rules on systems using firewalld\n - Fixed a bug where the podman inspect command would not\n display network information for containers properly if a\n container joined multiple CNI networks\n ([#4907](https://github.com/containers/libpod/issues/4907))\n - Fixed a bug where the --uts flag to podman create and podman\n run would only allow specifying containers by full ID (#5289)\n - Fixed a bug where rootless Podman could segfault when passed\n a large number of file descriptors\n - Fixed a bug where the podman port command was incorrectly\n interpreting additional arguments as container names, instead\n of port numbers\n - Fixed a bug where units created by podman generate systemd\n did not depend on network targets, and so could start before\n the system network was ready (#4130)\n - Fixed a bug where exec sessions in containers which did not\n specify a user would not inherit supplemental groups added to\n the container via --group-add\n - Fixed a bug where Podman would not respect the $TMPDIR\n environment variable for placing large temporary files during\n some operations (e.g. podman pull)\n ([#5411](https://github.com/containers/libpod/issues/5411))\n\n* HTTP API\n\n - Initial support for secure connections to servers via SSH\n tunneling has been added\n - Initial support for the libpod create and logs endpoints for\n containers has been added\n - Added a /swagger/ endpoint to serve API documentation\n - The json endpoint for containers has received many fixes\n - Filtering images and containers has been greatly improved,\n with many bugs fixed and documentation improved\n - Image creation endpoints (commit, pull, etc) have seen many\n fixes\n - Server timeout has been fixed so that long operations will no\n longer trigger the timeout and shut the server down\n - The stats endpoint for containers has seen major fixes and\n now provides accurate output\n - Handling the HTTP 304 status code has been fixed for all\n endpoints\n - Many fixes have been made to API documentation to ensure it\n matches the code\n\n* Misc\n\n - The Created field to podman images --format=json has been\n renamed to CreatedSince as part of the fix for (#5110). Go\n templates using the old name shou ld still work\n - The CreatedTime field to podman images --format=json has been\n renamed to CreatedAt as part of the fix for (#5110). Go\n templates using the old name should still work\n - The before filter to podman images has been renamed to since\n for Docker compatibility. Using before will still work, but\n documentation has been changed to use the new since filter\n - Using the --password flag to podman login now warns that\n passwords are being passed in plaintext\n - Some common cases where Podman would deadlock have been fixed\n to warn the user that podman system renumber must be run to\n resolve the deadlock\n\n- Configure br_netfilter for podman automatically (bsc#1165738)\n The trigger is only excuted when updating podman-cni-config while the\n command was running\n\nconmon was update to v2.0.20 (bsc#1175821)\n\n- journald: fix logging container name\n- container logging: Implement none driver - \u0027off\u0027, \u0027null\u0027 or\n \u0027none\u0027 all work.\n- ctrl: warn if we fail to unlink\n- Drop fsync calls\n- Reap PIDs before running exit command\n- Fix log path parsing\n- Add --sync option to prevent conmon from double forking\n- Add --no-sync-log option to instruct conmon to not sync the\n logs of the containers upon shutting down. This feature fixes a\n regression where we unconditionally dropped the log sync. It is\n possible the container logs could be corrupted on a sudden\n power-off. If you need container logs to remain in consistent\n state after a sudden shutdown, please update from v2.0.19 to\n v2.0.20\n\n- Update to v2.0.17:\n\n - Add option to delay execution of exit command\n\n- Update to v2.0.16:\n\n - tty: flush pending data when fd is ready\n\n- Enable support for journald logging (bsc#1162432)\n- Update to v2.0.15:\n\n - store status while waiting for pid\n\n- Update to v2.0.14:\n\n - drop usage of splice(2)\n - avoid hanging on stdin\n - stdio: sometimes quit main loop after io is done\n - ignore sigpipe\n\n- Update to v2.0.12\n\n - oom: fix potential race between verification steps\n\n- Update to v2.0.11\n\n - log: reject --log-tag with k8s-file\n - chmod std files pipes\n - adjust score to -1000 to prevent conmon from ever being OOM\n killed\n - container OOM: verify cgroup hasn\u0027t been cleaned up before\n reporting OOM\n - journal logging: write to /dev/null instead of -1\n\nfuse-overlayfs was updated to 1.1.2 (bsc#1175821):\n\n- fix memory leak when creating whiteout files.\n- fix lookup for overflow uid when it is different than the overflow gid.\n- use openat2(2) when available.\n- accept \u0027ro\u0027 as mount option.\n- fix set mtime for a symlink.\n- fix some issues reported by static analysis.\n- fix potential infinite loop on a short read.\n- fix creating a directory if the destination already exists\n in the upper layer.\n- report correctly the number of links for a directory also for\n subsequent stat calls\n- stop looking up the ino in the lower layers if the file could\n not be opened\n- make sure the destination is deleted before doing a rename(2).\n It prevents a left over directory to cause delete to fail with\n EEXIST.\n- honor --debug.\n\nlibcontainers-common was updated to fix:\n\n- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)\n- Added containers/common tarball for containers.conf(5) man page\n- Install containers.conf default configuration in\n /usr/share/containers\n- libpod repository on github got renamed to podman\n- Update to image 5.5.1\n - Add documentation for credHelpera\n - Add defaults for using the rootless policy path\n- Update libpod/podman to 2.0.3\n - docs: user namespace can\u0027t be shared in pods\n - Switch references from libpod.conf to containers.conf\n - Allow empty host port in --publish flag\n - update document login see config.json as valid\n- Update storage to 1.20.2\n - Add back skip_mount_home\n\n- Remove remaining difference between SLE and openSUSE package and\n ship the some mounts.conf default configuration on both platforms.\n As the sources for the mount point do not exist on openSUSE by\n default this config will basically have no effect on openSUSE.\n (jsc#SLE-12122, bsc#1175821) \n\n- Update to image 5.4.4\n - Remove registries.conf VERSION 2 references from man page\n - Intial authfile man page\n - Add $HOME/.config/containers/certs.d to perHostCertDirPath\n - Add $HOME/.config/containers/registries.conf to config path\n - registries.conf.d: add stances for the registries.conf\n- update to libpod 1.9.3\n - userns: support --userns=auto\n - Switch to using --time as opposed to --timeout to better match Docker\n - Add support for specifying CNI networks in podman play kube\n - man pages: fix inconsistencies\n- Update to storage 1.19.1\n - userns: add support for auto\n - store: change the default user to containers\n - config: honor XDG_CONFIG_HOME\n- Remove the /var/lib/ca-certificates/pem/SUSE.pem workaround again.\n It never ended up in SLES and a different way to fix the underlying\n problem is being worked on.\n\n- Add registry.opensuse.org as default registry [bsc#1171578] \n\n- Add /var/lib/ca-certificates/pem/SUSE.pem to the SLES mounts.\n This for making container-suseconnect working in the public\n cloud on-demand images. It needs that file for being able to\n verify the server certificates of the RMT servers hosted\n in the public cloud.\n (https://github.com/SUSE/container-suseconnect/issues/41)\n \n\n \nThis update was imported from the SUSE:SLE-15-SP1:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1552", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1552-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1552-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQTQ7DAIC5RSKYJHFFDBAERIC5GGSB4J/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1552-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQTQ7DAIC5RSKYJHFFDBAERIC5GGSB4J/" }, { "category": "self", "summary": "SUSE Bug 1162432", "url": "https://bugzilla.suse.com/1162432" }, { "category": "self", "summary": "SUSE Bug 1164090", "url": "https://bugzilla.suse.com/1164090" }, { "category": "self", "summary": "SUSE Bug 1165738", "url": "https://bugzilla.suse.com/1165738" }, { "category": "self", "summary": "SUSE Bug 1171578", "url": "https://bugzilla.suse.com/1171578" }, { "category": "self", "summary": "SUSE Bug 1174075", "url": "https://bugzilla.suse.com/1174075" }, { "category": "self", "summary": "SUSE Bug 1175821", "url": "https://bugzilla.suse.com/1175821" }, { "category": "self", "summary": "SUSE Bug 1175957", "url": "https://bugzilla.suse.com/1175957" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1726 page", "url": "https://www.suse.com/security/cve/CVE-2020-1726/" } ], "title": "Security update for conmon, fuse-overlayfs, libcontainers-common, podman", "tracking": { "current_release_date": "2020-09-27T10:22:27Z", "generator": { "date": "2020-09-27T10:22:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1552-1", "initial_release_date": "2020-09-27T10:22:27Z", "revision_history": [ { "date": "2020-09-27T10:22:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libcontainers-common-20200727-lp151.2.10.1.noarch", "product": { "name": "libcontainers-common-20200727-lp151.2.10.1.noarch", "product_id": "libcontainers-common-20200727-lp151.2.10.1.noarch" } }, { "category": "product_version", "name": "podman-cni-config-2.0.6-lp151.3.21.1.noarch", "product": { "name": "podman-cni-config-2.0.6-lp151.3.21.1.noarch", "product_id": "podman-cni-config-2.0.6-lp151.3.21.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "conmon-2.0.20-lp151.5.1.x86_64", "product": { "name": "conmon-2.0.20-lp151.5.1.x86_64", "product_id": "conmon-2.0.20-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "fuse-overlayfs-1.1.2-lp151.8.1.x86_64", "product": { "name": "fuse-overlayfs-1.1.2-lp151.8.1.x86_64", "product_id": "fuse-overlayfs-1.1.2-lp151.8.1.x86_64" } }, { "category": "product_version", "name": "podman-2.0.6-lp151.3.21.1.x86_64", "product": { "name": "podman-2.0.6-lp151.3.21.1.x86_64", "product_id": "podman-2.0.6-lp151.3.21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "conmon-2.0.20-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:conmon-2.0.20-lp151.5.1.x86_64" }, "product_reference": "conmon-2.0.20-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-1.1.2-lp151.8.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:fuse-overlayfs-1.1.2-lp151.8.1.x86_64" }, "product_reference": "fuse-overlayfs-1.1.2-lp151.8.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "libcontainers-common-20200727-lp151.2.10.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:libcontainers-common-20200727-lp151.2.10.1.noarch" }, "product_reference": "libcontainers-common-20200727-lp151.2.10.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2.0.6-lp151.3.21.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:podman-2.0.6-lp151.3.21.1.x86_64" }, "product_reference": "podman-2.0.6-lp151.3.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-2.0.6-lp151.3.21.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:podman-cni-config-2.0.6-lp151.3.21.1.noarch" }, "product_reference": "podman-cni-config-2.0.6-lp151.3.21.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-1726", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1726" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:conmon-2.0.20-lp151.5.1.x86_64", "openSUSE Leap 15.1:fuse-overlayfs-1.1.2-lp151.8.1.x86_64", "openSUSE Leap 15.1:libcontainers-common-20200727-lp151.2.10.1.noarch", "openSUSE Leap 15.1:podman-2.0.6-lp151.3.21.1.x86_64", "openSUSE Leap 15.1:podman-cni-config-2.0.6-lp151.3.21.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1726", "url": "https://www.suse.com/security/cve/CVE-2020-1726" }, { "category": "external", "summary": "SUSE Bug 1164090 for CVE-2020-1726", "url": "https://bugzilla.suse.com/1164090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:conmon-2.0.20-lp151.5.1.x86_64", "openSUSE Leap 15.1:fuse-overlayfs-1.1.2-lp151.8.1.x86_64", "openSUSE Leap 15.1:libcontainers-common-20200727-lp151.2.10.1.noarch", "openSUSE Leap 15.1:podman-2.0.6-lp151.3.21.1.x86_64", "openSUSE Leap 15.1:podman-cni-config-2.0.6-lp151.3.21.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:conmon-2.0.20-lp151.5.1.x86_64", "openSUSE Leap 15.1:fuse-overlayfs-1.1.2-lp151.8.1.x86_64", "openSUSE Leap 15.1:libcontainers-common-20200727-lp151.2.10.1.noarch", "openSUSE Leap 15.1:podman-2.0.6-lp151.3.21.1.x86_64", "openSUSE Leap 15.1:podman-cni-config-2.0.6-lp151.3.21.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-09-27T10:22:27Z", "details": "moderate" } ], "title": "CVE-2020-1726" } ] }
opensuse-su-2020:1559-1
Vulnerability from csaf_opensuse
Published
2020-09-28 08:21
Modified
2020-09-28 08:21
Summary
Security update for conmon, fuse-overlayfs, libcontainers-common, podman
Notes
Title of the patch
Security update for conmon, fuse-overlayfs, libcontainers-common, podman
Description of the patch
This update for conmon, fuse-overlayfs, libcontainers-common, podman fixes the following issues:
podman was updated to v2.0.6 (bsc#1175821)
- install missing systemd units for the new Rest API (bsc#1175957)
and a few man-pages that where missing before
- Drop varlink API related bits (in favor of the new API)
- fix install location for zsh completions
* Fixed a bug where running systemd in a container on a cgroups v1 system would fail.
* Fixed a bug where /etc/passwd could be re-created every time a container
is restarted if the container's /etc/passwd did not contain an entry
for the user the container was started as.
* Fixed a bug where containers without an /etc/passwd file specifying
a non-root user would not start.
* Fixed a bug where the --remote flag would sometimes not make
remote connections and would instead attempt to run Podman locally.
Update to v2.0.6:
* Features
- Rootless Podman will now add an entry to /etc/passwd for the user who ran Podman if run with --userns=keep-id.
- The podman system connection command has been reworked to support multiple connections, and reenabled for use!
- Podman now has a new global flag, --connection, to specify a connection to a remote Podman API instance.
* Changes
- Podman's automatic systemd integration (activated by the --systemd=true flag, set by default) will now activate for containers using /usr/local/sbin/init as their command, instead of just /usr/sbin/init and /sbin/init (and any path ending in systemd).
- Seccomp profiles specified by the --security-opt seccomp=... flag to podman create and podman run will now be honored even if the container was created using --privileged.
* Bugfixes
- Fixed a bug where the podman play kube would not honor the hostIP field for port forwarding (#5964).
- Fixed a bug where the podman generate systemd command would panic on an invalid restart policy being specified (#7271).
- Fixed a bug where the podman images command could take a very long time (several minutes) to complete when a large number of images were present.
- Fixed a bug where the podman logs command with the --tail flag would not work properly when a large amount of output would be printed ((#7230)[https://github.com//issues/7230]).
- Fixed a bug where the podman exec command with remote Podman would not return a non-zero exit code when the exec session failed to start (e.g. invoking a non-existent command) (#6893).
- Fixed a bug where the podman load command with remote Podman would did not honor user-specified tags (#7124).
- Fixed a bug where the podman system service command, when run as a non-root user by Systemd, did not properly handle the Podman pause process and would not restart properly as a result (#7180).
- Fixed a bug where the --publish flag to podman create, podman run, and podman pod create did not properly handle a host IP of 0.0.0.0 (attempting to bind to literal 0.0.0.0, instead of all IPs on the system) (#7104).
- Fixed a bug where the podman start --attach command would not print the container's exit code when the command exited due to the container exiting.
- Fixed a bug where the podman rm command with remote Podman would not remove volumes, even if the --volumes flag was specified (#7128).
- Fixed a bug where the podman run command with remote Podman and the --rm flag could exit before the container was fully removed.
- Fixed a bug where the --pod new:... flag to podman run and podman create would create a pod that did not share any namespaces.
- Fixed a bug where the --preserve-fds flag to podman run and podman exec could close the wrong file descriptors while trying to close user-provided descriptors after passing them into the container.
- Fixed a bug where default environment variables ($PATH and $TERM) were not set in containers when not provided by the image.
- Fixed a bug where pod infra containers were not properly unmounted after exiting.
- Fixed a bug where networks created with podman network create with an IPv6 subnet did not properly set an IPv6 default route.
- Fixed a bug where the podman save command would not work properly when its output was piped to another command (#7017).
- Fixed a bug where containers using a systemd init on a cgroups v1 system could leak mounts under /sys/fs/cgroup/systemd to the host.
- Fixed a bug where podman build would not generate an event on completion (#7022).
- Fixed a bug where the podman history command with remote Podman printed incorrect creation times for layers (#7122).
- Fixed a bug where Podman would not create working directories specified by the container image if they did not exist.
- Fixed a bug where Podman did not clear CMD from the container image if the user overrode ENTRYPOINT (#7115).
- Fixed a bug where error parsing image names were not fully reported (part of the error message containing the exact issue was dropped).
- Fixed a bug where the podman images command with remote Podman did not support printing image tags in Go templates supplied to the --format flag (#7123).
- Fixed a bug where the podman rmi --force command would not attempt to unmount containers it was removing, which could cause a failure to remove the image.
- Fixed a bug where the podman generate systemd --new command could incorrectly quote arguments to Podman that contained whitespace, leading to nonfunctional unit files (#7285).
- Fixed a bug where the podman version command did not properly include build time and Git commit.
- Fixed a bug where running systemd in a Podman container on a system that did not use the systemd cgroup manager would fail (#6734).
- Fixed a bug where capabilities from --cap-add were not properly added when a container was started as a non-root user via --user.
- Fixed a bug where Pod infra containers were not properly cleaned up when they stopped, causing networking issues (#7103).
* API
- Fixed a bug where the libpod and compat Build endpoints did not accept the application/tar content type (instead only accepting application/x-tar) (#7185).
- Fixed a bug where the libpod Exists endpoint would attempt to write a second header in some error conditions (#7197).
- Fixed a bug where compat and libpod Network Inspect and Network Remove endpoints would return a 500 instead of 404 when the requested network was not found.
- Added a versioned _ping endpoint (e.g. http://localhost/v1.40/_ping).
- Fixed a bug where containers started through a systemd-managed instance of the REST API would be shut down when podman system service shut down due to its idle timeout (#7294).
- Added stronger parameter verification for the libpod Network Create endpoint to ensure subnet mask is a valid value.
- The Pod URL parameter to the Libpod Container List endpoint has been deprecated; the information previously gated by the Pod boolean will now be included in the response unconditionally.
- Change hard requires for AppArmor to Recommends. They are not
needed for runtime or with SELinux but already installed if
AppArmor is used [jsc#SMO-15]
- Add BuildRequires for pkg-config(libselinux) to build with
SELinux support [jsc#SMO-15]
Update to v2.0.4
* Fixed a bug where the output of podman image search did not
populate the Description field as it was mistakenly assigned to
the ID field.
* Fixed a bug where podman build - and podman build on an HTTP
target would fail.
* Fixed a bug where rootless Podman would improperly chown the
copied-up contents of anonymous volumes (#7130).
* Fixed a bug where Podman would sometimes HTML-escape special
characters in its CLI output.
* Fixed a bug where the podman start --attach --interactive
command would print the container ID of the container attached
to when exiting (#7068).
* Fixed a bug where podman run --ipc=host --pid=host would only
set --pid=host and not --ipc=host (#7100).
* Fixed a bug where the --publish argument to podman run, podman
create and podman pod create would not allow binding the same
container port to more than one host port (#7062).
* Fixed a bug where incorrect arguments to podman images --format
could cause Podman to segfault.
* Fixed a bug where podman rmi --force on an image ID with more
than one name and at least one container using the image would
not completely remove containers using the image (#7153).
* Fixed a bug where memory usage in bytes and memory use
percentage were swapped in the output of podman stats
--format=json.
* Fixed a bug where the libpod and compat events endpoints would
fail if no filters were specified (#7078).
* Fixed a bug where the CgroupVersion field in responses from the
compat Info endpoint was prefixed by 'v' (instead of just being
'1' or '2', as is documented).
- Suggest katacontainers instead of recommending it. It's not
enabled by default, so it's just bloat
Update to v2.0.3
* Fix handling of entrypoint
* log API: add context to allow for cancelling
* fix API: Create container with an invalid configuration
* Remove all instances of named return 'err' from Libpod
* Fix: Correct connection counters for hijacked connections
* Fix: Hijacking v2 endpoints to follow rfc 7230 semantics
* Remove hijacked connections from active connections list
* version/info: format: allow more json variants
* Correctly print STDOUT on non-terminal remote exec
* Fix container and pod create commands for remote create
* Mask out /sys/dev to prevent information leak from the host
* Ensure sig-proxy default is propagated in start
* Add SystemdMode to inspect for containers
* When determining systemd mode, use full command
* Fix lint
* Populate remaining unused fields in `pod inspect`
* Include infra container information in `pod inspect`
* play-kube: add suport for 'IfNotPresent' pull type
* docs: user namespace can't be shared in pods
* Fix 'Error: unrecognized protocol \'TCP\' in port mapping'
* Error on rootless mac and ip addresses
* Fix & add notes regarding problematic language in codebase
* abi: set default umask and rlimits
* Used reference package with errors for parsing tag
* fix: system df error when an image has no name
* Fix Generate API title/description
* Add noop function disable-content-trust
* fix play kube doesn't override dockerfile ENTRYPOINT
* Support default profile for apparmor
* Bump github.com/containers/common to v0.14.6
* events endpoint: backwards compat to old type
* events endpoint: fix panic and race condition
* Switch references from libpod.conf to containers.conf
* podman.service: set type to simple
* podman.service: set doc to podman-system-service
* podman.service: use default registries.conf
* podman.service: use default killmode
* podman.service: remove stop timeout
* systemd: symlink user->system
* vendor golang.org/x/text@v0.3.3
* Fix a bug where --pids-limit was parsed incorrectly
* search: allow wildcards
* [CI:DOCS]Do not copy policy.json into gating image
* Fix systemd pid 1 test
* Cirrus: Rotate keys post repo. rename
* The libpod.conf(5) man page got removed and all references are
now pointing towards containers.conf(5), which will be part
of the libcontainers-common package.
Update to podman v2.0.2
* fix race condition in `libpod.GetEvents(...)`
* Fix bug where `podman mount` didn't error as rootless
* remove podman system connection
* Fix imports to ensure v2 is used with libpod
* Update release notes for v2.0.2
* specgen: fix order for setting rlimits
* Ensure umask is set appropriately for 'system service'
* generate systemd: improve pod-flags filter
* Fix a bug with APIv2 compat network remove to log an ErrNetworkNotFound instead of nil
* Fixes --remote flag issues
* Pids-limit should only be set if the user set it
* Set console mode for windows
* Allow empty host port in --publish flag
* Add a note on the APIs supported by `system service`
* fix: Don't override entrypoint if it's `nil`
* Set TMPDIR to /var/tmp by default if not set
* test: add tests for --user and volumes
* container: move volume chown after spec generation
* libpod: volume copyup honors namespace mappings
* Fix `system service` panic from early hangup in events
* stop podman service in e2e tests
* Print errors from individual containers in pods
* auto-update: clarify systemd-unit requirements
* podman ps truncate the command
* move go module to v2
* Vendor containers/common v0.14.4
* Bump to imagebuilder v1.1.6 on v2 branch
* Account for non-default port number in image name
- Changes since v2.0.1
* Update release notes with further v2.0.1 changes
* Fix inspect to display multiple label: changes
* Set syslog for exit commands on log-level=debug
* Friendly amendment for pr 6751
* podman run/create: support all transports
* systemd generate: allow manual restart of container units in pods
* Revert sending --remote flag to containers
* Print port mappings in `ps` for ctrs sharing network
* vendor github.com/containers/common@v0.14.3
* Update release notes for v2.0.1
* utils: drop default mapping when running uid!=0
* Set stop signal to 15 when not explicitly set
* podman untag: error if tag doesn't exist
* Reformat inspect network settings
* APIv2: Return `StatusCreated` from volume creation
* APIv2:fix: Remove `/json` from compat network EPs
* Fix ssh-agent support
* libpod: specify mappings to the storage
* APIv2:doc: Fix swagger doc to refer to volumes
* Add podman network to bash command completions
* Fix typo in manpage for `podman auto update`.
* Add JSON output field for ps
* V2 podman system connection
* image load: no args required
* Re-add PODMAN_USERNS environment variable
* Fix conflicts between privileged and other flags
* Bump required go version to 1.13
* Add explicit command to alpine container in test case.
* Use POLL_DURATION for timer
* Stop following logs using timers
* 'pod' was being truncated to 'po' in the names of the generated systemd unit files.
* rootless_linux: improve error message
* Fix podman build handling of --http-proxy flag
* correct the absolute path of `rm` executable
* Makefile: allow customizable GO_BUILD
* Cirrus: Change DEST_BRANCH to v2.0
Update to podman v2.0.0
* The `podman generate systemd` command now supports the `--new`
flag when used with pods, allowing portable services for pods
to be created.
* The `podman play kube` command now supports running Kubernetes
Deployment YAML.
* The `podman exec` command now supports the `--detach` flag to
run commands in the container in the background.
* The `-p` flag to `podman run` and `podman create` now supports
forwarding ports to IPv6 addresses.
* The `podman run`, `podman create` and `podman pod create`
command now support a `--replace` flag to remove and replace any
existing container (or, for `pod create`, pod) with the same name
* The `--restart-policy` flag to `podman run` and `podman create`
now supports the `unless-stopped` restart policy.
* The `--log-driver` flag to `podman run` and `podman create`
now supports the `none` driver, which does not log the
container's output.
* The `--mount` flag to `podman run` and `podman create` now
accepts `readonly` option as an alias to `ro`.
* The `podman generate systemd` command now supports the `--container-prefix`,
`--pod-prefix`, and `--separator` arguments to control the
name of generated unit files.
* The `podman network ls` command now supports the `--filter`
flag to filter results.
* The `podman auto-update` command now supports specifying an
authfile to use when pulling new images on a per-container
basis using the `io.containers.autoupdate.authfile` label.
* Fixed a bug where the `podman exec` command would log to journald
when run in containers loggined to journald
([#6555](https://github.com/containers/libpod/issues/6555)).
* Fixed a bug where the `podman auto-update` command would not
preserve the OS and architecture of the original image when
pulling a replacement
([#6613](https://github.com/containers/libpod/issues/6613)).
* Fixed a bug where the `podman cp` command could create an extra
`merged` directory when copying into an existing directory
([#6596](https://github.com/containers/libpod/issues/6596)).
* Fixed a bug where the `podman pod stats` command would crash
on pods run with `--network=host`
([#5652](https://github.com/containers/libpod/issues/5652)).
* Fixed a bug where containers logs written to journald did not
include the name of the container.
* Fixed a bug where the `podman network inspect` and
`podman network rm` commands did not properly handle non-default
CNI configuration paths ([#6212](https://github.com/containers/libpod/issues/6212)).
* Fixed a bug where Podman did not properly remove containers
when using the Kata containers OCI runtime.
* Fixed a bug where `podman inspect` would sometimes incorrectly
report the network mode of containers started with `--net=none`.
* Podman is now better able to deal with cases where `conmon`
is killed before the container it is monitoring.
Update to podman v1.9.3:
* Fixed a bug where, on FIPS enabled hosts, FIPS mode secrets
were not properly mounted into containers
* Fixed a bug where builds run over Varlink would hang
* Fixed a bug where podman save would fail when the target
image was specified by digest
* Fixed a bug where rootless containers with ports forwarded to them
could panic and dump core due to a concurrency issue (#6018)
* Fixed a bug where rootless Podman could race when opening the
rootless user namespace, resulting in commands failing to run
* Fixed a bug where HTTP proxy environment variables forwarded into
the container by the --http-proxy flag could not be overridden by --env or --env-file
* Fixed a bug where rootless Podman was setting resource limits on cgroups
v2 systems that were not using systemd-managed cgroups
(and thus did not support resource limits), resulting in containers failing to start
Update podman to v1.9.1:
* Bugfixes
- Fixed a bug where healthchecks could become nonfunctional if
container log paths were manually set with --log-path and
multiple container logs were placed in the same directory
- Fixed a bug where rootless Podman could, when using an older
libpod.conf, print numerous warning messages about an invalid
CGroup manager config
- Fixed a bug where rootless Podman would sometimes fail to
close the rootless user namespace when joining it
Update podman to v1.9.0:
* Features
- Experimental support has been added for podman run
--userns=auto, which automatically allocates a unique UID and
GID range for the new container's user namespace
- The podman play kube command now has a --network flag to
place the created pod in one or more CNI networks
- The podman commit command now supports an --iidfile flag to
write the ID of the committed image to a file
- Initial support for the new containers.conf configuration
file has been added. containers.conf allows for much more
detailed configuration of some Podman functionality
* Changes
- There has been a major cleanup of the podman info command
resulting in breaking changes. Many fields have been renamed
to better suit usage with APIv2
- All uses of the --timeout flag have been switched to prefer
the alternative --time. The --timeout flag will continue to
work, but man pages and --help will use the --time flag
instead
* Bugfixes
- Fixed a bug where some volume mounts from the host would
sometimes not properly determine the flags they should use
when mounting
- Fixed a bug where Podman was not propagating $PATH to Conmon
and the OCI runtime, causing issues for some OCI runtimes
that required it
- Fixed a bug where rootless Podman would print error messages
about missing support for systemd cgroups when run in a
container with no cgroup support
- Fixed a bug where podman play kube would not properly handle
container-only port mappings (#5610)
- Fixed a bug where the podman container prune command was not
pruning containers in the created and configured states
- Fixed a bug where Podman was not properly removing CNI IP
address allocations after a reboot (#5433)
- Fixed a bug where Podman was not properly applying the
default Seccomp profile when --security-opt was not given at
the command line
* HTTP API
- Many Libpod API endpoints have been added, including Changes,
Checkpoint, Init, and Restore
- Resolved issues where the podman system service command would
time out and exit while there were still active connections
- Stability overall has greatly improved as we prepare the API
for a beta release soon with Podman 2.0
* Misc
- The default infra image for pods has been upgraded to
k8s.gcr.io/pause:3.2 (from 3.1) to address a bug in the
architecture metadata for non-AMD64 images
- The slirp4netns networking utility in rootless Podman now
uses Seccomp filtering where available for improved security
- Updated Buildah to v1.14.8
- Updated containers/storage to v1.18.2
- Updated containers/image to v5.4.3
- Updated containers/common to v0.8.1
- Add 'systemd' BUILDFLAGS to build with support for journald
logging (bsc#1162432)
Update podman to v1.8.2:
* Features
- Initial support for automatically updating containers managed
via Systemd unit files has been merged. This allows
containers to automatically upgrade if a newer version of
their image becomes available
* Bugfixes
- Fixed a bug where unit files generated by podman generate
systemd --new would not force containers to detach, causing
the unit to time out when trying to start
- Fixed a bug where podman system reset could delete important
system directories if run as rootless on installations
created by older Podman (#4831)
- Fixed a bug where image built by podman build would not
properly set the OS and Architecture they were built with
(#5503)
- Fixed a bug where attached podman run with --sig-proxy
enabled (the default), when built with Go 1.14, would
repeatedly send signal 23 to the process in the container and
could generate errors when the container stopped (#5483)
- Fixed a bug where rootless podman run commands could hang
when forwarding ports
- Fixed a bug where rootless Podman would not work when /proc
was mounted with the hidepid option set
- Fixed a bug where the podman system service command would use
large amounts of CPU when --timeout was set to 0 (#5531)
* HTTP API
- Initial support for Libpod endpoints related to creating and
operating on image manifest lists has been added
- The Libpod Healthcheck and Events API endpoints are now
supported
- The Swagger endpoint can now handle cases where no Swagger
documentation has been generated
Update podman to v1.8.1:
* Features
- Many networking-related flags have been added to podman pod
create to enable customization of pod networks, including
--add-host, --dns, --dns-opt, --dns-search, --ip,
--mac-address, --network, and --no-hosts
- The podman ps --format=json command now includes the ID of
the image containers were created with
- The podman run and podman create commands now feature an
--rmi flag to remove the image the container was using after
it exits (if no other containers are using said image)
([#4628](https://github.com/containers/libpod/issues/4628))
- The podman create and podman run commands now support the
--device-cgroup-rule flag (#4876)
- While the HTTP API remains in alpha, many fixes and additions
have landed. These are documented in a separate subsection
below
- The podman create and podman run commands now feature a
--no-healthcheck flag to disable healthchecks for a container
(#5299)
- Containers now recognize the io.containers.capabilities
label, which specifies a list of capabilities required by the
image to run. These capabilities will be used as long as they
are more restrictive than the default capabilities used
- YAML produced by the podman generate kube command now
includes SELinux configuration passed into the container via
--security-opt label=... (#4950)
* Bugfixes
- Fixed CVE-2020-1726, a security issue where volumes manually
populated before first being mounted into a container could
have those contents overwritten on first being mounted into a
container
- Fixed a bug where Podman containers with user namespaces in
CNI networks with the DNS plugin enabled would not have the
DNS plugin's nameserver added to their resolv.conf
([#5256](https://github.com/containers/libpod/issues/5256))
- Fixed a bug where trailing / characters in image volume
definitions could cause them to not be overridden by a
user-specified mount at the same location
([#5219](https://github.com/containers/libpod/issues/5219))
- Fixed a bug where the label option in libpod.conf, used to
disable SELinux by default, was not being respected (#5087)
- Fixed a bug where the podman login and podman logout commands
required the registry to log into be specified (#5146)
- Fixed a bug where detached rootless Podman containers could
not forward ports (#5167)
- Fixed a bug where rootless Podman could fail to run if the
pause process had died
- Fixed a bug where Podman ignored labels that were specified
with only a key and no value (#3854)
- Fixed a bug where Podman would fail to create named volumes
when the backing filesystem did not support SELinux labelling
(#5200)
- Fixed a bug where --detach-keys='' would not disable
detaching from a container (#5166)
- Fixed a bug where the podman ps command was too aggressive
when filtering containers and would force --all on in too
many situations
- Fixed a bug where the podman play kube command was ignoring
image configuration, including volumes, working directory,
labels, and stop signal (#5174)
- Fixed a bug where the Created and CreatedTime fields in
podman images --format=json were misnamed, which also broke
Go template output for those fields
([#5110](https://github.com/containers/libpod/issues/5110))
- Fixed a bug where rootless Podman containers with ports
forwarded could hang when started (#5182)
- Fixed a bug where podman pull could fail to parse registry
names including port numbers
- Fixed a bug where Podman would incorrectly attempt to
validate image OS and architecture when starting containers
- Fixed a bug where Bash completion for podman build -f would
not list available files that could be built (#3878)
- Fixed a bug where podman commit --change would perform
incorrect validation, resulting in valid changes being
rejected (#5148)
- Fixed a bug where podman logs --tail could take large amounts
of memory when the log file for a container was large (#5131)
- Fixed a bug where Podman would sometimes incorrectly generate
firewall rules on systems using firewalld
- Fixed a bug where the podman inspect command would not
display network information for containers properly if a
container joined multiple CNI networks
([#4907](https://github.com/containers/libpod/issues/4907))
- Fixed a bug where the --uts flag to podman create and podman
run would only allow specifying containers by full ID (#5289)
- Fixed a bug where rootless Podman could segfault when passed
a large number of file descriptors
- Fixed a bug where the podman port command was incorrectly
interpreting additional arguments as container names, instead
of port numbers
- Fixed a bug where units created by podman generate systemd
did not depend on network targets, and so could start before
the system network was ready (#4130)
- Fixed a bug where exec sessions in containers which did not
specify a user would not inherit supplemental groups added to
the container via --group-add
- Fixed a bug where Podman would not respect the $TMPDIR
environment variable for placing large temporary files during
some operations (e.g. podman pull)
([#5411](https://github.com/containers/libpod/issues/5411))
* HTTP API
- Initial support for secure connections to servers via SSH
tunneling has been added
- Initial support for the libpod create and logs endpoints for
containers has been added
- Added a /swagger/ endpoint to serve API documentation
- The json endpoint for containers has received many fixes
- Filtering images and containers has been greatly improved,
with many bugs fixed and documentation improved
- Image creation endpoints (commit, pull, etc) have seen many
fixes
- Server timeout has been fixed so that long operations will no
longer trigger the timeout and shut the server down
- The stats endpoint for containers has seen major fixes and
now provides accurate output
- Handling the HTTP 304 status code has been fixed for all
endpoints
- Many fixes have been made to API documentation to ensure it
matches the code
* Misc
- The Created field to podman images --format=json has been
renamed to CreatedSince as part of the fix for (#5110). Go
templates using the old name shou ld still work
- The CreatedTime field to podman images --format=json has been
renamed to CreatedAt as part of the fix for (#5110). Go
templates using the old name should still work
- The before filter to podman images has been renamed to since
for Docker compatibility. Using before will still work, but
documentation has been changed to use the new since filter
- Using the --password flag to podman login now warns that
passwords are being passed in plaintext
- Some common cases where Podman would deadlock have been fixed
to warn the user that podman system renumber must be run to
resolve the deadlock
- Configure br_netfilter for podman automatically (bsc#1165738)
The trigger is only excuted when updating podman-cni-config while the
command was running
conmon was update to v2.0.20 (bsc#1175821)
- journald: fix logging container name
- container logging: Implement none driver - 'off', 'null' or
'none' all work.
- ctrl: warn if we fail to unlink
- Drop fsync calls
- Reap PIDs before running exit command
- Fix log path parsing
- Add --sync option to prevent conmon from double forking
- Add --no-sync-log option to instruct conmon to not sync the
logs of the containers upon shutting down. This feature fixes a
regression where we unconditionally dropped the log sync. It is
possible the container logs could be corrupted on a sudden
power-off. If you need container logs to remain in consistent
state after a sudden shutdown, please update from v2.0.19 to
v2.0.20
- Update to v2.0.17:
- Add option to delay execution of exit command
- Update to v2.0.16:
- tty: flush pending data when fd is ready
- Enable support for journald logging (bsc#1162432)
- Update to v2.0.15:
- store status while waiting for pid
- Update to v2.0.14:
- drop usage of splice(2)
- avoid hanging on stdin
- stdio: sometimes quit main loop after io is done
- ignore sigpipe
- Update to v2.0.12
- oom: fix potential race between verification steps
- Update to v2.0.11
- log: reject --log-tag with k8s-file
- chmod std files pipes
- adjust score to -1000 to prevent conmon from ever being OOM
killed
- container OOM: verify cgroup hasn't been cleaned up before
reporting OOM
- journal logging: write to /dev/null instead of -1
fuse-overlayfs was updated to 1.1.2 (bsc#1175821):
- fix memory leak when creating whiteout files.
- fix lookup for overflow uid when it is different than the overflow gid.
- use openat2(2) when available.
- accept 'ro' as mount option.
- fix set mtime for a symlink.
- fix some issues reported by static analysis.
- fix potential infinite loop on a short read.
- fix creating a directory if the destination already exists
in the upper layer.
- report correctly the number of links for a directory also for
subsequent stat calls
- stop looking up the ino in the lower layers if the file could
not be opened
- make sure the destination is deleted before doing a rename(2).
It prevents a left over directory to cause delete to fail with
EEXIST.
- honor --debug.
libcontainers-common was updated to fix:
- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)
- Added containers/common tarball for containers.conf(5) man page
- Install containers.conf default configuration in
/usr/share/containers
- libpod repository on github got renamed to podman
- Update to image 5.5.1
- Add documentation for credHelpera
- Add defaults for using the rootless policy path
- Update libpod/podman to 2.0.3
- docs: user namespace can't be shared in pods
- Switch references from libpod.conf to containers.conf
- Allow empty host port in --publish flag
- update document login see config.json as valid
- Update storage to 1.20.2
- Add back skip_mount_home
- Remove remaining difference between SLE and openSUSE package and
ship the some mounts.conf default configuration on both platforms.
As the sources for the mount point do not exist on openSUSE by
default this config will basically have no effect on openSUSE.
(jsc#SLE-12122, bsc#1175821)
- Update to image 5.4.4
- Remove registries.conf VERSION 2 references from man page
- Intial authfile man page
- Add $HOME/.config/containers/certs.d to perHostCertDirPath
- Add $HOME/.config/containers/registries.conf to config path
- registries.conf.d: add stances for the registries.conf
- update to libpod 1.9.3
- userns: support --userns=auto
- Switch to using --time as opposed to --timeout to better match Docker
- Add support for specifying CNI networks in podman play kube
- man pages: fix inconsistencies
- Update to storage 1.19.1
- userns: add support for auto
- store: change the default user to containers
- config: honor XDG_CONFIG_HOME
- Remove the /var/lib/ca-certificates/pem/SUSE.pem workaround again.
It never ended up in SLES and a different way to fix the underlying
problem is being worked on.
- Add registry.opensuse.org as default registry [bsc#1171578]
- Add /var/lib/ca-certificates/pem/SUSE.pem to the SLES mounts.
This for making container-suseconnect working in the public
cloud on-demand images. It needs that file for being able to
verify the server certificates of the RMT servers hosted
in the public cloud.
(https://github.com/SUSE/container-suseconnect/issues/41)
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patchnames
openSUSE-2020-1559
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for conmon, fuse-overlayfs, libcontainers-common, podman", "title": "Title of the patch" }, { "category": "description", "text": "This update for conmon, fuse-overlayfs, libcontainers-common, podman fixes the following issues:\n\npodman was updated to v2.0.6 (bsc#1175821)\n\n- install missing systemd units for the new Rest API (bsc#1175957)\n and a few man-pages that where missing before\n- Drop varlink API related bits (in favor of the new API)\n- fix install location for zsh completions\n\n * Fixed a bug where running systemd in a container on a cgroups v1 system would fail.\n * Fixed a bug where /etc/passwd could be re-created every time a container\n is restarted if the container\u0027s /etc/passwd did not contain an entry\n for the user the container was started as.\n * Fixed a bug where containers without an /etc/passwd file specifying\n a non-root user would not start.\n * Fixed a bug where the --remote flag would sometimes not make\n remote connections and would instead attempt to run Podman locally.\n\nUpdate to v2.0.6:\n\n* Features\n\n - Rootless Podman will now add an entry to /etc/passwd for the user who ran Podman if run with --userns=keep-id.\n - The podman system connection command has been reworked to support multiple connections, and reenabled for use!\n - Podman now has a new global flag, --connection, to specify a connection to a remote Podman API instance.\n\n* Changes\n\n - Podman\u0027s automatic systemd integration (activated by the --systemd=true flag, set by default) will now activate for containers using /usr/local/sbin/init as their command, instead of just /usr/sbin/init and /sbin/init (and any path ending in systemd).\n - Seccomp profiles specified by the --security-opt seccomp=... flag to podman create and podman run will now be honored even if the container was created using --privileged.\n\n* Bugfixes\n\n - Fixed a bug where the podman play kube would not honor the hostIP field for port forwarding (#5964).\n - Fixed a bug where the podman generate systemd command would panic on an invalid restart policy being specified (#7271).\n - Fixed a bug where the podman images command could take a very long time (several minutes) to complete when a large number of images were present.\n - Fixed a bug where the podman logs command with the --tail flag would not work properly when a large amount of output would be printed ((#7230)[https://github.com//issues/7230]).\n - Fixed a bug where the podman exec command with remote Podman would not return a non-zero exit code when the exec session failed to start (e.g. invoking a non-existent command) (#6893).\n - Fixed a bug where the podman load command with remote Podman would did not honor user-specified tags (#7124).\n - Fixed a bug where the podman system service command, when run as a non-root user by Systemd, did not properly handle the Podman pause process and would not restart properly as a result (#7180).\n - Fixed a bug where the --publish flag to podman create, podman run, and podman pod create did not properly handle a host IP of 0.0.0.0 (attempting to bind to literal 0.0.0.0, instead of all IPs on the system) (#7104).\n - Fixed a bug where the podman start --attach command would not print the container\u0027s exit code when the command exited due to the container exiting.\n - Fixed a bug where the podman rm command with remote Podman would not remove volumes, even if the --volumes flag was specified (#7128).\n - Fixed a bug where the podman run command with remote Podman and the --rm flag could exit before the container was fully removed.\n - Fixed a bug where the --pod new:... flag to podman run and podman create would create a pod that did not share any namespaces.\n - Fixed a bug where the --preserve-fds flag to podman run and podman exec could close the wrong file descriptors while trying to close user-provided descriptors after passing them into the container.\n - Fixed a bug where default environment variables ($PATH and $TERM) were not set in containers when not provided by the image.\n - Fixed a bug where pod infra containers were not properly unmounted after exiting.\n - Fixed a bug where networks created with podman network create with an IPv6 subnet did not properly set an IPv6 default route.\n - Fixed a bug where the podman save command would not work properly when its output was piped to another command (#7017).\n - Fixed a bug where containers using a systemd init on a cgroups v1 system could leak mounts under /sys/fs/cgroup/systemd to the host.\n - Fixed a bug where podman build would not generate an event on completion (#7022).\n - Fixed a bug where the podman history command with remote Podman printed incorrect creation times for layers (#7122).\n - Fixed a bug where Podman would not create working directories specified by the container image if they did not exist.\n - Fixed a bug where Podman did not clear CMD from the container image if the user overrode ENTRYPOINT (#7115).\n - Fixed a bug where error parsing image names were not fully reported (part of the error message containing the exact issue was dropped).\n - Fixed a bug where the podman images command with remote Podman did not support printing image tags in Go templates supplied to the --format flag (#7123).\n - Fixed a bug where the podman rmi --force command would not attempt to unmount containers it was removing, which could cause a failure to remove the image.\n - Fixed a bug where the podman generate systemd --new command could incorrectly quote arguments to Podman that contained whitespace, leading to nonfunctional unit files (#7285).\n - Fixed a bug where the podman version command did not properly include build time and Git commit.\n - Fixed a bug where running systemd in a Podman container on a system that did not use the systemd cgroup manager would fail (#6734).\n - Fixed a bug where capabilities from --cap-add were not properly added when a container was started as a non-root user via --user.\n - Fixed a bug where Pod infra containers were not properly cleaned up when they stopped, causing networking issues (#7103).\n\n* API\n\n - Fixed a bug where the libpod and compat Build endpoints did not accept the application/tar content type (instead only accepting application/x-tar) (#7185).\n - Fixed a bug where the libpod Exists endpoint would attempt to write a second header in some error conditions (#7197).\n - Fixed a bug where compat and libpod Network Inspect and Network Remove endpoints would return a 500 instead of 404 when the requested network was not found.\n - Added a versioned _ping endpoint (e.g. http://localhost/v1.40/_ping).\n - Fixed a bug where containers started through a systemd-managed instance of the REST API would be shut down when podman system service shut down due to its idle timeout (#7294).\n - Added stronger parameter verification for the libpod Network Create endpoint to ensure subnet mask is a valid value.\n - The Pod URL parameter to the Libpod Container List endpoint has been deprecated; the information previously gated by the Pod boolean will now be included in the response unconditionally.\n\n- Change hard requires for AppArmor to Recommends. They are not\n needed for runtime or with SELinux but already installed if\n AppArmor is used [jsc#SMO-15]\n- Add BuildRequires for pkg-config(libselinux) to build with\n SELinux support [jsc#SMO-15] \n\nUpdate to v2.0.4\n\n* Fixed a bug where the output of podman image search did not\n populate the Description field as it was mistakenly assigned to\n the ID field.\n* Fixed a bug where podman build - and podman build on an HTTP\n target would fail.\n* Fixed a bug where rootless Podman would improperly chown the\n copied-up contents of anonymous volumes (#7130).\n* Fixed a bug where Podman would sometimes HTML-escape special\n characters in its CLI output.\n* Fixed a bug where the podman start --attach --interactive\n command would print the container ID of the container attached\n to when exiting (#7068).\n* Fixed a bug where podman run --ipc=host --pid=host would only\n set --pid=host and not --ipc=host (#7100).\n* Fixed a bug where the --publish argument to podman run, podman\n create and podman pod create would not allow binding the same\n container port to more than one host port (#7062).\n* Fixed a bug where incorrect arguments to podman images --format\n could cause Podman to segfault.\n* Fixed a bug where podman rmi --force on an image ID with more\n than one name and at least one container using the image would\n not completely remove containers using the image (#7153).\n* Fixed a bug where memory usage in bytes and memory use\n percentage were swapped in the output of podman stats\n --format=json.\n* Fixed a bug where the libpod and compat events endpoints would\n fail if no filters were specified (#7078).\n* Fixed a bug where the CgroupVersion field in responses from the\n compat Info endpoint was prefixed by \u0027v\u0027 (instead of just being\n \u00271\u0027 or \u00272\u0027, as is documented).\n\n- Suggest katacontainers instead of recommending it. It\u0027s not\n enabled by default, so it\u0027s just bloat\n\nUpdate to v2.0.3\n\n* Fix handling of entrypoint\n* log API: add context to allow for cancelling\n* fix API: Create container with an invalid configuration\n* Remove all instances of named return \u0027err\u0027 from Libpod\n* Fix: Correct connection counters for hijacked connections\n* Fix: Hijacking v2 endpoints to follow rfc 7230 semantics\n* Remove hijacked connections from active connections list\n* version/info: format: allow more json variants\n* Correctly print STDOUT on non-terminal remote exec\n* Fix container and pod create commands for remote create\n* Mask out /sys/dev to prevent information leak from the host\n* Ensure sig-proxy default is propagated in start\n* Add SystemdMode to inspect for containers\n* When determining systemd mode, use full command\n* Fix lint\n* Populate remaining unused fields in `pod inspect`\n* Include infra container information in `pod inspect`\n* play-kube: add suport for \u0027IfNotPresent\u0027 pull type\n* docs: user namespace can\u0027t be shared in pods\n* Fix \u0027Error: unrecognized protocol \\\u0027TCP\\\u0027 in port mapping\u0027\n* Error on rootless mac and ip addresses\n* Fix \u0026 add notes regarding problematic language in codebase\n* abi: set default umask and rlimits\n* Used reference package with errors for parsing tag\n* fix: system df error when an image has no name\n* Fix Generate API title/description\n* Add noop function disable-content-trust\n* fix play kube doesn\u0027t override dockerfile ENTRYPOINT\n* Support default profile for apparmor\n* Bump github.com/containers/common to v0.14.6\n* events endpoint: backwards compat to old type\n* events endpoint: fix panic and race condition\n* Switch references from libpod.conf to containers.conf\n* podman.service: set type to simple\n* podman.service: set doc to podman-system-service\n* podman.service: use default registries.conf\n* podman.service: use default killmode\n* podman.service: remove stop timeout\n* systemd: symlink user-\u003esystem\n* vendor golang.org/x/text@v0.3.3\n* Fix a bug where --pids-limit was parsed incorrectly\n* search: allow wildcards\n* [CI:DOCS]Do not copy policy.json into gating image\n* Fix systemd pid 1 test\n* Cirrus: Rotate keys post repo. rename\n* The libpod.conf(5) man page got removed and all references are\n now pointing towards containers.conf(5), which will be part\n of the libcontainers-common package.\n\nUpdate to podman v2.0.2\n\n* fix race condition in `libpod.GetEvents(...)`\n* Fix bug where `podman mount` didn\u0027t error as rootless\n* remove podman system connection\n* Fix imports to ensure v2 is used with libpod\n* Update release notes for v2.0.2\n* specgen: fix order for setting rlimits\n* Ensure umask is set appropriately for \u0027system service\u0027\n* generate systemd: improve pod-flags filter\n* Fix a bug with APIv2 compat network remove to log an ErrNetworkNotFound instead of nil\n* Fixes --remote flag issues\n* Pids-limit should only be set if the user set it\n* Set console mode for windows\n* Allow empty host port in --publish flag\n* Add a note on the APIs supported by `system service`\n* fix: Don\u0027t override entrypoint if it\u0027s `nil`\n* Set TMPDIR to /var/tmp by default if not set\n* test: add tests for --user and volumes\n* container: move volume chown after spec generation\n* libpod: volume copyup honors namespace mappings\n* Fix `system service` panic from early hangup in events\n* stop podman service in e2e tests\n* Print errors from individual containers in pods\n* auto-update: clarify systemd-unit requirements\n* podman ps truncate the command\n* move go module to v2\n* Vendor containers/common v0.14.4\n* Bump to imagebuilder v1.1.6 on v2 branch\n* Account for non-default port number in image name\n- Changes since v2.0.1\n* Update release notes with further v2.0.1 changes\n* Fix inspect to display multiple label: changes\n* Set syslog for exit commands on log-level=debug\n* Friendly amendment for pr 6751\n* podman run/create: support all transports\n* systemd generate: allow manual restart of container units in pods\n* Revert sending --remote flag to containers\n* Print port mappings in `ps` for ctrs sharing network\n* vendor github.com/containers/common@v0.14.3\n* Update release notes for v2.0.1\n* utils: drop default mapping when running uid!=0\n* Set stop signal to 15 when not explicitly set\n* podman untag: error if tag doesn\u0027t exist\n* Reformat inspect network settings\n* APIv2: Return `StatusCreated` from volume creation\n* APIv2:fix: Remove `/json` from compat network EPs\n* Fix ssh-agent support\n* libpod: specify mappings to the storage\n* APIv2:doc: Fix swagger doc to refer to volumes\n* Add podman network to bash command completions\n* Fix typo in manpage for `podman auto update`.\n* Add JSON output field for ps\n* V2 podman system connection\n* image load: no args required\n* Re-add PODMAN_USERNS environment variable\n* Fix conflicts between privileged and other flags\n* Bump required go version to 1.13\n* Add explicit command to alpine container in test case.\n* Use POLL_DURATION for timer\n* Stop following logs using timers\n* \u0027pod\u0027 was being truncated to \u0027po\u0027 in the names of the generated systemd unit files.\n* rootless_linux: improve error message\n* Fix podman build handling of --http-proxy flag\n* correct the absolute path of `rm` executable\n* Makefile: allow customizable GO_BUILD\n* Cirrus: Change DEST_BRANCH to v2.0\n\nUpdate to podman v2.0.0\n\n* The `podman generate systemd` command now supports the `--new`\n flag when used with pods, allowing portable services for pods\n to be created.\n* The `podman play kube` command now supports running Kubernetes\n Deployment YAML.\n* The `podman exec` command now supports the `--detach` flag to\n run commands in the container in the background.\n* The `-p` flag to `podman run` and `podman create` now supports\n forwarding ports to IPv6 addresses.\n* The `podman run`, `podman create` and `podman pod create`\n command now support a `--replace` flag to remove and replace any\n existing container (or, for `pod create`, pod) with the same name\n* The `--restart-policy` flag to `podman run` and `podman create`\n now supports the `unless-stopped` restart policy.\n* The `--log-driver` flag to `podman run` and `podman create`\n now supports the `none` driver, which does not log the\n container\u0027s output.\n* The `--mount` flag to `podman run` and `podman create` now\n accepts `readonly` option as an alias to `ro`.\n* The `podman generate systemd` command now supports the `--container-prefix`,\n `--pod-prefix`, and `--separator` arguments to control the\n name of generated unit files.\n* The `podman network ls` command now supports the `--filter`\n flag to filter results.\n* The `podman auto-update` command now supports specifying an\n authfile to use when pulling new images on a per-container\n basis using the `io.containers.autoupdate.authfile` label.\n* Fixed a bug where the `podman exec` command would log to journald\n when run in containers loggined to journald\n ([#6555](https://github.com/containers/libpod/issues/6555)).\n* Fixed a bug where the `podman auto-update` command would not\n preserve the OS and architecture of the original image when\n pulling a replacement\n ([#6613](https://github.com/containers/libpod/issues/6613)).\n* Fixed a bug where the `podman cp` command could create an extra\n `merged` directory when copying into an existing directory\n ([#6596](https://github.com/containers/libpod/issues/6596)).\n* Fixed a bug where the `podman pod stats` command would crash\n on pods run with `--network=host`\n ([#5652](https://github.com/containers/libpod/issues/5652)).\n* Fixed a bug where containers logs written to journald did not\n include the name of the container.\n* Fixed a bug where the `podman network inspect` and\n `podman network rm` commands did not properly handle non-default\n CNI configuration paths ([#6212](https://github.com/containers/libpod/issues/6212)).\n* Fixed a bug where Podman did not properly remove containers\n when using the Kata containers OCI runtime.\n* Fixed a bug where `podman inspect` would sometimes incorrectly\n report the network mode of containers started with `--net=none`.\n* Podman is now better able to deal with cases where `conmon`\n is killed before the container it is monitoring.\n\nUpdate to podman v1.9.3:\n\n* Fixed a bug where, on FIPS enabled hosts, FIPS mode secrets\n were not properly mounted into containers\n* Fixed a bug where builds run over Varlink would hang\n* Fixed a bug where podman save would fail when the target\n image was specified by digest\n* Fixed a bug where rootless containers with ports forwarded to them\n could panic and dump core due to a concurrency issue (#6018)\n* Fixed a bug where rootless Podman could race when opening the\n rootless user namespace, resulting in commands failing to run\n* Fixed a bug where HTTP proxy environment variables forwarded into\n the container by the --http-proxy flag could not be overridden by --env or --env-file\n* Fixed a bug where rootless Podman was setting resource limits on cgroups\n v2 systems that were not using systemd-managed cgroups\n (and thus did not support resource limits), resulting in containers failing to start\n\nUpdate podman to v1.9.1:\n\n* Bugfixes\n\n - Fixed a bug where healthchecks could become nonfunctional if\n container log paths were manually set with --log-path and\n multiple container logs were placed in the same directory\n - Fixed a bug where rootless Podman could, when using an older\n libpod.conf, print numerous warning messages about an invalid\n CGroup manager config\n - Fixed a bug where rootless Podman would sometimes fail to\n close the rootless user namespace when joining it\n\nUpdate podman to v1.9.0:\n\n* Features\n\n - Experimental support has been added for podman run\n --userns=auto, which automatically allocates a unique UID and\n GID range for the new container\u0027s user namespace\n - The podman play kube command now has a --network flag to\n place the created pod in one or more CNI networks\n - The podman commit command now supports an --iidfile flag to\n write the ID of the committed image to a file\n - Initial support for the new containers.conf configuration\n file has been added. containers.conf allows for much more\n detailed configuration of some Podman functionality\n\n* Changes\n\n - There has been a major cleanup of the podman info command\n resulting in breaking changes. Many fields have been renamed\n to better suit usage with APIv2\n - All uses of the --timeout flag have been switched to prefer\n the alternative --time. The --timeout flag will continue to\n work, but man pages and --help will use the --time flag\n instead\n\n* Bugfixes\n\n - Fixed a bug where some volume mounts from the host would\n sometimes not properly determine the flags they should use\n when mounting\n - Fixed a bug where Podman was not propagating $PATH to Conmon\n and the OCI runtime, causing issues for some OCI runtimes\n that required it\n - Fixed a bug where rootless Podman would print error messages\n about missing support for systemd cgroups when run in a\n container with no cgroup support\n - Fixed a bug where podman play kube would not properly handle\n container-only port mappings (#5610)\n - Fixed a bug where the podman container prune command was not\n pruning containers in the created and configured states\n - Fixed a bug where Podman was not properly removing CNI IP\n address allocations after a reboot (#5433)\n - Fixed a bug where Podman was not properly applying the\n default Seccomp profile when --security-opt was not given at\n the command line\n\n* HTTP API\n\n - Many Libpod API endpoints have been added, including Changes,\n Checkpoint, Init, and Restore\n - Resolved issues where the podman system service command would\n time out and exit while there were still active connections\n - Stability overall has greatly improved as we prepare the API\n for a beta release soon with Podman 2.0\n\n* Misc\n\n - The default infra image for pods has been upgraded to\n k8s.gcr.io/pause:3.2 (from 3.1) to address a bug in the\n architecture metadata for non-AMD64 images\n - The slirp4netns networking utility in rootless Podman now\n uses Seccomp filtering where available for improved security\n - Updated Buildah to v1.14.8\n - Updated containers/storage to v1.18.2\n - Updated containers/image to v5.4.3\n - Updated containers/common to v0.8.1\n\n- Add \u0027systemd\u0027 BUILDFLAGS to build with support for journald\n logging (bsc#1162432)\n\nUpdate podman to v1.8.2:\n\n* Features\n\n - Initial support for automatically updating containers managed\n via Systemd unit files has been merged. This allows\n containers to automatically upgrade if a newer version of\n their image becomes available\n\n* Bugfixes\n\n - Fixed a bug where unit files generated by podman generate\n systemd --new would not force containers to detach, causing\n the unit to time out when trying to start\n - Fixed a bug where podman system reset could delete important\n system directories if run as rootless on installations\n created by older Podman (#4831)\n - Fixed a bug where image built by podman build would not\n properly set the OS and Architecture they were built with\n (#5503)\n - Fixed a bug where attached podman run with --sig-proxy\n enabled (the default), when built with Go 1.14, would\n repeatedly send signal 23 to the process in the container and\n could generate errors when the container stopped (#5483)\n - Fixed a bug where rootless podman run commands could hang\n when forwarding ports\n - Fixed a bug where rootless Podman would not work when /proc\n was mounted with the hidepid option set\n - Fixed a bug where the podman system service command would use\n large amounts of CPU when --timeout was set to 0 (#5531)\n\n* HTTP API\n\n - Initial support for Libpod endpoints related to creating and\n operating on image manifest lists has been added\n - The Libpod Healthcheck and Events API endpoints are now\n supported\n - The Swagger endpoint can now handle cases where no Swagger\n documentation has been generated\n\nUpdate podman to v1.8.1:\n\n* Features\n\n - Many networking-related flags have been added to podman pod\n create to enable customization of pod networks, including\n --add-host, --dns, --dns-opt, --dns-search, --ip,\n --mac-address, --network, and --no-hosts\n - The podman ps --format=json command now includes the ID of\n the image containers were created with\n - The podman run and podman create commands now feature an\n --rmi flag to remove the image the container was using after\n it exits (if no other containers are using said image)\n ([#4628](https://github.com/containers/libpod/issues/4628))\n - The podman create and podman run commands now support the\n --device-cgroup-rule flag (#4876)\n - While the HTTP API remains in alpha, many fixes and additions\n have landed. These are documented in a separate subsection\n below\n - The podman create and podman run commands now feature a\n --no-healthcheck flag to disable healthchecks for a container\n (#5299)\n - Containers now recognize the io.containers.capabilities\n label, which specifies a list of capabilities required by the\n image to run. These capabilities will be used as long as they\n are more restrictive than the default capabilities used\n - YAML produced by the podman generate kube command now\n includes SELinux configuration passed into the container via\n --security-opt label=... (#4950)\n\n* Bugfixes\n\n - Fixed CVE-2020-1726, a security issue where volumes manually\n populated before first being mounted into a container could\n have those contents overwritten on first being mounted into a\n container\n - Fixed a bug where Podman containers with user namespaces in\n CNI networks with the DNS plugin enabled would not have the\n DNS plugin\u0027s nameserver added to their resolv.conf\n ([#5256](https://github.com/containers/libpod/issues/5256))\n - Fixed a bug where trailing / characters in image volume\n definitions could cause them to not be overridden by a\n user-specified mount at the same location\n ([#5219](https://github.com/containers/libpod/issues/5219))\n - Fixed a bug where the label option in libpod.conf, used to\n disable SELinux by default, was not being respected (#5087)\n - Fixed a bug where the podman login and podman logout commands\n required the registry to log into be specified (#5146)\n - Fixed a bug where detached rootless Podman containers could\n not forward ports (#5167)\n - Fixed a bug where rootless Podman could fail to run if the\n pause process had died\n - Fixed a bug where Podman ignored labels that were specified\n with only a key and no value (#3854)\n - Fixed a bug where Podman would fail to create named volumes\n when the backing filesystem did not support SELinux labelling\n (#5200)\n - Fixed a bug where --detach-keys=\u0027\u0027 would not disable\n detaching from a container (#5166)\n - Fixed a bug where the podman ps command was too aggressive\n when filtering containers and would force --all on in too\n many situations\n - Fixed a bug where the podman play kube command was ignoring\n image configuration, including volumes, working directory,\n labels, and stop signal (#5174)\n - Fixed a bug where the Created and CreatedTime fields in\n podman images --format=json were misnamed, which also broke\n Go template output for those fields\n ([#5110](https://github.com/containers/libpod/issues/5110))\n - Fixed a bug where rootless Podman containers with ports\n forwarded could hang when started (#5182)\n - Fixed a bug where podman pull could fail to parse registry\n names including port numbers\n - Fixed a bug where Podman would incorrectly attempt to\n validate image OS and architecture when starting containers\n - Fixed a bug where Bash completion for podman build -f would\n not list available files that could be built (#3878)\n - Fixed a bug where podman commit --change would perform\n incorrect validation, resulting in valid changes being\n rejected (#5148)\n - Fixed a bug where podman logs --tail could take large amounts\n of memory when the log file for a container was large (#5131)\n - Fixed a bug where Podman would sometimes incorrectly generate\n firewall rules on systems using firewalld\n - Fixed a bug where the podman inspect command would not\n display network information for containers properly if a\n container joined multiple CNI networks\n ([#4907](https://github.com/containers/libpod/issues/4907))\n - Fixed a bug where the --uts flag to podman create and podman\n run would only allow specifying containers by full ID (#5289)\n - Fixed a bug where rootless Podman could segfault when passed\n a large number of file descriptors\n - Fixed a bug where the podman port command was incorrectly\n interpreting additional arguments as container names, instead\n of port numbers\n - Fixed a bug where units created by podman generate systemd\n did not depend on network targets, and so could start before\n the system network was ready (#4130)\n - Fixed a bug where exec sessions in containers which did not\n specify a user would not inherit supplemental groups added to\n the container via --group-add\n - Fixed a bug where Podman would not respect the $TMPDIR\n environment variable for placing large temporary files during\n some operations (e.g. podman pull)\n ([#5411](https://github.com/containers/libpod/issues/5411))\n\n* HTTP API\n\n - Initial support for secure connections to servers via SSH\n tunneling has been added\n - Initial support for the libpod create and logs endpoints for\n containers has been added\n - Added a /swagger/ endpoint to serve API documentation\n - The json endpoint for containers has received many fixes\n - Filtering images and containers has been greatly improved,\n with many bugs fixed and documentation improved\n - Image creation endpoints (commit, pull, etc) have seen many\n fixes\n - Server timeout has been fixed so that long operations will no\n longer trigger the timeout and shut the server down\n - The stats endpoint for containers has seen major fixes and\n now provides accurate output\n - Handling the HTTP 304 status code has been fixed for all\n endpoints\n - Many fixes have been made to API documentation to ensure it\n matches the code\n\n* Misc\n\n - The Created field to podman images --format=json has been\n renamed to CreatedSince as part of the fix for (#5110). Go\n templates using the old name shou ld still work\n - The CreatedTime field to podman images --format=json has been\n renamed to CreatedAt as part of the fix for (#5110). Go\n templates using the old name should still work\n - The before filter to podman images has been renamed to since\n for Docker compatibility. Using before will still work, but\n documentation has been changed to use the new since filter\n - Using the --password flag to podman login now warns that\n passwords are being passed in plaintext\n - Some common cases where Podman would deadlock have been fixed\n to warn the user that podman system renumber must be run to\n resolve the deadlock\n\n- Configure br_netfilter for podman automatically (bsc#1165738)\n The trigger is only excuted when updating podman-cni-config while the\n command was running\n\nconmon was update to v2.0.20 (bsc#1175821)\n\n- journald: fix logging container name\n- container logging: Implement none driver - \u0027off\u0027, \u0027null\u0027 or\n \u0027none\u0027 all work.\n- ctrl: warn if we fail to unlink\n- Drop fsync calls\n- Reap PIDs before running exit command\n- Fix log path parsing\n- Add --sync option to prevent conmon from double forking\n- Add --no-sync-log option to instruct conmon to not sync the\n logs of the containers upon shutting down. This feature fixes a\n regression where we unconditionally dropped the log sync. It is\n possible the container logs could be corrupted on a sudden\n power-off. If you need container logs to remain in consistent\n state after a sudden shutdown, please update from v2.0.19 to\n v2.0.20\n\n- Update to v2.0.17:\n\n - Add option to delay execution of exit command\n\n- Update to v2.0.16:\n\n - tty: flush pending data when fd is ready\n\n- Enable support for journald logging (bsc#1162432)\n- Update to v2.0.15:\n\n - store status while waiting for pid\n\n- Update to v2.0.14:\n\n - drop usage of splice(2)\n - avoid hanging on stdin\n - stdio: sometimes quit main loop after io is done\n - ignore sigpipe\n\n- Update to v2.0.12\n\n - oom: fix potential race between verification steps\n\n- Update to v2.0.11\n\n - log: reject --log-tag with k8s-file\n - chmod std files pipes\n - adjust score to -1000 to prevent conmon from ever being OOM\n killed\n - container OOM: verify cgroup hasn\u0027t been cleaned up before\n reporting OOM\n - journal logging: write to /dev/null instead of -1\n\nfuse-overlayfs was updated to 1.1.2 (bsc#1175821):\n\n- fix memory leak when creating whiteout files.\n- fix lookup for overflow uid when it is different than the overflow gid.\n- use openat2(2) when available.\n- accept \u0027ro\u0027 as mount option.\n- fix set mtime for a symlink.\n- fix some issues reported by static analysis.\n- fix potential infinite loop on a short read.\n- fix creating a directory if the destination already exists\n in the upper layer.\n- report correctly the number of links for a directory also for\n subsequent stat calls\n- stop looking up the ino in the lower layers if the file could\n not be opened\n- make sure the destination is deleted before doing a rename(2).\n It prevents a left over directory to cause delete to fail with\n EEXIST.\n- honor --debug.\n\nlibcontainers-common was updated to fix:\n\n- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)\n- Added containers/common tarball for containers.conf(5) man page\n- Install containers.conf default configuration in\n /usr/share/containers\n- libpod repository on github got renamed to podman\n- Update to image 5.5.1\n - Add documentation for credHelpera\n - Add defaults for using the rootless policy path\n- Update libpod/podman to 2.0.3\n - docs: user namespace can\u0027t be shared in pods\n - Switch references from libpod.conf to containers.conf\n - Allow empty host port in --publish flag\n - update document login see config.json as valid\n- Update storage to 1.20.2\n - Add back skip_mount_home\n\n- Remove remaining difference between SLE and openSUSE package and\n ship the some mounts.conf default configuration on both platforms.\n As the sources for the mount point do not exist on openSUSE by\n default this config will basically have no effect on openSUSE.\n (jsc#SLE-12122, bsc#1175821) \n\n- Update to image 5.4.4\n - Remove registries.conf VERSION 2 references from man page\n - Intial authfile man page\n - Add $HOME/.config/containers/certs.d to perHostCertDirPath\n - Add $HOME/.config/containers/registries.conf to config path\n - registries.conf.d: add stances for the registries.conf\n- update to libpod 1.9.3\n - userns: support --userns=auto\n - Switch to using --time as opposed to --timeout to better match Docker\n - Add support for specifying CNI networks in podman play kube\n - man pages: fix inconsistencies\n- Update to storage 1.19.1\n - userns: add support for auto\n - store: change the default user to containers\n - config: honor XDG_CONFIG_HOME\n- Remove the /var/lib/ca-certificates/pem/SUSE.pem workaround again.\n It never ended up in SLES and a different way to fix the underlying\n problem is being worked on.\n\n- Add registry.opensuse.org as default registry [bsc#1171578] \n\n- Add /var/lib/ca-certificates/pem/SUSE.pem to the SLES mounts.\n This for making container-suseconnect working in the public\n cloud on-demand images. It needs that file for being able to\n verify the server certificates of the RMT servers hosted\n in the public cloud.\n (https://github.com/SUSE/container-suseconnect/issues/41)\n \n\n \nThis update was imported from the SUSE:SLE-15-SP1:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1559", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1559-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1559-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4RRWLMM7REX4VHOLCPS6TP7RMNE6RGH/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1559-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4RRWLMM7REX4VHOLCPS6TP7RMNE6RGH/" }, { "category": "self", "summary": "SUSE Bug 1162432", "url": "https://bugzilla.suse.com/1162432" }, { "category": "self", "summary": "SUSE Bug 1164090", "url": "https://bugzilla.suse.com/1164090" }, { "category": "self", "summary": "SUSE Bug 1165738", "url": "https://bugzilla.suse.com/1165738" }, { "category": "self", "summary": "SUSE Bug 1171578", "url": "https://bugzilla.suse.com/1171578" }, { "category": "self", "summary": "SUSE Bug 1174075", "url": "https://bugzilla.suse.com/1174075" }, { "category": "self", "summary": "SUSE Bug 1175821", "url": "https://bugzilla.suse.com/1175821" }, { "category": "self", "summary": "SUSE Bug 1175957", "url": "https://bugzilla.suse.com/1175957" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1726 page", "url": "https://www.suse.com/security/cve/CVE-2020-1726/" } ], "title": "Security update for conmon, fuse-overlayfs, libcontainers-common, podman", "tracking": { "current_release_date": "2020-09-28T08:21:39Z", "generator": { "date": "2020-09-28T08:21:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1559-1", "initial_release_date": "2020-09-28T08:21:39Z", "revision_history": [ { "date": "2020-09-28T08:21:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libcontainers-common-20200727-lp152.2.3.1.noarch", "product": { "name": "libcontainers-common-20200727-lp152.2.3.1.noarch", "product_id": "libcontainers-common-20200727-lp152.2.3.1.noarch" } }, { "category": "product_version", "name": "podman-cni-config-2.0.6-lp152.4.3.1.noarch", "product": { "name": "podman-cni-config-2.0.6-lp152.4.3.1.noarch", "product_id": "podman-cni-config-2.0.6-lp152.4.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "conmon-2.0.20-lp152.4.3.1.x86_64", "product": { "name": "conmon-2.0.20-lp152.4.3.1.x86_64", "product_id": "conmon-2.0.20-lp152.4.3.1.x86_64" } }, { "category": "product_version", "name": "fuse-overlayfs-1.1.2-lp152.2.3.1.x86_64", "product": { "name": "fuse-overlayfs-1.1.2-lp152.2.3.1.x86_64", "product_id": "fuse-overlayfs-1.1.2-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "podman-2.0.6-lp152.4.3.1.x86_64", "product": { "name": "podman-2.0.6-lp152.4.3.1.x86_64", "product_id": "podman-2.0.6-lp152.4.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "conmon-2.0.20-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:conmon-2.0.20-lp152.4.3.1.x86_64" }, "product_reference": "conmon-2.0.20-lp152.4.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-1.1.2-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:fuse-overlayfs-1.1.2-lp152.2.3.1.x86_64" }, "product_reference": "fuse-overlayfs-1.1.2-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libcontainers-common-20200727-lp152.2.3.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libcontainers-common-20200727-lp152.2.3.1.noarch" }, "product_reference": "libcontainers-common-20200727-lp152.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2.0.6-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:podman-2.0.6-lp152.4.3.1.x86_64" }, "product_reference": "podman-2.0.6-lp152.4.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-2.0.6-lp152.4.3.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:podman-cni-config-2.0.6-lp152.4.3.1.noarch" }, "product_reference": "podman-cni-config-2.0.6-lp152.4.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-1726", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1726" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:conmon-2.0.20-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:fuse-overlayfs-1.1.2-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:libcontainers-common-20200727-lp152.2.3.1.noarch", "openSUSE Leap 15.2:podman-2.0.6-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:podman-cni-config-2.0.6-lp152.4.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1726", "url": "https://www.suse.com/security/cve/CVE-2020-1726" }, { "category": "external", "summary": "SUSE Bug 1164090 for CVE-2020-1726", "url": "https://bugzilla.suse.com/1164090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:conmon-2.0.20-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:fuse-overlayfs-1.1.2-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:libcontainers-common-20200727-lp152.2.3.1.noarch", "openSUSE Leap 15.2:podman-2.0.6-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:podman-cni-config-2.0.6-lp152.4.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:conmon-2.0.20-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:fuse-overlayfs-1.1.2-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:libcontainers-common-20200727-lp152.2.3.1.noarch", "openSUSE Leap 15.2:podman-2.0.6-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:podman-cni-config-2.0.6-lp152.4.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-09-28T08:21:39Z", "details": "moderate" } ], "title": "CVE-2020-1726" } ] }
rhsa-2020:0680
Vulnerability from csaf_redhat
Published
2020-03-10 22:09
Modified
2025-08-06 05:06
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.3.5 podman security update
Notes
Topic
An update for podman is now available for Red Hat OpenShift Container Platform 4.3.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The podman tool manages Pods, container images, and containers. It is part of the libpod library, which is for applications that use container Pods. Container Pods is a concept in Kubernetes.
Security Fix(es):
* podman: incorrectly allowed existing files in volumes to be overwritten by a container when it was created (CVE-2020-1726)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for podman is now available for Red Hat OpenShift Container Platform 4.3.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The podman tool manages Pods, container images, and containers. It is part of the libpod library, which is for applications that use container Pods. Container Pods is a concept in Kubernetes.\n\nSecurity Fix(es):\n\n* podman: incorrectly allowed existing files in volumes to be overwritten by a container when it was created (CVE-2020-1726)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0680", "url": "https://access.redhat.com/errata/RHSA-2020:0680" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1801152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801152" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0680.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.3.5 podman security update", "tracking": { "current_release_date": "2025-08-06T05:06:04+00:00", "generator": { "date": "2025-08-06T05:06:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:0680", "initial_release_date": "2020-03-10T22:09:04+00:00", "revision_history": [ { "date": "2020-03-10T22:09:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-10T22:09:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-06T05:06:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.3", "product": { "name": "Red Hat OpenShift Container Platform 4.3", "product_id": "8Base-RHOSE-4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.3::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.6.4-7.el8.x86_64", "product": { "name": "podman-0:1.6.4-7.el8.x86_64", "product_id": "podman-0:1.6.4-7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.6.4-7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-0:1.6.4-7.el8.x86_64", "product": { "name": "podman-remote-0:1.6.4-7.el8.x86_64", "product_id": "podman-remote-0:1.6.4-7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.6.4-7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-tests-0:1.6.4-7.el8.x86_64", "product": { "name": "podman-tests-0:1.6.4-7.el8.x86_64", "product_id": "podman-tests-0:1.6.4-7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.6.4-7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.6.4-7.el8.x86_64", "product": { "name": "podman-debugsource-0:1.6.4-7.el8.x86_64", "product_id": "podman-debugsource-0:1.6.4-7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.6.4-7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.6.4-7.el8.x86_64", "product": { "name": "podman-debuginfo-0:1.6.4-7.el8.x86_64", "product_id": "podman-debuginfo-0:1.6.4-7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.6.4-7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.6.4-7.el8.x86_64", "product": { "name": "podman-remote-debuginfo-0:1.6.4-7.el8.x86_64", "product_id": "podman-remote-debuginfo-0:1.6.4-7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.6.4-7.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.6.4-7.el8.src", "product": { "name": "podman-0:1.6.4-7.el8.src", "product_id": "podman-0:1.6.4-7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.6.4-7.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "podman-docker-0:1.6.4-7.el8.noarch", "product": { "name": "podman-docker-0:1.6.4-7.el8.noarch", "product_id": "podman-docker-0:1.6.4-7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@1.6.4-7.el8?arch=noarch" } } }, { "category": "product_version", "name": "podman-manpages-0:1.6.4-7.el8.noarch", "product": { "name": "podman-manpages-0:1.6.4-7.el8.noarch", "product_id": "podman-manpages-0:1.6.4-7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-manpages@1.6.4-7.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-7.el8.src as a component of Red Hat OpenShift Container Platform 4.3", "product_id": "8Base-RHOSE-4.3:podman-0:1.6.4-7.el8.src" }, "product_reference": "podman-0:1.6.4-7.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.3" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.3", "product_id": "8Base-RHOSE-4.3:podman-0:1.6.4-7.el8.x86_64" }, "product_reference": "podman-0:1.6.4-7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.3" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.6.4-7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.3", "product_id": "8Base-RHOSE-4.3:podman-debuginfo-0:1.6.4-7.el8.x86_64" }, "product_reference": "podman-debuginfo-0:1.6.4-7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.3" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.6.4-7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.3", "product_id": "8Base-RHOSE-4.3:podman-debugsource-0:1.6.4-7.el8.x86_64" }, "product_reference": "podman-debugsource-0:1.6.4-7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.3" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.6.4-7.el8.noarch as a component of Red Hat OpenShift Container Platform 4.3", "product_id": "8Base-RHOSE-4.3:podman-docker-0:1.6.4-7.el8.noarch" }, "product_reference": "podman-docker-0:1.6.4-7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.3" }, { "category": "default_component_of", "full_product_name": { "name": "podman-manpages-0:1.6.4-7.el8.noarch as a component of Red Hat OpenShift Container Platform 4.3", "product_id": "8Base-RHOSE-4.3:podman-manpages-0:1.6.4-7.el8.noarch" }, "product_reference": "podman-manpages-0:1.6.4-7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.3" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.6.4-7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.3", "product_id": "8Base-RHOSE-4.3:podman-remote-0:1.6.4-7.el8.x86_64" }, "product_reference": "podman-remote-0:1.6.4-7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.3" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.6.4-7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.3", "product_id": "8Base-RHOSE-4.3:podman-remote-debuginfo-0:1.6.4-7.el8.x86_64" }, "product_reference": "podman-remote-debuginfo-0:1.6.4-7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.3" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.6.4-7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.3", "product_id": "8Base-RHOSE-4.3:podman-tests-0:1.6.4-7.el8.x86_64" }, "product_reference": "podman-tests-0:1.6.4-7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Tristan De Cacqueray" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1726", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2020-02-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801152" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created", "title": "Vulnerability summary" }, { "category": "other", "text": "Podman versions earlier than 1.6.0 are not affected. That includes the podman versions in OCP 4.2 and earlier.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.3:podman-0:1.6.4-7.el8.src", "8Base-RHOSE-4.3:podman-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-debuginfo-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-debugsource-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-docker-0:1.6.4-7.el8.noarch", "8Base-RHOSE-4.3:podman-manpages-0:1.6.4-7.el8.noarch", "8Base-RHOSE-4.3:podman-remote-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-remote-debuginfo-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-tests-0:1.6.4-7.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1726" }, { "category": "external", "summary": "RHBZ#1801152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801152" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1726", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1726" } ], "release_date": "2020-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-10T22:09:04+00:00", "details": "For OpenShift Container Platform 4.3 see the following documentation, which\nwill be updated shortly for release 4.3.5, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.3/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.3:podman-0:1.6.4-7.el8.src", "8Base-RHOSE-4.3:podman-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-debuginfo-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-debugsource-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-docker-0:1.6.4-7.el8.noarch", "8Base-RHOSE-4.3:podman-manpages-0:1.6.4-7.el8.noarch", "8Base-RHOSE-4.3:podman-remote-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-remote-debuginfo-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-tests-0:1.6.4-7.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0680" }, { "category": "workaround", "details": "If a volume needs to be attached as read-only to an untrusted container or container image, first attach it to a trusted container. Using the volume for the first time will make the attack impossible for other containers that are going to use the volume.", "product_ids": [ "8Base-RHOSE-4.3:podman-0:1.6.4-7.el8.src", "8Base-RHOSE-4.3:podman-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-debuginfo-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-debugsource-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-docker-0:1.6.4-7.el8.noarch", "8Base-RHOSE-4.3:podman-manpages-0:1.6.4-7.el8.noarch", "8Base-RHOSE-4.3:podman-remote-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-remote-debuginfo-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-tests-0:1.6.4-7.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.3:podman-0:1.6.4-7.el8.src", "8Base-RHOSE-4.3:podman-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-debuginfo-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-debugsource-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-docker-0:1.6.4-7.el8.noarch", "8Base-RHOSE-4.3:podman-manpages-0:1.6.4-7.el8.noarch", "8Base-RHOSE-4.3:podman-remote-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-remote-debuginfo-0:1.6.4-7.el8.x86_64", "8Base-RHOSE-4.3:podman-tests-0:1.6.4-7.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created" } ] }
rhsa-2020:1650
Vulnerability from csaf_redhat
Published
2020-04-28 16:11
Modified
2025-08-06 05:06
Summary
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
Notes
Topic
An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921)
* containers/image: Container images read entire image manifest into memory (CVE-2020-1702)
* podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921)\n\n* containers/image: Container images read entire image manifest into memory (CVE-2020-1702)\n\n* podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1650", "url": "https://access.redhat.com/errata/RHSA-2020:1650" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index" }, { "category": "external", "summary": "1703245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703245" }, { "category": "external", "summary": "1717357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717357" }, { "category": "external", "summary": "1731107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731107" }, { "category": "external", "summary": "1732704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732704" }, { "category": "external", "summary": "1732713", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732713" }, { "category": "external", "summary": "1748519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748519" }, { "category": "external", "summary": "1749999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749999" }, { "category": "external", "summary": "1754744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754744" }, { "category": "external", "summary": "1754763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754763" }, { "category": "external", "summary": "1755119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755119" }, { "category": "external", "summary": "1756919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756919" }, { "category": "external", "summary": "1757693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757693" }, { "category": "external", "summary": "1757845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757845" }, { "category": "external", "summary": "1763454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763454" }, { "category": "external", "summary": "1766774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766774" }, { "category": "external", "summary": "1768930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768930" }, { "category": "external", "summary": "1769469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769469" }, { "category": "external", "summary": "1771990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771990" }, { "category": "external", "summary": "1774755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774755" }, { "category": "external", "summary": "1775307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775307" }, { "category": "external", "summary": "1776112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776112" }, { "category": "external", "summary": "1779834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779834" }, { "category": "external", "summary": "1783267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783267" }, { "category": "external", "summary": "1783268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783268" }, { "category": "external", "summary": "1783270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783270" }, { "category": "external", "summary": "1783272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783272" }, { "category": "external", "summary": "1783274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783274" }, { "category": "external", "summary": "1784267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784267" }, { "category": "external", "summary": "1784952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784952" }, { "category": "external", "summary": "1788539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788539" }, { "category": "external", "summary": "1792796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792796" }, { "category": "external", "summary": "1793084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793084" }, { "category": "external", "summary": "1793598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793598" }, { "category": "external", "summary": "1796107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796107" }, { "category": "external", "summary": "1801152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801152" }, { "category": "external", "summary": "1802907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802907" }, { "category": "external", "summary": "1803496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1803496" }, { "category": "external", "summary": "1804849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804849" }, { "category": "external", "summary": "1805017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1805017" }, { "category": "external", "summary": "1805212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1805212" }, { "category": "external", "summary": "1806901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806901" }, { "category": "external", "summary": "1808707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1808707" }, { "category": "external", "summary": "1810053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810053" }, { "category": "external", "summary": "1811514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1811514" }, { "category": "external", "summary": "1813295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813295" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1650.json" } ], "title": "Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-06T05:06:17+00:00", "generator": { "date": "2025-08-06T05:06:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:1650", "initial_release_date": "2020-04-28T16:11:21+00:00", "revision_history": [ { "date": "2020-04-28T16:11:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-28T16:11:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-06T05:06:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:rhel8:8020020200324071414:0d58ad57", "product": { "name": "container-tools:rhel8:8020020200324071414:0d58ad57", "product_id": "container-tools:rhel8:8020020200324071414:0d58ad57", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-tools@rhel8?rpmmod=container-tools:rhel8:8020020200324071414:0d58ad57" } } }, { "category": "product_version", "name": "cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "product": { "name": "cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "product_id": "cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@12-1.module%2Bel8.2.0%2B5950%2B6d183a6a?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "product": { "name": "container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "product_id": "container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.124.0-1.module%2Bel8.2.0%2B5182%2B3136e5d4?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "product": { "name": "podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "product_id": "podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=noarch" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "product": { "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "product_id": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-podman-api@1.2.0-0.2.gitd0a45fe.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=noarch" } } }, { "category": "product_version", "name": "toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "product": { "name": "toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "product_id": "toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.7-1.module%2Bel8.2.0%2B6096%2B9c3f08f3?arch=noarch" } } }, { "category": "product_version", "name": "udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "product": { "name": "udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "product_id": "udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.1-2.module%2Bel8.2.0%2B4896%2B8f613c81?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product": { "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product_id": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product": { "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product_id": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product": { "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product_id": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product": { "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product_id": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product": { "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product_id": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=aarch64" } } }, { "category": "product_version", "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "product": { "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "product_id": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.6-1.module%2Bel8.2.0%2B5182%2B3136e5d4?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "product": { "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "product_id": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "product_id": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=aarch64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product": { "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product_id": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product": { "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product_id": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=aarch64" } } }, { "category": "product_version", "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product": { "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product_id": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product": { "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product_id": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product": { "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product_id": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "product": { "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "product_id": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "product_id": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=aarch64" } } }, { "category": "product_version", "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product": { "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_id": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product": { "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_id": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product": { "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_id": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product": { "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_id": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product": { "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_id": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=aarch64" } } }, { "category": "product_version", "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product": { "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_id": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=aarch64" } } }, { "category": "product_version", "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product": { "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product_id": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "product": { "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "product_id": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "product": { "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "product_id": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "product": { "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "product_id": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product": { "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product_id": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product": { "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product_id": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product": { "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product_id": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product": { "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product_id": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "product": { "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "product_id": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "product": { "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "product_id": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "product": { "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "product_id": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "product": { "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "product_id": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=src" } } }, { "category": "product_version", "name": "cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "product": { "name": "cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "product_id": "cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@12-1.module%2Bel8.2.0%2B5950%2B6d183a6a?arch=src" } } }, { "category": "product_version", "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "product": { "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "product_id": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.6-1.module%2Bel8.2.0%2B5182%2B3136e5d4?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "product": { "name": "container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "product_id": "container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.124.0-1.module%2Bel8.2.0%2B5182%2B3136e5d4?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "product": { "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "product_id": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=src" } } }, { "category": "product_version", "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "product": { "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "product_id": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "product": { "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "product_id": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=src" } } }, { "category": "product_version", "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "product": { "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "product_id": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=src" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "product": { "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "product_id": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-podman-api@1.2.0-0.2.gitd0a45fe.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "product": { "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "product_id": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "product": { "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "product_id": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "product": { "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "product_id": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "product": { "name": "toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "product_id": "toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.7-1.module%2Bel8.2.0%2B6096%2B9c3f08f3?arch=src" } } }, { "category": "product_version", "name": "udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src", "product": { "name": "udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src", "product_id": "udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.1-2.module%2Bel8.2.0%2B4896%2B8f613c81?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product": { "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product_id": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product": { "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product_id": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product": { "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product_id": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product": { "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product_id": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product": { "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product_id": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=ppc64le" } } }, { "category": "product_version", "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "product": { "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "product_id": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.6-1.module%2Bel8.2.0%2B5182%2B3136e5d4?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "product_id": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product": { "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product_id": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product": { "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product_id": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product": { "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product_id": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product": { "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product_id": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product": { "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product_id": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "product": { "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "product_id": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product": { "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_id": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product": { "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_id": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product": { "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_id": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product": { "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_id": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product": { "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_id": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product": { "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_id": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product": { "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product_id": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "product": { "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "product_id": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "product_id": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product": { "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product_id": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product": { "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product_id": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product": { "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product_id": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product": { "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product_id": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "product": { "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "product_id": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "product_id": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "product": { "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "product_id": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product": { "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product_id": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product": { "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product_id": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product": { "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product_id": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product": { "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product_id": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product": { "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product_id": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=s390x" } } }, { "category": "product_version", "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "product": { "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "product_id": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.6-1.module%2Bel8.2.0%2B5182%2B3136e5d4?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "product": { "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "product_id": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product": { "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product_id": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product": { "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product_id": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=s390x" } } }, { "category": "product_version", "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product": { "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product_id": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=s390x" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product": { "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product_id": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=s390x" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product": { "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product_id": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "product": { "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "product_id": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "product_id": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "product_id": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=s390x" } } }, { "category": "product_version", "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product": { "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_id": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product": { "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_id": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product": { "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_id": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product": { "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_id": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product": { "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_id": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=s390x" } } }, { "category": "product_version", "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product": { "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_id": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=s390x" } } }, { "category": "product_version", "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product": { "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product_id": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "product": { "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "product_id": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "product_id": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "product": { "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "product_id": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product": { "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product_id": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product": { "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product_id": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product": { "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product_id": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product": { "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product_id": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "product": { "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "product_id": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "product": { "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "product_id": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "product": { "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "product_id": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product": { "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product_id": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product": { "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product_id": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product": { "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product_id": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product": { "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product_id": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product": { "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product_id": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-7.module%2Bel8.2.0%2B5856%2Bb8046c6d?arch=x86_64" } } }, { "category": "product_version", "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "product": { "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "product_id": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.6-1.module%2Bel8.2.0%2B5182%2B3136e5d4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "product_id": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.3-5.module%2Bel8.2.0%2B5201%2B6b31f0d9?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product": { "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product_id": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product": { "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product_id": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=x86_64" } } }, { "category": "product_version", "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product": { "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product_id": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product": { "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product_id": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product": { "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product_id": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "product": { "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "product_id": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "product_id": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.7.2-5.module%2Bel8.2.0%2B6060%2B9dbc027d?arch=x86_64" } } }, { "category": "product_version", "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product": { "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_id": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product": { "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_id": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product": { "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_id": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product": { "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_id": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product": { "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_id": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=x86_64" } } }, { "category": "product_version", "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product": { "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_id": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.6.4-10.module%2Bel8.2.0%2B6063%2Be761893a?arch=x86_64" } } }, { "category": "product_version", "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product": { "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product_id": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.12-9.module%2Bel8.2.0%2B5029%2B3ac48e7d?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "product": { "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "product_id": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "product_id": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "product_id": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-65.rc10.module%2Bel8.2.0%2B5762%2Baaee29fb?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product": { "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product_id": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product_id": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product_id": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product": { "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product_id": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@0.1.40-10.module%2Bel8.2.0%2B5955%2B6cd70ceb?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "product": { "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "product_id": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "product": { "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "product_id": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "product": { "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "product_id": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.4.2-3.git21fdece.module%2Bel8.2.0%2B5658%2B9a15711d?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, "product_reference": "container-tools:rhel8:8020020200324071414:0d58ad57", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64" }, "product_reference": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le" }, "product_reference": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x" }, "product_reference": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src" }, "product_reference": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64" }, "product_reference": "buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64" }, "product_reference": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x" }, "product_reference": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64" }, "product_reference": "buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64" }, "product_reference": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le" }, "product_reference": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x" }, "product_reference": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64" }, "product_reference": "buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64" }, "product_reference": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le" }, "product_reference": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x" }, "product_reference": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64" }, "product_reference": "buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64" }, "product_reference": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le" }, "product_reference": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x" }, "product_reference": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64" }, "product_reference": "buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch" }, "product_reference": "cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src" }, "product_reference": "cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64" }, "product_reference": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le" }, "product_reference": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x" }, "product_reference": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src" }, "product_reference": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64" }, "product_reference": "conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch" }, "product_reference": "container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src" }, "product_reference": "container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64" }, "product_reference": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src" }, "product_reference": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64" }, "product_reference": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le" }, "product_reference": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x" }, "product_reference": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64" }, "product_reference": "containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64" }, "product_reference": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le" }, "product_reference": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x" }, "product_reference": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64" }, "product_reference": "crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64" }, "product_reference": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le" }, "product_reference": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x" }, "product_reference": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src" }, "product_reference": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64" }, "product_reference": "criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64" }, "product_reference": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le" }, "product_reference": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x" }, "product_reference": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64" }, "product_reference": "criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64" }, "product_reference": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le" }, "product_reference": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x" }, "product_reference": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64" }, "product_reference": "criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64" }, "product_reference": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le" }, "product_reference": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x" }, "product_reference": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src" }, "product_reference": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64" }, "product_reference": "fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64" }, "product_reference": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le" }, "product_reference": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x" }, "product_reference": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src" }, "product_reference": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64" }, "product_reference": "podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64" }, "product_reference": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le" }, "product_reference": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x" }, "product_reference": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64" }, "product_reference": "podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64" }, "product_reference": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le" }, "product_reference": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x" }, "product_reference": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64" }, "product_reference": "podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch" }, "product_reference": "podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64" }, "product_reference": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le" }, "product_reference": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x" }, "product_reference": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64" }, "product_reference": "podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64" }, "product_reference": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le" }, "product_reference": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x" }, "product_reference": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64" }, "product_reference": "podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64" }, "product_reference": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le" }, "product_reference": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x" }, "product_reference": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64" }, "product_reference": "podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch" }, "product_reference": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src" }, "product_reference": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64" }, "product_reference": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le" }, "product_reference": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x" }, "product_reference": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64" }, "product_reference": "python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64" }, "product_reference": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le" }, "product_reference": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x" }, "product_reference": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src" }, "product_reference": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64" }, "product_reference": "runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64" }, "product_reference": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64" }, "product_reference": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le" }, "product_reference": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x" }, "product_reference": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src" }, "product_reference": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64" }, "product_reference": "skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64" }, "product_reference": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le" }, "product_reference": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x" }, "product_reference": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64" }, "product_reference": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le" }, "product_reference": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x" }, "product_reference": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64" }, "product_reference": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le" }, "product_reference": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x" }, "product_reference": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64" }, "product_reference": "skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64" }, "product_reference": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le" }, "product_reference": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x" }, "product_reference": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src" }, "product_reference": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64" }, "product_reference": "slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x" }, "product_reference": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64" }, "product_reference": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x" }, "product_reference": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64 as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64" }, "product_reference": "slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch" }, "product_reference": "toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src" }, "product_reference": "toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch" }, "product_reference": "udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src as a component of container-tools:rhel8:8020020200324071414:0d58ad57 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src" }, "product_reference": "udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src", "relates_to_product_reference": "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19921", "cwe": { "id": "CWE-41", "name": "Improper Resolution of Path Equivalence" }, "discovery_date": "2020-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796107" } ], "notes": [ { "category": "description", "text": "A flaw was found in runc. An attacker who controls the container image for two containers that share a volume can race volume mounts during container initialization, by adding a symlink to the rootfs that points to a directory on the volume. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat OpenStack Platform, because runc is not directly used by the director-operator, no update will be provided at this time for the operator containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19921" }, { "category": "external", "summary": "RHBZ#1796107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796107" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19921", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19921" } ], "release_date": "2019-12-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T16:11:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1650" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation" }, { "acknowledgments": [ { "names": [ "Oleg Bulatov" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1702", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1792796" } ], "notes": [ { "category": "description", "text": "A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image.", "title": "Vulnerability description" }, { "category": "summary", "text": "containers/image: Container images read entire image manifest into memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1702" }, { "category": "external", "summary": "RHBZ#1792796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1702", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1702" } ], "release_date": "2020-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T16:11:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1650" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "containers/image: Container images read entire image manifest into memory" }, { "acknowledgments": [ { "names": [ "Tristan De Cacqueray" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1726", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2020-02-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801152" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created", "title": "Vulnerability summary" }, { "category": "other", "text": "Podman versions earlier than 1.6.0 are not affected. That includes the podman versions in OCP 4.2 and earlier.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1726" }, { "category": "external", "summary": "RHBZ#1801152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801152" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1726", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1726" } ], "release_date": "2020-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T16:11:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1650" }, { "category": "workaround", "details": "If a volume needs to be attached as read-only to an untrusted container or container image, first attach it to a trusted container. Using the volume for the first time will make the attack impossible for other containers that are going to use the volume.", "product_ids": [ "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-debugsource-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:buildah-tests-debuginfo-0:1.11.6-7.module+el8.2.0+5856+b8046c6d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:cockpit-podman-0:12-1.module+el8.2.0+5950+6d183a6a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:conmon-2:2.0.6-1.module+el8.2.0+5182+3136e5d4.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:container-selinux-2:2.124.0-1.module+el8.2.0+5182+3136e5d4.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debuginfo-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containernetworking-plugins-debugsource-0:0.8.3-5.module+el8.2.0+5201+6b31f0d9.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:containers-common-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:crit-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debuginfo-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:criu-debugsource-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debuginfo-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:fuse-overlayfs-debugsource-0:0.7.2-5.module+el8.2.0+6060+9dbc027d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-debugsource-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-docker-0:1.6.4-10.module+el8.2.0+6063+e761893a.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-remote-debuginfo-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:podman-tests-0:1.6.4-10.module+el8.2.0+6063+e761893a.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:python3-criu-0:3.12-9.module+el8.2.0+5029+3ac48e7d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debuginfo-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:runc-debugsource-0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debuginfo-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-debugsource-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:skopeo-tests-1:0.1.40-10.module+el8.2.0+5955+6cd70ceb.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debuginfo-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.aarch64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.ppc64le", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.s390x", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:slirp4netns-debugsource-0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d.x86_64", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:toolbox-0:0.0.7-1.module+el8.2.0+6096+9c3f08f3.src", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.noarch", "AppStream-8.2.0.GA:container-tools:rhel8:8020020200324071414:0d58ad57:udica-0:0.2.1-2.module+el8.2.0+4896+8f613c81.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created" } ] }
wid-sec-w-2022-1089
Vulnerability from csaf_certbund
Published
2020-03-10 23:00
Modified
2025-04-29 22:00
Summary
Red Hat OpenShift Container Platform: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Red Hat OpenShift Container Platform bietet Unternehmen die Möglichkeit der Steuerung ihrer Kubernetes Umgebungen.
Angriff
Ein lokaler oder entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift Container Platform ausnutzen, um seine Privilegien zu erhöhen, Code zur Ausführung zu bringen oder Dateien zu manipulieren
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Red Hat OpenShift Container Platform bietet Unternehmen die M\u00f6glichkeit der Steuerung ihrer Kubernetes Umgebungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler oder entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift Container Platform ausnutzen, um seine Privilegien zu erh\u00f6hen, Code zur Ausf\u00fchrung zu bringen oder Dateien zu manipulieren", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1089 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-1089.json" }, { "category": "self", "summary": "WID-SEC-2022-1089 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1089" }, { "category": "external", "summary": "RedHat Security Advisory vom 2020-03-10", "url": "https://access.redhat.com/errata/RHSA-2020:0688" }, { "category": "external", "summary": "RedHat Security Advisory vom 2020-03-10", "url": "https://access.redhat.com/errata/RHSA-2020:0689" }, { "category": "external", "summary": "RedHat Security Advisory vom 2020-03-10", "url": "https://access.redhat.com/errata/RHSA-2020:0680" }, { "category": "external", "summary": "RedHat Security Advisory vom 2020-03-10", "url": "https://access.redhat.com/errata/RHSA-2020:0679" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0697 vom 2020-03-12", "url": "https://access.redhat.com/errata/RHSA-2020:0697" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0695 vom 2020-03-12", "url": "https://access.redhat.com/errata/RHSA-2020:0695" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0942 vom 2020-03-23", "url": "https://access.redhat.com/errata/RHSA-2020:0942" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0863 vom 2020-03-24", "url": "https://access.redhat.com/errata/RHSA-2020:0863" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0928 vom 2020-03-24", "url": "https://access.redhat.com/errata/RHSA-2020:0928" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1230 vom 2020-04-01", "url": "https://access.redhat.com/errata/RHSA-2020:1230" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1234 vom 2020-04-01", "url": "https://access.redhat.com/errata/RHSA-2020:1234" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1231 vom 2020-04-01", "url": "https://access.redhat.com/errata/RHSA-2020:1231" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0934 vom 2020-04-01", "url": "https://access.redhat.com/errata/RHSA-2020:0934" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:0944-1 vom 2020-04-08", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200944-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1402 vom 2020-04-14", "url": "https://access.redhat.com/errata/RHSA-2020:1402" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1485 vom 2020-04-20", "url": "https://access.redhat.com/errata/RHSA-2020:1485" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1650 vom 2020-04-28", "url": "https://access.redhat.com/errata/RHSA-2020:1650" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1940 vom 2020-05-04", "url": "https://access.redhat.com/errata/RHSA-2020:1940" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1937 vom 2020-05-04", "url": "https://access.redhat.com/errata/RHSA-2020:1937" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2117 vom 2020-05-12", "url": "https://access.redhat.com/errata/RHSA-2020:2117" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-1932 vom 2020-05-13", "url": "https://oss.oracle.com/pipermail/el-errata/2020-May/009917.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2027 vom 2020-05-13", "url": "https://access.redhat.com/errata/RHSA-2020:2027" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2413 vom 2020-07-13", "url": "https://access.redhat.com/errata/RHSA-2020:2413" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2020-AEEA04CD13 vom 2020-07-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2020-aeea04cd13" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2927 vom 2020-07-21", "url": "https://access.redhat.com/errata/RHSA-2020:2927" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2992 vom 2020-07-27", "url": "https://access.redhat.com/errata/RHSA-2020:2992" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3167 vom 2020-07-28", "url": "https://access.redhat.com/errata/RHSA-2020:3167" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1458-1 vom 2021-04-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" }, { "category": "external", "summary": "Amazon Linux 2 Security Advisory", "url": "https://alas.aws.amazon.com/AL2/ALASDOCKER-2021-009.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6119 vom 2022-08-22", "url": "https://access.redhat.com/errata/RHSA-2022:6119" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2003-1 vom 2023-04-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014583.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4093 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4093" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30", "url": "https://access.redhat.com/errata/RHSA-2023:5006" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASECS-2025-064 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASECS-2025-064.html" } ], "source_lang": "en-US", "title": "Red Hat OpenShift Container Platform: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-04-29T22:00:00.000+00:00", "generator": { "date": "2025-04-30T08:55:02.818+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2022-1089", "initial_release_date": "2020-03-10T23:00:00.000+00:00", "revision_history": [ { "date": "2020-03-10T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-03-12T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-03-15T23:00:00.000+00:00", "number": "3", "summary": "Referenz(en) aufgenommen: GLSA/202003-21" }, { "date": "2020-03-23T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-03-24T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-03-31T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-04-01T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-04-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-04-14T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-04-20T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-04-28T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-05-03T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-05-12T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-05-13T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2020-07-13T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-15T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2020-07-20T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-27T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-05-02T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-08T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-22T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-04-25T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-20T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-01T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "25" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "Container Platform \u003c4.14.0", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.0", "product_id": "T031839" } }, { "category": "product_version", "name": "Container Platform 4.14.0", "product": { "name": "Red Hat OpenShift Container Platform 4.14.0", "product_id": "T031839-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0" } } } ], "category": "product_name", "name": "OpenShift" }, { "branches": [ { "category": "product_version_range", "name": "\u003c4.3.5", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.3.5", "product_id": "T016069" } }, { "category": "product_version", "name": "4.3.5", "product": { "name": "Red Hat OpenShift Container Platform 4.3.5", "product_id": "T016069-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_container_platform:4.3.5" } } }, { "category": "product_version_range", "name": "\u003c4.2.22", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.2.22", "product_id": "T016070" } }, { "category": "product_version", "name": "4.2.22", "product": { "name": "Red Hat OpenShift Container Platform 4.2.22", "product_id": "T016070-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_container_platform:4.2.22" } } } ], "category": "product_name", "name": "OpenShift Container Platform" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19921", "product_status": { "known_affected": [ "T002207", "67646", "T016070", "398363", "T004914", "T031839", "T016069" ] }, "release_date": "2020-03-10T23:00:00.000+00:00", "title": "CVE-2019-19921" }, { "cve": "CVE-2020-1726", "product_status": { "known_affected": [ "T002207", "67646", "T016070", "398363", "T004914", "T031839", "T016069" ] }, "release_date": "2020-03-10T23:00:00.000+00:00", "title": "CVE-2020-1726" }, { "cve": "CVE-2020-8945", "product_status": { "known_affected": [ "T002207", "67646", "T016070", "398363", "T004914", "T031839", "T016069" ] }, "release_date": "2020-03-10T23:00:00.000+00:00", "title": "CVE-2020-8945" } ] }
gsd-2020-1726
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-1726", "description": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.", "id": "GSD-2020-1726", "references": [ "https://www.suse.com/security/cve/CVE-2020-1726.html", "https://access.redhat.com/errata/RHSA-2020:1650", "https://access.redhat.com/errata/RHSA-2020:0680", "https://linux.oracle.com/cve/CVE-2020-1726.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-1726" ], "details": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.", "id": "GSD-2020-1726", "modified": "2023-12-13T01:21:57.908986Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-1726", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "podman", "version": { "version_data": [ { "version_affected": "=", "version_value": "from 1.6.0 onwards" } ] } } ] }, "vendor_name": "The " } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0." } ] }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-552", "lang": "eng", "value": "CWE-552" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html" }, { "name": "https://access.redhat.com/errata/RHSA-2020:0680", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2020:0680" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=v1.6.0 \u003cv2.0.6", "affected_versions": "All versions starting from 1.6.0 before 2.0.6", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-552", "CWE-937" ], "date": "2023-02-08", "description": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.", "fixed_versions": [ "v2.0.6" ], "identifier": "CVE-2020-1726", "identifiers": [ "GHSA-vmhj-p9hw-vgrf", "CVE-2020-1726" ], "not_impacted": "All versions before 1.6.0, all versions starting from 2.0.6", "package_slug": "go/github.com/containers/podman", "pubdate": "2022-05-24", "solution": "Upgrade to version 2.0.6 or above.", "title": "Files or Directories Accessible to External Parties", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1726", "https://access.redhat.com/errata/RHSA-2020:0680", "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726", "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html", "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html", "https://access.redhat.com/errata/RHSA-2020:1650", "https://access.redhat.com/security/cve/CVE-2020-1726", "https://bugzilla.redhat.com/show_bug.cgi?id=1801152", "https://github.com/advisories/GHSA-vmhj-p9hw-vgrf" ], "uuid": "0503a2b4-28db-4025-bb12-f64f363a1c07", "versions": [ { "commit": { "sha": "3f030e15ad337455deff9a3f74d2a3d2f570f309", "tags": [ "v1.6.0" ], "timestamp": "20190930230229" }, "number": "v1.6.0" }, { "commit": { "sha": "6d993c126c5b4c1da09e8f17ac4ffd3e95a0e3fc", "tags": [ "v2.0.6" ], "timestamp": "20200901152744" }, "number": "v2.0.6" } ] }, { "affected_range": "\u003cv2.0.6", "affected_versions": "All versions before 2.0.6", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-552", "CWE-937" ], "date": "2023-02-08", "description": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.", "fixed_versions": [ "v2.0.6" ], "identifier": "CVE-2020-1726", "identifiers": [ "GHSA-vmhj-p9hw-vgrf", "CVE-2020-1726" ], "not_impacted": "All versions starting from 2.0.6", "package_slug": "go/github.com/containers/podman/v2", "pubdate": "2022-05-24", "solution": "Upgrade to version 2.0.6 or above.", "title": "Files or Directories Accessible to External Parties", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1726", "https://access.redhat.com/errata/RHSA-2020:0680", "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726", "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html", "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html", "https://access.redhat.com/errata/RHSA-2020:1650", "https://access.redhat.com/security/cve/CVE-2020-1726", "https://bugzilla.redhat.com/show_bug.cgi?id=1801152", "https://github.com/advisories/GHSA-vmhj-p9hw-vgrf" ], "uuid": "e36c6601-e1a0-42e4-8d14-db47aa07df75", "versions": [ { "commit": { "sha": "6d993c126c5b4c1da09e8f17ac4ffd3e95a0e3fc", "tags": [ "v2.0.6" ], "timestamp": "20200901152744" }, "number": "v2.0.6" } ] } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libpod_project:libpod:1.6.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-1726" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-552" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726" }, { "name": "RHSA-2020:0680", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2020:0680" }, { "name": "openSUSE-SU-2020:1552", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html" }, { "name": "openSUSE-SU-2020:1559", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6 } }, "lastModifiedDate": "2023-02-12T23:40Z", "publishedDate": "2020-02-11T20:15Z" } } }
suse-su-2020:2731-1
Vulnerability from csaf_suse
Published
2020-09-24 05:42
Modified
2020-09-24 05:42
Summary
Security update for conmon, fuse-overlayfs, libcontainers-common, podman
Notes
Title of the patch
Security update for conmon, fuse-overlayfs, libcontainers-common, podman
Description of the patch
This update for conmon, fuse-overlayfs, libcontainers-common, podman fixes the following issues:
podman was updated to v2.0.6 (bsc#1175821)
- install missing systemd units for the new Rest API (bsc#1175957)
and a few man-pages that where missing before
- Drop varlink API related bits (in favor of the new API)
- fix install location for zsh completions
* Fixed a bug where running systemd in a container on a cgroups v1 system would fail.
* Fixed a bug where /etc/passwd could be re-created every time a container
is restarted if the container's /etc/passwd did not contain an entry
for the user the container was started as.
* Fixed a bug where containers without an /etc/passwd file specifying
a non-root user would not start.
* Fixed a bug where the --remote flag would sometimes not make
remote connections and would instead attempt to run Podman locally.
Update to v2.0.6:
* Features
- Rootless Podman will now add an entry to /etc/passwd for the user who ran Podman if run with --userns=keep-id.
- The podman system connection command has been reworked to support multiple connections, and reenabled for use!
- Podman now has a new global flag, --connection, to specify a connection to a remote Podman API instance.
* Changes
- Podman's automatic systemd integration (activated by the --systemd=true flag, set by default) will now activate for containers using /usr/local/sbin/init as their command, instead of just /usr/sbin/init and /sbin/init (and any path ending in systemd).
- Seccomp profiles specified by the --security-opt seccomp=... flag to podman create and podman run will now be honored even if the container was created using --privileged.
* Bugfixes
- Fixed a bug where the podman play kube would not honor the hostIP field for port forwarding (#5964).
- Fixed a bug where the podman generate systemd command would panic on an invalid restart policy being specified (#7271).
- Fixed a bug where the podman images command could take a very long time (several minutes) to complete when a large number of images were present.
- Fixed a bug where the podman logs command with the --tail flag would not work properly when a large amount of output would be printed ((#7230)[https://github.com//issues/7230]).
- Fixed a bug where the podman exec command with remote Podman would not return a non-zero exit code when the exec session failed to start (e.g. invoking a non-existent command) (#6893).
- Fixed a bug where the podman load command with remote Podman would did not honor user-specified tags (#7124).
- Fixed a bug where the podman system service command, when run as a non-root user by Systemd, did not properly handle the Podman pause process and would not restart properly as a result (#7180).
- Fixed a bug where the --publish flag to podman create, podman run, and podman pod create did not properly handle a host IP of 0.0.0.0 (attempting to bind to literal 0.0.0.0, instead of all IPs on the system) (#7104).
- Fixed a bug where the podman start --attach command would not print the container's exit code when the command exited due to the container exiting.
- Fixed a bug where the podman rm command with remote Podman would not remove volumes, even if the --volumes flag was specified (#7128).
- Fixed a bug where the podman run command with remote Podman and the --rm flag could exit before the container was fully removed.
- Fixed a bug where the --pod new:... flag to podman run and podman create would create a pod that did not share any namespaces.
- Fixed a bug where the --preserve-fds flag to podman run and podman exec could close the wrong file descriptors while trying to close user-provided descriptors after passing them into the container.
- Fixed a bug where default environment variables ($PATH and $TERM) were not set in containers when not provided by the image.
- Fixed a bug where pod infra containers were not properly unmounted after exiting.
- Fixed a bug where networks created with podman network create with an IPv6 subnet did not properly set an IPv6 default route.
- Fixed a bug where the podman save command would not work properly when its output was piped to another command (#7017).
- Fixed a bug where containers using a systemd init on a cgroups v1 system could leak mounts under /sys/fs/cgroup/systemd to the host.
- Fixed a bug where podman build would not generate an event on completion (#7022).
- Fixed a bug where the podman history command with remote Podman printed incorrect creation times for layers (#7122).
- Fixed a bug where Podman would not create working directories specified by the container image if they did not exist.
- Fixed a bug where Podman did not clear CMD from the container image if the user overrode ENTRYPOINT (#7115).
- Fixed a bug where error parsing image names were not fully reported (part of the error message containing the exact issue was dropped).
- Fixed a bug where the podman images command with remote Podman did not support printing image tags in Go templates supplied to the --format flag (#7123).
- Fixed a bug where the podman rmi --force command would not attempt to unmount containers it was removing, which could cause a failure to remove the image.
- Fixed a bug where the podman generate systemd --new command could incorrectly quote arguments to Podman that contained whitespace, leading to nonfunctional unit files (#7285).
- Fixed a bug where the podman version command did not properly include build time and Git commit.
- Fixed a bug where running systemd in a Podman container on a system that did not use the systemd cgroup manager would fail (#6734).
- Fixed a bug where capabilities from --cap-add were not properly added when a container was started as a non-root user via --user.
- Fixed a bug where Pod infra containers were not properly cleaned up when they stopped, causing networking issues (#7103).
* API
- Fixed a bug where the libpod and compat Build endpoints did not accept the application/tar content type (instead only accepting application/x-tar) (#7185).
- Fixed a bug where the libpod Exists endpoint would attempt to write a second header in some error conditions (#7197).
- Fixed a bug where compat and libpod Network Inspect and Network Remove endpoints would return a 500 instead of 404 when the requested network was not found.
- Added a versioned _ping endpoint (e.g. http://localhost/v1.40/_ping).
- Fixed a bug where containers started through a systemd-managed instance of the REST API would be shut down when podman system service shut down due to its idle timeout (#7294).
- Added stronger parameter verification for the libpod Network Create endpoint to ensure subnet mask is a valid value.
- The Pod URL parameter to the Libpod Container List endpoint has been deprecated; the information previously gated by the Pod boolean will now be included in the response unconditionally.
- Change hard requires for AppArmor to Recommends. They are not
needed for runtime or with SELinux but already installed if
AppArmor is used [jsc#SMO-15]
- Add BuildRequires for pkg-config(libselinux) to build with
SELinux support [jsc#SMO-15]
Update to v2.0.4
* Fixed a bug where the output of podman image search did not
populate the Description field as it was mistakenly assigned to
the ID field.
* Fixed a bug where podman build - and podman build on an HTTP
target would fail.
* Fixed a bug where rootless Podman would improperly chown the
copied-up contents of anonymous volumes (#7130).
* Fixed a bug where Podman would sometimes HTML-escape special
characters in its CLI output.
* Fixed a bug where the podman start --attach --interactive
command would print the container ID of the container attached
to when exiting (#7068).
* Fixed a bug where podman run --ipc=host --pid=host would only
set --pid=host and not --ipc=host (#7100).
* Fixed a bug where the --publish argument to podman run, podman
create and podman pod create would not allow binding the same
container port to more than one host port (#7062).
* Fixed a bug where incorrect arguments to podman images --format
could cause Podman to segfault.
* Fixed a bug where podman rmi --force on an image ID with more
than one name and at least one container using the image would
not completely remove containers using the image (#7153).
* Fixed a bug where memory usage in bytes and memory use
percentage were swapped in the output of podman stats
--format=json.
* Fixed a bug where the libpod and compat events endpoints would
fail if no filters were specified (#7078).
* Fixed a bug where the CgroupVersion field in responses from the
compat Info endpoint was prefixed by 'v' (instead of just being
'1' or '2', as is documented).
- Suggest katacontainers instead of recommending it. It's not
enabled by default, so it's just bloat
Update to v2.0.3
* Fix handling of entrypoint
* log API: add context to allow for cancelling
* fix API: Create container with an invalid configuration
* Remove all instances of named return 'err' from Libpod
* Fix: Correct connection counters for hijacked connections
* Fix: Hijacking v2 endpoints to follow rfc 7230 semantics
* Remove hijacked connections from active connections list
* version/info: format: allow more json variants
* Correctly print STDOUT on non-terminal remote exec
* Fix container and pod create commands for remote create
* Mask out /sys/dev to prevent information leak from the host
* Ensure sig-proxy default is propagated in start
* Add SystemdMode to inspect for containers
* When determining systemd mode, use full command
* Fix lint
* Populate remaining unused fields in `pod inspect`
* Include infra container information in `pod inspect`
* play-kube: add suport for 'IfNotPresent' pull type
* docs: user namespace can't be shared in pods
* Fix 'Error: unrecognized protocol \'TCP\' in port mapping'
* Error on rootless mac and ip addresses
* Fix & add notes regarding problematic language in codebase
* abi: set default umask and rlimits
* Used reference package with errors for parsing tag
* fix: system df error when an image has no name
* Fix Generate API title/description
* Add noop function disable-content-trust
* fix play kube doesn't override dockerfile ENTRYPOINT
* Support default profile for apparmor
* Bump github.com/containers/common to v0.14.6
* events endpoint: backwards compat to old type
* events endpoint: fix panic and race condition
* Switch references from libpod.conf to containers.conf
* podman.service: set type to simple
* podman.service: set doc to podman-system-service
* podman.service: use default registries.conf
* podman.service: use default killmode
* podman.service: remove stop timeout
* systemd: symlink user->system
* vendor golang.org/x/text@v0.3.3
* Fix a bug where --pids-limit was parsed incorrectly
* search: allow wildcards
* [CI:DOCS]Do not copy policy.json into gating image
* Fix systemd pid 1 test
* Cirrus: Rotate keys post repo. rename
* The libpod.conf(5) man page got removed and all references are
now pointing towards containers.conf(5), which will be part
of the libcontainers-common package.
Update to podman v2.0.2
* fix race condition in `libpod.GetEvents(...)`
* Fix bug where `podman mount` didn't error as rootless
* remove podman system connection
* Fix imports to ensure v2 is used with libpod
* Update release notes for v2.0.2
* specgen: fix order for setting rlimits
* Ensure umask is set appropriately for 'system service'
* generate systemd: improve pod-flags filter
* Fix a bug with APIv2 compat network remove to log an ErrNetworkNotFound instead of nil
* Fixes --remote flag issues
* Pids-limit should only be set if the user set it
* Set console mode for windows
* Allow empty host port in --publish flag
* Add a note on the APIs supported by `system service`
* fix: Don't override entrypoint if it's `nil`
* Set TMPDIR to /var/tmp by default if not set
* test: add tests for --user and volumes
* container: move volume chown after spec generation
* libpod: volume copyup honors namespace mappings
* Fix `system service` panic from early hangup in events
* stop podman service in e2e tests
* Print errors from individual containers in pods
* auto-update: clarify systemd-unit requirements
* podman ps truncate the command
* move go module to v2
* Vendor containers/common v0.14.4
* Bump to imagebuilder v1.1.6 on v2 branch
* Account for non-default port number in image name
- Changes since v2.0.1
* Update release notes with further v2.0.1 changes
* Fix inspect to display multiple label: changes
* Set syslog for exit commands on log-level=debug
* Friendly amendment for pr 6751
* podman run/create: support all transports
* systemd generate: allow manual restart of container units in pods
* Revert sending --remote flag to containers
* Print port mappings in `ps` for ctrs sharing network
* vendor github.com/containers/common@v0.14.3
* Update release notes for v2.0.1
* utils: drop default mapping when running uid!=0
* Set stop signal to 15 when not explicitly set
* podman untag: error if tag doesn't exist
* Reformat inspect network settings
* APIv2: Return `StatusCreated` from volume creation
* APIv2:fix: Remove `/json` from compat network EPs
* Fix ssh-agent support
* libpod: specify mappings to the storage
* APIv2:doc: Fix swagger doc to refer to volumes
* Add podman network to bash command completions
* Fix typo in manpage for `podman auto update`.
* Add JSON output field for ps
* V2 podman system connection
* image load: no args required
* Re-add PODMAN_USERNS environment variable
* Fix conflicts between privileged and other flags
* Bump required go version to 1.13
* Add explicit command to alpine container in test case.
* Use POLL_DURATION for timer
* Stop following logs using timers
* 'pod' was being truncated to 'po' in the names of the generated systemd unit files.
* rootless_linux: improve error message
* Fix podman build handling of --http-proxy flag
* correct the absolute path of `rm` executable
* Makefile: allow customizable GO_BUILD
* Cirrus: Change DEST_BRANCH to v2.0
Update to podman v2.0.0
* The `podman generate systemd` command now supports the `--new`
flag when used with pods, allowing portable services for pods
to be created.
* The `podman play kube` command now supports running Kubernetes
Deployment YAML.
* The `podman exec` command now supports the `--detach` flag to
run commands in the container in the background.
* The `-p` flag to `podman run` and `podman create` now supports
forwarding ports to IPv6 addresses.
* The `podman run`, `podman create` and `podman pod create`
command now support a `--replace` flag to remove and replace any
existing container (or, for `pod create`, pod) with the same name
* The `--restart-policy` flag to `podman run` and `podman create`
now supports the `unless-stopped` restart policy.
* The `--log-driver` flag to `podman run` and `podman create`
now supports the `none` driver, which does not log the
container's output.
* The `--mount` flag to `podman run` and `podman create` now
accepts `readonly` option as an alias to `ro`.
* The `podman generate systemd` command now supports the `--container-prefix`,
`--pod-prefix`, and `--separator` arguments to control the
name of generated unit files.
* The `podman network ls` command now supports the `--filter`
flag to filter results.
* The `podman auto-update` command now supports specifying an
authfile to use when pulling new images on a per-container
basis using the `io.containers.autoupdate.authfile` label.
* Fixed a bug where the `podman exec` command would log to journald
when run in containers loggined to journald
([#6555](https://github.com/containers/libpod/issues/6555)).
* Fixed a bug where the `podman auto-update` command would not
preserve the OS and architecture of the original image when
pulling a replacement
([#6613](https://github.com/containers/libpod/issues/6613)).
* Fixed a bug where the `podman cp` command could create an extra
`merged` directory when copying into an existing directory
([#6596](https://github.com/containers/libpod/issues/6596)).
* Fixed a bug where the `podman pod stats` command would crash
on pods run with `--network=host`
([#5652](https://github.com/containers/libpod/issues/5652)).
* Fixed a bug where containers logs written to journald did not
include the name of the container.
* Fixed a bug where the `podman network inspect` and
`podman network rm` commands did not properly handle non-default
CNI configuration paths ([#6212](https://github.com/containers/libpod/issues/6212)).
* Fixed a bug where Podman did not properly remove containers
when using the Kata containers OCI runtime.
* Fixed a bug where `podman inspect` would sometimes incorrectly
report the network mode of containers started with `--net=none`.
* Podman is now better able to deal with cases where `conmon`
is killed before the container it is monitoring.
Update to podman v1.9.3:
* Fixed a bug where, on FIPS enabled hosts, FIPS mode secrets
were not properly mounted into containers
* Fixed a bug where builds run over Varlink would hang
* Fixed a bug where podman save would fail when the target
image was specified by digest
* Fixed a bug where rootless containers with ports forwarded to them
could panic and dump core due to a concurrency issue (#6018)
* Fixed a bug where rootless Podman could race when opening the
rootless user namespace, resulting in commands failing to run
* Fixed a bug where HTTP proxy environment variables forwarded into
the container by the --http-proxy flag could not be overridden by --env or --env-file
* Fixed a bug where rootless Podman was setting resource limits on cgroups
v2 systems that were not using systemd-managed cgroups
(and thus did not support resource limits), resulting in containers failing to start
Update podman to v1.9.1:
* Bugfixes
- Fixed a bug where healthchecks could become nonfunctional if
container log paths were manually set with --log-path and
multiple container logs were placed in the same directory
- Fixed a bug where rootless Podman could, when using an older
libpod.conf, print numerous warning messages about an invalid
CGroup manager config
- Fixed a bug where rootless Podman would sometimes fail to
close the rootless user namespace when joining it
Update podman to v1.9.0:
* Features
- Experimental support has been added for podman run
--userns=auto, which automatically allocates a unique UID and
GID range for the new container's user namespace
- The podman play kube command now has a --network flag to
place the created pod in one or more CNI networks
- The podman commit command now supports an --iidfile flag to
write the ID of the committed image to a file
- Initial support for the new containers.conf configuration
file has been added. containers.conf allows for much more
detailed configuration of some Podman functionality
* Changes
- There has been a major cleanup of the podman info command
resulting in breaking changes. Many fields have been renamed
to better suit usage with APIv2
- All uses of the --timeout flag have been switched to prefer
the alternative --time. The --timeout flag will continue to
work, but man pages and --help will use the --time flag
instead
* Bugfixes
- Fixed a bug where some volume mounts from the host would
sometimes not properly determine the flags they should use
when mounting
- Fixed a bug where Podman was not propagating $PATH to Conmon
and the OCI runtime, causing issues for some OCI runtimes
that required it
- Fixed a bug where rootless Podman would print error messages
about missing support for systemd cgroups when run in a
container with no cgroup support
- Fixed a bug where podman play kube would not properly handle
container-only port mappings (#5610)
- Fixed a bug where the podman container prune command was not
pruning containers in the created and configured states
- Fixed a bug where Podman was not properly removing CNI IP
address allocations after a reboot (#5433)
- Fixed a bug where Podman was not properly applying the
default Seccomp profile when --security-opt was not given at
the command line
* HTTP API
- Many Libpod API endpoints have been added, including Changes,
Checkpoint, Init, and Restore
- Resolved issues where the podman system service command would
time out and exit while there were still active connections
- Stability overall has greatly improved as we prepare the API
for a beta release soon with Podman 2.0
* Misc
- The default infra image for pods has been upgraded to
k8s.gcr.io/pause:3.2 (from 3.1) to address a bug in the
architecture metadata for non-AMD64 images
- The slirp4netns networking utility in rootless Podman now
uses Seccomp filtering where available for improved security
- Updated Buildah to v1.14.8
- Updated containers/storage to v1.18.2
- Updated containers/image to v5.4.3
- Updated containers/common to v0.8.1
- Add 'systemd' BUILDFLAGS to build with support for journald
logging (bsc#1162432)
Update podman to v1.8.2:
* Features
- Initial support for automatically updating containers managed
via Systemd unit files has been merged. This allows
containers to automatically upgrade if a newer version of
their image becomes available
* Bugfixes
- Fixed a bug where unit files generated by podman generate
systemd --new would not force containers to detach, causing
the unit to time out when trying to start
- Fixed a bug where podman system reset could delete important
system directories if run as rootless on installations
created by older Podman (#4831)
- Fixed a bug where image built by podman build would not
properly set the OS and Architecture they were built with
(#5503)
- Fixed a bug where attached podman run with --sig-proxy
enabled (the default), when built with Go 1.14, would
repeatedly send signal 23 to the process in the container and
could generate errors when the container stopped (#5483)
- Fixed a bug where rootless podman run commands could hang
when forwarding ports
- Fixed a bug where rootless Podman would not work when /proc
was mounted with the hidepid option set
- Fixed a bug where the podman system service command would use
large amounts of CPU when --timeout was set to 0 (#5531)
* HTTP API
- Initial support for Libpod endpoints related to creating and
operating on image manifest lists has been added
- The Libpod Healthcheck and Events API endpoints are now
supported
- The Swagger endpoint can now handle cases where no Swagger
documentation has been generated
Update podman to v1.8.1:
* Features
- Many networking-related flags have been added to podman pod
create to enable customization of pod networks, including
--add-host, --dns, --dns-opt, --dns-search, --ip,
--mac-address, --network, and --no-hosts
- The podman ps --format=json command now includes the ID of
the image containers were created with
- The podman run and podman create commands now feature an
--rmi flag to remove the image the container was using after
it exits (if no other containers are using said image)
([#4628](https://github.com/containers/libpod/issues/4628))
- The podman create and podman run commands now support the
--device-cgroup-rule flag (#4876)
- While the HTTP API remains in alpha, many fixes and additions
have landed. These are documented in a separate subsection
below
- The podman create and podman run commands now feature a
--no-healthcheck flag to disable healthchecks for a container
(#5299)
- Containers now recognize the io.containers.capabilities
label, which specifies a list of capabilities required by the
image to run. These capabilities will be used as long as they
are more restrictive than the default capabilities used
- YAML produced by the podman generate kube command now
includes SELinux configuration passed into the container via
--security-opt label=... (#4950)
* Bugfixes
- Fixed CVE-2020-1726, a security issue where volumes manually
populated before first being mounted into a container could
have those contents overwritten on first being mounted into a
container
- Fixed a bug where Podman containers with user namespaces in
CNI networks with the DNS plugin enabled would not have the
DNS plugin's nameserver added to their resolv.conf
([#5256](https://github.com/containers/libpod/issues/5256))
- Fixed a bug where trailing / characters in image volume
definitions could cause them to not be overridden by a
user-specified mount at the same location
([#5219](https://github.com/containers/libpod/issues/5219))
- Fixed a bug where the label option in libpod.conf, used to
disable SELinux by default, was not being respected (#5087)
- Fixed a bug where the podman login and podman logout commands
required the registry to log into be specified (#5146)
- Fixed a bug where detached rootless Podman containers could
not forward ports (#5167)
- Fixed a bug where rootless Podman could fail to run if the
pause process had died
- Fixed a bug where Podman ignored labels that were specified
with only a key and no value (#3854)
- Fixed a bug where Podman would fail to create named volumes
when the backing filesystem did not support SELinux labelling
(#5200)
- Fixed a bug where --detach-keys='' would not disable
detaching from a container (#5166)
- Fixed a bug where the podman ps command was too aggressive
when filtering containers and would force --all on in too
many situations
- Fixed a bug where the podman play kube command was ignoring
image configuration, including volumes, working directory,
labels, and stop signal (#5174)
- Fixed a bug where the Created and CreatedTime fields in
podman images --format=json were misnamed, which also broke
Go template output for those fields
([#5110](https://github.com/containers/libpod/issues/5110))
- Fixed a bug where rootless Podman containers with ports
forwarded could hang when started (#5182)
- Fixed a bug where podman pull could fail to parse registry
names including port numbers
- Fixed a bug where Podman would incorrectly attempt to
validate image OS and architecture when starting containers
- Fixed a bug where Bash completion for podman build -f would
not list available files that could be built (#3878)
- Fixed a bug where podman commit --change would perform
incorrect validation, resulting in valid changes being
rejected (#5148)
- Fixed a bug where podman logs --tail could take large amounts
of memory when the log file for a container was large (#5131)
- Fixed a bug where Podman would sometimes incorrectly generate
firewall rules on systems using firewalld
- Fixed a bug where the podman inspect command would not
display network information for containers properly if a
container joined multiple CNI networks
([#4907](https://github.com/containers/libpod/issues/4907))
- Fixed a bug where the --uts flag to podman create and podman
run would only allow specifying containers by full ID (#5289)
- Fixed a bug where rootless Podman could segfault when passed
a large number of file descriptors
- Fixed a bug where the podman port command was incorrectly
interpreting additional arguments as container names, instead
of port numbers
- Fixed a bug where units created by podman generate systemd
did not depend on network targets, and so could start before
the system network was ready (#4130)
- Fixed a bug where exec sessions in containers which did not
specify a user would not inherit supplemental groups added to
the container via --group-add
- Fixed a bug where Podman would not respect the $TMPDIR
environment variable for placing large temporary files during
some operations (e.g. podman pull)
([#5411](https://github.com/containers/libpod/issues/5411))
* HTTP API
- Initial support for secure connections to servers via SSH
tunneling has been added
- Initial support for the libpod create and logs endpoints for
containers has been added
- Added a /swagger/ endpoint to serve API documentation
- The json endpoint for containers has received many fixes
- Filtering images and containers has been greatly improved,
with many bugs fixed and documentation improved
- Image creation endpoints (commit, pull, etc) have seen many
fixes
- Server timeout has been fixed so that long operations will no
longer trigger the timeout and shut the server down
- The stats endpoint for containers has seen major fixes and
now provides accurate output
- Handling the HTTP 304 status code has been fixed for all
endpoints
- Many fixes have been made to API documentation to ensure it
matches the code
* Misc
- The Created field to podman images --format=json has been
renamed to CreatedSince as part of the fix for (#5110). Go
templates using the old name shou ld still work
- The CreatedTime field to podman images --format=json has been
renamed to CreatedAt as part of the fix for (#5110). Go
templates using the old name should still work
- The before filter to podman images has been renamed to since
for Docker compatibility. Using before will still work, but
documentation has been changed to use the new since filter
- Using the --password flag to podman login now warns that
passwords are being passed in plaintext
- Some common cases where Podman would deadlock have been fixed
to warn the user that podman system renumber must be run to
resolve the deadlock
- Configure br_netfilter for podman automatically (bsc#1165738)
The trigger is only excuted when updating podman-cni-config while the
command was running
conmon was update to v2.0.20 (bsc#1175821)
- journald: fix logging container name
- container logging: Implement none driver - 'off', 'null' or
'none' all work.
- ctrl: warn if we fail to unlink
- Drop fsync calls
- Reap PIDs before running exit command
- Fix log path parsing
- Add --sync option to prevent conmon from double forking
- Add --no-sync-log option to instruct conmon to not sync the
logs of the containers upon shutting down. This feature fixes a
regression where we unconditionally dropped the log sync. It is
possible the container logs could be corrupted on a sudden
power-off. If you need container logs to remain in consistent
state after a sudden shutdown, please update from v2.0.19 to
v2.0.20
- Update to v2.0.17:
- Add option to delay execution of exit command
- Update to v2.0.16:
- tty: flush pending data when fd is ready
- Enable support for journald logging (bsc#1162432)
- Update to v2.0.15:
- store status while waiting for pid
- Update to v2.0.14:
- drop usage of splice(2)
- avoid hanging on stdin
- stdio: sometimes quit main loop after io is done
- ignore sigpipe
- Update to v2.0.12
- oom: fix potential race between verification steps
- Update to v2.0.11
- log: reject --log-tag with k8s-file
- chmod std files pipes
- adjust score to -1000 to prevent conmon from ever being OOM
killed
- container OOM: verify cgroup hasn't been cleaned up before
reporting OOM
- journal logging: write to /dev/null instead of -1
fuse-overlayfs was updated to 1.1.2 (bsc#1175821):
- fix memory leak when creating whiteout files.
- fix lookup for overflow uid when it is different than the overflow gid.
- use openat2(2) when available.
- accept 'ro' as mount option.
- fix set mtime for a symlink.
- fix some issues reported by static analysis.
- fix potential infinite loop on a short read.
- fix creating a directory if the destination already exists
in the upper layer.
- report correctly the number of links for a directory also for
subsequent stat calls
- stop looking up the ino in the lower layers if the file could
not be opened
- make sure the destination is deleted before doing a rename(2).
It prevents a left over directory to cause delete to fail with
EEXIST.
- honor --debug.
libcontainers-common was updated to fix:
- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)
- Added containers/common tarball for containers.conf(5) man page
- Install containers.conf default configuration in
/usr/share/containers
- libpod repository on github got renamed to podman
- Update to image 5.5.1
- Add documentation for credHelpera
- Add defaults for using the rootless policy path
- Update libpod/podman to 2.0.3
- docs: user namespace can't be shared in pods
- Switch references from libpod.conf to containers.conf
- Allow empty host port in --publish flag
- update document login see config.json as valid
- Update storage to 1.20.2
- Add back skip_mount_home
- Remove remaining difference between SLE and openSUSE package and
ship the some mounts.conf default configuration on both platforms.
As the sources for the mount point do not exist on openSUSE by
default this config will basically have no effect on openSUSE.
(jsc#SLE-12122, bsc#1175821)
- Update to image 5.4.4
- Remove registries.conf VERSION 2 references from man page
- Intial authfile man page
- Add $HOME/.config/containers/certs.d to perHostCertDirPath
- Add $HOME/.config/containers/registries.conf to config path
- registries.conf.d: add stances for the registries.conf
- update to libpod 1.9.3
- userns: support --userns=auto
- Switch to using --time as opposed to --timeout to better match Docker
- Add support for specifying CNI networks in podman play kube
- man pages: fix inconsistencies
- Update to storage 1.19.1
- userns: add support for auto
- store: change the default user to containers
- config: honor XDG_CONFIG_HOME
- Remove the /var/lib/ca-certificates/pem/SUSE.pem workaround again.
It never ended up in SLES and a different way to fix the underlying
problem is being worked on.
- Add registry.opensuse.org as default registry [bsc#1171578]
- Add /var/lib/ca-certificates/pem/SUSE.pem to the SLES mounts.
This for making container-suseconnect working in the public
cloud on-demand images. It needs that file for being able to
verify the server certificates of the RMT servers hosted
in the public cloud.
(https://github.com/SUSE/container-suseconnect/issues/41)
Patchnames
SUSE-2020-2731,SUSE-SLE-Module-Basesystem-15-SP1-2020-2731,SUSE-SLE-Module-Basesystem-15-SP2-2020-2731,SUSE-SLE-Module-Containers-15-SP1-2020-2731,SUSE-SLE-Module-Containers-15-SP2-2020-2731
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for conmon, fuse-overlayfs, libcontainers-common, podman", "title": "Title of the patch" }, { "category": "description", "text": "This update for conmon, fuse-overlayfs, libcontainers-common, podman fixes the following issues:\n\npodman was updated to v2.0.6 (bsc#1175821)\n\n- install missing systemd units for the new Rest API (bsc#1175957)\n and a few man-pages that where missing before\n- Drop varlink API related bits (in favor of the new API)\n- fix install location for zsh completions\n\n * Fixed a bug where running systemd in a container on a cgroups v1 system would fail.\n * Fixed a bug where /etc/passwd could be re-created every time a container\n is restarted if the container\u0027s /etc/passwd did not contain an entry\n for the user the container was started as.\n * Fixed a bug where containers without an /etc/passwd file specifying\n a non-root user would not start.\n * Fixed a bug where the --remote flag would sometimes not make\n remote connections and would instead attempt to run Podman locally.\n\nUpdate to v2.0.6:\n\n* Features\n\n - Rootless Podman will now add an entry to /etc/passwd for the user who ran Podman if run with --userns=keep-id.\n - The podman system connection command has been reworked to support multiple connections, and reenabled for use!\n - Podman now has a new global flag, --connection, to specify a connection to a remote Podman API instance.\n\n* Changes\n\n - Podman\u0027s automatic systemd integration (activated by the --systemd=true flag, set by default) will now activate for containers using /usr/local/sbin/init as their command, instead of just /usr/sbin/init and /sbin/init (and any path ending in systemd).\n - Seccomp profiles specified by the --security-opt seccomp=... flag to podman create and podman run will now be honored even if the container was created using --privileged.\n\n* Bugfixes\n\n - Fixed a bug where the podman play kube would not honor the hostIP field for port forwarding (#5964).\n - Fixed a bug where the podman generate systemd command would panic on an invalid restart policy being specified (#7271).\n - Fixed a bug where the podman images command could take a very long time (several minutes) to complete when a large number of images were present.\n - Fixed a bug where the podman logs command with the --tail flag would not work properly when a large amount of output would be printed ((#7230)[https://github.com//issues/7230]).\n - Fixed a bug where the podman exec command with remote Podman would not return a non-zero exit code when the exec session failed to start (e.g. invoking a non-existent command) (#6893).\n - Fixed a bug where the podman load command with remote Podman would did not honor user-specified tags (#7124).\n - Fixed a bug where the podman system service command, when run as a non-root user by Systemd, did not properly handle the Podman pause process and would not restart properly as a result (#7180).\n - Fixed a bug where the --publish flag to podman create, podman run, and podman pod create did not properly handle a host IP of 0.0.0.0 (attempting to bind to literal 0.0.0.0, instead of all IPs on the system) (#7104).\n - Fixed a bug where the podman start --attach command would not print the container\u0027s exit code when the command exited due to the container exiting.\n - Fixed a bug where the podman rm command with remote Podman would not remove volumes, even if the --volumes flag was specified (#7128).\n - Fixed a bug where the podman run command with remote Podman and the --rm flag could exit before the container was fully removed.\n - Fixed a bug where the --pod new:... flag to podman run and podman create would create a pod that did not share any namespaces.\n - Fixed a bug where the --preserve-fds flag to podman run and podman exec could close the wrong file descriptors while trying to close user-provided descriptors after passing them into the container.\n - Fixed a bug where default environment variables ($PATH and $TERM) were not set in containers when not provided by the image.\n - Fixed a bug where pod infra containers were not properly unmounted after exiting.\n - Fixed a bug where networks created with podman network create with an IPv6 subnet did not properly set an IPv6 default route.\n - Fixed a bug where the podman save command would not work properly when its output was piped to another command (#7017).\n - Fixed a bug where containers using a systemd init on a cgroups v1 system could leak mounts under /sys/fs/cgroup/systemd to the host.\n - Fixed a bug where podman build would not generate an event on completion (#7022).\n - Fixed a bug where the podman history command with remote Podman printed incorrect creation times for layers (#7122).\n - Fixed a bug where Podman would not create working directories specified by the container image if they did not exist.\n - Fixed a bug where Podman did not clear CMD from the container image if the user overrode ENTRYPOINT (#7115).\n - Fixed a bug where error parsing image names were not fully reported (part of the error message containing the exact issue was dropped).\n - Fixed a bug where the podman images command with remote Podman did not support printing image tags in Go templates supplied to the --format flag (#7123).\n - Fixed a bug where the podman rmi --force command would not attempt to unmount containers it was removing, which could cause a failure to remove the image.\n - Fixed a bug where the podman generate systemd --new command could incorrectly quote arguments to Podman that contained whitespace, leading to nonfunctional unit files (#7285).\n - Fixed a bug where the podman version command did not properly include build time and Git commit.\n - Fixed a bug where running systemd in a Podman container on a system that did not use the systemd cgroup manager would fail (#6734).\n - Fixed a bug where capabilities from --cap-add were not properly added when a container was started as a non-root user via --user.\n - Fixed a bug where Pod infra containers were not properly cleaned up when they stopped, causing networking issues (#7103).\n\n* API\n\n - Fixed a bug where the libpod and compat Build endpoints did not accept the application/tar content type (instead only accepting application/x-tar) (#7185).\n - Fixed a bug where the libpod Exists endpoint would attempt to write a second header in some error conditions (#7197).\n - Fixed a bug where compat and libpod Network Inspect and Network Remove endpoints would return a 500 instead of 404 when the requested network was not found.\n - Added a versioned _ping endpoint (e.g. http://localhost/v1.40/_ping).\n - Fixed a bug where containers started through a systemd-managed instance of the REST API would be shut down when podman system service shut down due to its idle timeout (#7294).\n - Added stronger parameter verification for the libpod Network Create endpoint to ensure subnet mask is a valid value.\n - The Pod URL parameter to the Libpod Container List endpoint has been deprecated; the information previously gated by the Pod boolean will now be included in the response unconditionally.\n\n- Change hard requires for AppArmor to Recommends. They are not\n needed for runtime or with SELinux but already installed if\n AppArmor is used [jsc#SMO-15]\n- Add BuildRequires for pkg-config(libselinux) to build with\n SELinux support [jsc#SMO-15] \n\nUpdate to v2.0.4\n\n* Fixed a bug where the output of podman image search did not\n populate the Description field as it was mistakenly assigned to\n the ID field.\n* Fixed a bug where podman build - and podman build on an HTTP\n target would fail.\n* Fixed a bug where rootless Podman would improperly chown the\n copied-up contents of anonymous volumes (#7130).\n* Fixed a bug where Podman would sometimes HTML-escape special\n characters in its CLI output.\n* Fixed a bug where the podman start --attach --interactive\n command would print the container ID of the container attached\n to when exiting (#7068).\n* Fixed a bug where podman run --ipc=host --pid=host would only\n set --pid=host and not --ipc=host (#7100).\n* Fixed a bug where the --publish argument to podman run, podman\n create and podman pod create would not allow binding the same\n container port to more than one host port (#7062).\n* Fixed a bug where incorrect arguments to podman images --format\n could cause Podman to segfault.\n* Fixed a bug where podman rmi --force on an image ID with more\n than one name and at least one container using the image would\n not completely remove containers using the image (#7153).\n* Fixed a bug where memory usage in bytes and memory use\n percentage were swapped in the output of podman stats\n --format=json.\n* Fixed a bug where the libpod and compat events endpoints would\n fail if no filters were specified (#7078).\n* Fixed a bug where the CgroupVersion field in responses from the\n compat Info endpoint was prefixed by \u0027v\u0027 (instead of just being\n \u00271\u0027 or \u00272\u0027, as is documented).\n\n- Suggest katacontainers instead of recommending it. It\u0027s not\n enabled by default, so it\u0027s just bloat\n\nUpdate to v2.0.3\n\n* Fix handling of entrypoint\n* log API: add context to allow for cancelling\n* fix API: Create container with an invalid configuration\n* Remove all instances of named return \u0027err\u0027 from Libpod\n* Fix: Correct connection counters for hijacked connections\n* Fix: Hijacking v2 endpoints to follow rfc 7230 semantics\n* Remove hijacked connections from active connections list\n* version/info: format: allow more json variants\n* Correctly print STDOUT on non-terminal remote exec\n* Fix container and pod create commands for remote create\n* Mask out /sys/dev to prevent information leak from the host\n* Ensure sig-proxy default is propagated in start\n* Add SystemdMode to inspect for containers\n* When determining systemd mode, use full command\n* Fix lint\n* Populate remaining unused fields in `pod inspect`\n* Include infra container information in `pod inspect`\n* play-kube: add suport for \u0027IfNotPresent\u0027 pull type\n* docs: user namespace can\u0027t be shared in pods\n* Fix \u0027Error: unrecognized protocol \\\u0027TCP\\\u0027 in port mapping\u0027\n* Error on rootless mac and ip addresses\n* Fix \u0026 add notes regarding problematic language in codebase\n* abi: set default umask and rlimits\n* Used reference package with errors for parsing tag\n* fix: system df error when an image has no name\n* Fix Generate API title/description\n* Add noop function disable-content-trust\n* fix play kube doesn\u0027t override dockerfile ENTRYPOINT\n* Support default profile for apparmor\n* Bump github.com/containers/common to v0.14.6\n* events endpoint: backwards compat to old type\n* events endpoint: fix panic and race condition\n* Switch references from libpod.conf to containers.conf\n* podman.service: set type to simple\n* podman.service: set doc to podman-system-service\n* podman.service: use default registries.conf\n* podman.service: use default killmode\n* podman.service: remove stop timeout\n* systemd: symlink user-\u003esystem\n* vendor golang.org/x/text@v0.3.3\n* Fix a bug where --pids-limit was parsed incorrectly\n* search: allow wildcards\n* [CI:DOCS]Do not copy policy.json into gating image\n* Fix systemd pid 1 test\n* Cirrus: Rotate keys post repo. rename\n* The libpod.conf(5) man page got removed and all references are\n now pointing towards containers.conf(5), which will be part\n of the libcontainers-common package.\n\nUpdate to podman v2.0.2\n\n* fix race condition in `libpod.GetEvents(...)`\n* Fix bug where `podman mount` didn\u0027t error as rootless\n* remove podman system connection\n* Fix imports to ensure v2 is used with libpod\n* Update release notes for v2.0.2\n* specgen: fix order for setting rlimits\n* Ensure umask is set appropriately for \u0027system service\u0027\n* generate systemd: improve pod-flags filter\n* Fix a bug with APIv2 compat network remove to log an ErrNetworkNotFound instead of nil\n* Fixes --remote flag issues\n* Pids-limit should only be set if the user set it\n* Set console mode for windows\n* Allow empty host port in --publish flag\n* Add a note on the APIs supported by `system service`\n* fix: Don\u0027t override entrypoint if it\u0027s `nil`\n* Set TMPDIR to /var/tmp by default if not set\n* test: add tests for --user and volumes\n* container: move volume chown after spec generation\n* libpod: volume copyup honors namespace mappings\n* Fix `system service` panic from early hangup in events\n* stop podman service in e2e tests\n* Print errors from individual containers in pods\n* auto-update: clarify systemd-unit requirements\n* podman ps truncate the command\n* move go module to v2\n* Vendor containers/common v0.14.4\n* Bump to imagebuilder v1.1.6 on v2 branch\n* Account for non-default port number in image name\n- Changes since v2.0.1\n* Update release notes with further v2.0.1 changes\n* Fix inspect to display multiple label: changes\n* Set syslog for exit commands on log-level=debug\n* Friendly amendment for pr 6751\n* podman run/create: support all transports\n* systemd generate: allow manual restart of container units in pods\n* Revert sending --remote flag to containers\n* Print port mappings in `ps` for ctrs sharing network\n* vendor github.com/containers/common@v0.14.3\n* Update release notes for v2.0.1\n* utils: drop default mapping when running uid!=0\n* Set stop signal to 15 when not explicitly set\n* podman untag: error if tag doesn\u0027t exist\n* Reformat inspect network settings\n* APIv2: Return `StatusCreated` from volume creation\n* APIv2:fix: Remove `/json` from compat network EPs\n* Fix ssh-agent support\n* libpod: specify mappings to the storage\n* APIv2:doc: Fix swagger doc to refer to volumes\n* Add podman network to bash command completions\n* Fix typo in manpage for `podman auto update`.\n* Add JSON output field for ps\n* V2 podman system connection\n* image load: no args required\n* Re-add PODMAN_USERNS environment variable\n* Fix conflicts between privileged and other flags\n* Bump required go version to 1.13\n* Add explicit command to alpine container in test case.\n* Use POLL_DURATION for timer\n* Stop following logs using timers\n* \u0027pod\u0027 was being truncated to \u0027po\u0027 in the names of the generated systemd unit files.\n* rootless_linux: improve error message\n* Fix podman build handling of --http-proxy flag\n* correct the absolute path of `rm` executable\n* Makefile: allow customizable GO_BUILD\n* Cirrus: Change DEST_BRANCH to v2.0\n\nUpdate to podman v2.0.0\n\n* The `podman generate systemd` command now supports the `--new`\n flag when used with pods, allowing portable services for pods\n to be created.\n* The `podman play kube` command now supports running Kubernetes\n Deployment YAML.\n* The `podman exec` command now supports the `--detach` flag to\n run commands in the container in the background.\n* The `-p` flag to `podman run` and `podman create` now supports\n forwarding ports to IPv6 addresses.\n* The `podman run`, `podman create` and `podman pod create`\n command now support a `--replace` flag to remove and replace any\n existing container (or, for `pod create`, pod) with the same name\n* The `--restart-policy` flag to `podman run` and `podman create`\n now supports the `unless-stopped` restart policy.\n* The `--log-driver` flag to `podman run` and `podman create`\n now supports the `none` driver, which does not log the\n container\u0027s output.\n* The `--mount` flag to `podman run` and `podman create` now\n accepts `readonly` option as an alias to `ro`.\n* The `podman generate systemd` command now supports the `--container-prefix`,\n `--pod-prefix`, and `--separator` arguments to control the\n name of generated unit files.\n* The `podman network ls` command now supports the `--filter`\n flag to filter results.\n* The `podman auto-update` command now supports specifying an\n authfile to use when pulling new images on a per-container\n basis using the `io.containers.autoupdate.authfile` label.\n* Fixed a bug where the `podman exec` command would log to journald\n when run in containers loggined to journald\n ([#6555](https://github.com/containers/libpod/issues/6555)).\n* Fixed a bug where the `podman auto-update` command would not\n preserve the OS and architecture of the original image when\n pulling a replacement\n ([#6613](https://github.com/containers/libpod/issues/6613)).\n* Fixed a bug where the `podman cp` command could create an extra\n `merged` directory when copying into an existing directory\n ([#6596](https://github.com/containers/libpod/issues/6596)).\n* Fixed a bug where the `podman pod stats` command would crash\n on pods run with `--network=host`\n ([#5652](https://github.com/containers/libpod/issues/5652)).\n* Fixed a bug where containers logs written to journald did not\n include the name of the container.\n* Fixed a bug where the `podman network inspect` and\n `podman network rm` commands did not properly handle non-default\n CNI configuration paths ([#6212](https://github.com/containers/libpod/issues/6212)).\n* Fixed a bug where Podman did not properly remove containers\n when using the Kata containers OCI runtime.\n* Fixed a bug where `podman inspect` would sometimes incorrectly\n report the network mode of containers started with `--net=none`.\n* Podman is now better able to deal with cases where `conmon`\n is killed before the container it is monitoring.\n\nUpdate to podman v1.9.3:\n\n* Fixed a bug where, on FIPS enabled hosts, FIPS mode secrets\n were not properly mounted into containers\n* Fixed a bug where builds run over Varlink would hang\n* Fixed a bug where podman save would fail when the target\n image was specified by digest\n* Fixed a bug where rootless containers with ports forwarded to them\n could panic and dump core due to a concurrency issue (#6018)\n* Fixed a bug where rootless Podman could race when opening the\n rootless user namespace, resulting in commands failing to run\n* Fixed a bug where HTTP proxy environment variables forwarded into\n the container by the --http-proxy flag could not be overridden by --env or --env-file\n* Fixed a bug where rootless Podman was setting resource limits on cgroups\n v2 systems that were not using systemd-managed cgroups\n (and thus did not support resource limits), resulting in containers failing to start\n\nUpdate podman to v1.9.1:\n\n* Bugfixes\n\n - Fixed a bug where healthchecks could become nonfunctional if\n container log paths were manually set with --log-path and\n multiple container logs were placed in the same directory\n - Fixed a bug where rootless Podman could, when using an older\n libpod.conf, print numerous warning messages about an invalid\n CGroup manager config\n - Fixed a bug where rootless Podman would sometimes fail to\n close the rootless user namespace when joining it\n\nUpdate podman to v1.9.0:\n\n* Features\n\n - Experimental support has been added for podman run\n --userns=auto, which automatically allocates a unique UID and\n GID range for the new container\u0027s user namespace\n - The podman play kube command now has a --network flag to\n place the created pod in one or more CNI networks\n - The podman commit command now supports an --iidfile flag to\n write the ID of the committed image to a file\n - Initial support for the new containers.conf configuration\n file has been added. containers.conf allows for much more\n detailed configuration of some Podman functionality\n\n* Changes\n\n - There has been a major cleanup of the podman info command\n resulting in breaking changes. Many fields have been renamed\n to better suit usage with APIv2\n - All uses of the --timeout flag have been switched to prefer\n the alternative --time. The --timeout flag will continue to\n work, but man pages and --help will use the --time flag\n instead\n\n* Bugfixes\n\n - Fixed a bug where some volume mounts from the host would\n sometimes not properly determine the flags they should use\n when mounting\n - Fixed a bug where Podman was not propagating $PATH to Conmon\n and the OCI runtime, causing issues for some OCI runtimes\n that required it\n - Fixed a bug where rootless Podman would print error messages\n about missing support for systemd cgroups when run in a\n container with no cgroup support\n - Fixed a bug where podman play kube would not properly handle\n container-only port mappings (#5610)\n - Fixed a bug where the podman container prune command was not\n pruning containers in the created and configured states\n - Fixed a bug where Podman was not properly removing CNI IP\n address allocations after a reboot (#5433)\n - Fixed a bug where Podman was not properly applying the\n default Seccomp profile when --security-opt was not given at\n the command line\n\n* HTTP API\n\n - Many Libpod API endpoints have been added, including Changes,\n Checkpoint, Init, and Restore\n - Resolved issues where the podman system service command would\n time out and exit while there were still active connections\n - Stability overall has greatly improved as we prepare the API\n for a beta release soon with Podman 2.0\n\n* Misc\n\n - The default infra image for pods has been upgraded to\n k8s.gcr.io/pause:3.2 (from 3.1) to address a bug in the\n architecture metadata for non-AMD64 images\n - The slirp4netns networking utility in rootless Podman now\n uses Seccomp filtering where available for improved security\n - Updated Buildah to v1.14.8\n - Updated containers/storage to v1.18.2\n - Updated containers/image to v5.4.3\n - Updated containers/common to v0.8.1\n\n- Add \u0027systemd\u0027 BUILDFLAGS to build with support for journald\n logging (bsc#1162432)\n\nUpdate podman to v1.8.2:\n\n* Features\n\n - Initial support for automatically updating containers managed\n via Systemd unit files has been merged. This allows\n containers to automatically upgrade if a newer version of\n their image becomes available\n\n* Bugfixes\n\n - Fixed a bug where unit files generated by podman generate\n systemd --new would not force containers to detach, causing\n the unit to time out when trying to start\n - Fixed a bug where podman system reset could delete important\n system directories if run as rootless on installations\n created by older Podman (#4831)\n - Fixed a bug where image built by podman build would not\n properly set the OS and Architecture they were built with\n (#5503)\n - Fixed a bug where attached podman run with --sig-proxy\n enabled (the default), when built with Go 1.14, would\n repeatedly send signal 23 to the process in the container and\n could generate errors when the container stopped (#5483)\n - Fixed a bug where rootless podman run commands could hang\n when forwarding ports\n - Fixed a bug where rootless Podman would not work when /proc\n was mounted with the hidepid option set\n - Fixed a bug where the podman system service command would use\n large amounts of CPU when --timeout was set to 0 (#5531)\n\n* HTTP API\n\n - Initial support for Libpod endpoints related to creating and\n operating on image manifest lists has been added\n - The Libpod Healthcheck and Events API endpoints are now\n supported\n - The Swagger endpoint can now handle cases where no Swagger\n documentation has been generated\n\nUpdate podman to v1.8.1:\n\n* Features\n\n - Many networking-related flags have been added to podman pod\n create to enable customization of pod networks, including\n --add-host, --dns, --dns-opt, --dns-search, --ip,\n --mac-address, --network, and --no-hosts\n - The podman ps --format=json command now includes the ID of\n the image containers were created with\n - The podman run and podman create commands now feature an\n --rmi flag to remove the image the container was using after\n it exits (if no other containers are using said image)\n ([#4628](https://github.com/containers/libpod/issues/4628))\n - The podman create and podman run commands now support the\n --device-cgroup-rule flag (#4876)\n - While the HTTP API remains in alpha, many fixes and additions\n have landed. These are documented in a separate subsection\n below\n - The podman create and podman run commands now feature a\n --no-healthcheck flag to disable healthchecks for a container\n (#5299)\n - Containers now recognize the io.containers.capabilities\n label, which specifies a list of capabilities required by the\n image to run. These capabilities will be used as long as they\n are more restrictive than the default capabilities used\n - YAML produced by the podman generate kube command now\n includes SELinux configuration passed into the container via\n --security-opt label=... (#4950)\n\n* Bugfixes\n\n - Fixed CVE-2020-1726, a security issue where volumes manually\n populated before first being mounted into a container could\n have those contents overwritten on first being mounted into a\n container\n - Fixed a bug where Podman containers with user namespaces in\n CNI networks with the DNS plugin enabled would not have the\n DNS plugin\u0027s nameserver added to their resolv.conf\n ([#5256](https://github.com/containers/libpod/issues/5256))\n - Fixed a bug where trailing / characters in image volume\n definitions could cause them to not be overridden by a\n user-specified mount at the same location\n ([#5219](https://github.com/containers/libpod/issues/5219))\n - Fixed a bug where the label option in libpod.conf, used to\n disable SELinux by default, was not being respected (#5087)\n - Fixed a bug where the podman login and podman logout commands\n required the registry to log into be specified (#5146)\n - Fixed a bug where detached rootless Podman containers could\n not forward ports (#5167)\n - Fixed a bug where rootless Podman could fail to run if the\n pause process had died\n - Fixed a bug where Podman ignored labels that were specified\n with only a key and no value (#3854)\n - Fixed a bug where Podman would fail to create named volumes\n when the backing filesystem did not support SELinux labelling\n (#5200)\n - Fixed a bug where --detach-keys=\u0027\u0027 would not disable\n detaching from a container (#5166)\n - Fixed a bug where the podman ps command was too aggressive\n when filtering containers and would force --all on in too\n many situations\n - Fixed a bug where the podman play kube command was ignoring\n image configuration, including volumes, working directory,\n labels, and stop signal (#5174)\n - Fixed a bug where the Created and CreatedTime fields in\n podman images --format=json were misnamed, which also broke\n Go template output for those fields\n ([#5110](https://github.com/containers/libpod/issues/5110))\n - Fixed a bug where rootless Podman containers with ports\n forwarded could hang when started (#5182)\n - Fixed a bug where podman pull could fail to parse registry\n names including port numbers\n - Fixed a bug where Podman would incorrectly attempt to\n validate image OS and architecture when starting containers\n - Fixed a bug where Bash completion for podman build -f would\n not list available files that could be built (#3878)\n - Fixed a bug where podman commit --change would perform\n incorrect validation, resulting in valid changes being\n rejected (#5148)\n - Fixed a bug where podman logs --tail could take large amounts\n of memory when the log file for a container was large (#5131)\n - Fixed a bug where Podman would sometimes incorrectly generate\n firewall rules on systems using firewalld\n - Fixed a bug where the podman inspect command would not\n display network information for containers properly if a\n container joined multiple CNI networks\n ([#4907](https://github.com/containers/libpod/issues/4907))\n - Fixed a bug where the --uts flag to podman create and podman\n run would only allow specifying containers by full ID (#5289)\n - Fixed a bug where rootless Podman could segfault when passed\n a large number of file descriptors\n - Fixed a bug where the podman port command was incorrectly\n interpreting additional arguments as container names, instead\n of port numbers\n - Fixed a bug where units created by podman generate systemd\n did not depend on network targets, and so could start before\n the system network was ready (#4130)\n - Fixed a bug where exec sessions in containers which did not\n specify a user would not inherit supplemental groups added to\n the container via --group-add\n - Fixed a bug where Podman would not respect the $TMPDIR\n environment variable for placing large temporary files during\n some operations (e.g. podman pull)\n ([#5411](https://github.com/containers/libpod/issues/5411))\n\n* HTTP API\n\n - Initial support for secure connections to servers via SSH\n tunneling has been added\n - Initial support for the libpod create and logs endpoints for\n containers has been added\n - Added a /swagger/ endpoint to serve API documentation\n - The json endpoint for containers has received many fixes\n - Filtering images and containers has been greatly improved,\n with many bugs fixed and documentation improved\n - Image creation endpoints (commit, pull, etc) have seen many\n fixes\n - Server timeout has been fixed so that long operations will no\n longer trigger the timeout and shut the server down\n - The stats endpoint for containers has seen major fixes and\n now provides accurate output\n - Handling the HTTP 304 status code has been fixed for all\n endpoints\n - Many fixes have been made to API documentation to ensure it\n matches the code\n\n* Misc\n\n - The Created field to podman images --format=json has been\n renamed to CreatedSince as part of the fix for (#5110). Go\n templates using the old name shou ld still work\n - The CreatedTime field to podman images --format=json has been\n renamed to CreatedAt as part of the fix for (#5110). Go\n templates using the old name should still work\n - The before filter to podman images has been renamed to since\n for Docker compatibility. Using before will still work, but\n documentation has been changed to use the new since filter\n - Using the --password flag to podman login now warns that\n passwords are being passed in plaintext\n - Some common cases where Podman would deadlock have been fixed\n to warn the user that podman system renumber must be run to\n resolve the deadlock\n\n- Configure br_netfilter for podman automatically (bsc#1165738)\n The trigger is only excuted when updating podman-cni-config while the\n command was running\n\nconmon was update to v2.0.20 (bsc#1175821)\n\n- journald: fix logging container name\n- container logging: Implement none driver - \u0027off\u0027, \u0027null\u0027 or\n \u0027none\u0027 all work.\n- ctrl: warn if we fail to unlink\n- Drop fsync calls\n- Reap PIDs before running exit command\n- Fix log path parsing\n- Add --sync option to prevent conmon from double forking\n- Add --no-sync-log option to instruct conmon to not sync the\n logs of the containers upon shutting down. This feature fixes a\n regression where we unconditionally dropped the log sync. It is\n possible the container logs could be corrupted on a sudden\n power-off. If you need container logs to remain in consistent\n state after a sudden shutdown, please update from v2.0.19 to\n v2.0.20\n\n- Update to v2.0.17:\n\n - Add option to delay execution of exit command\n\n- Update to v2.0.16:\n\n - tty: flush pending data when fd is ready\n\n- Enable support for journald logging (bsc#1162432)\n- Update to v2.0.15:\n\n - store status while waiting for pid\n\n- Update to v2.0.14:\n\n - drop usage of splice(2)\n - avoid hanging on stdin\n - stdio: sometimes quit main loop after io is done\n - ignore sigpipe\n\n- Update to v2.0.12\n\n - oom: fix potential race between verification steps\n\n- Update to v2.0.11\n\n - log: reject --log-tag with k8s-file\n - chmod std files pipes\n - adjust score to -1000 to prevent conmon from ever being OOM\n killed\n - container OOM: verify cgroup hasn\u0027t been cleaned up before\n reporting OOM\n - journal logging: write to /dev/null instead of -1\n\nfuse-overlayfs was updated to 1.1.2 (bsc#1175821):\n\n- fix memory leak when creating whiteout files.\n- fix lookup for overflow uid when it is different than the overflow gid.\n- use openat2(2) when available.\n- accept \u0027ro\u0027 as mount option.\n- fix set mtime for a symlink.\n- fix some issues reported by static analysis.\n- fix potential infinite loop on a short read.\n- fix creating a directory if the destination already exists\n in the upper layer.\n- report correctly the number of links for a directory also for\n subsequent stat calls\n- stop looking up the ino in the lower layers if the file could\n not be opened\n- make sure the destination is deleted before doing a rename(2).\n It prevents a left over directory to cause delete to fail with\n EEXIST.\n- honor --debug.\n\nlibcontainers-common was updated to fix:\n\n- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)\n- Added containers/common tarball for containers.conf(5) man page\n- Install containers.conf default configuration in\n /usr/share/containers\n- libpod repository on github got renamed to podman\n- Update to image 5.5.1\n - Add documentation for credHelpera\n - Add defaults for using the rootless policy path\n- Update libpod/podman to 2.0.3\n - docs: user namespace can\u0027t be shared in pods\n - Switch references from libpod.conf to containers.conf\n - Allow empty host port in --publish flag\n - update document login see config.json as valid\n- Update storage to 1.20.2\n - Add back skip_mount_home\n\n- Remove remaining difference between SLE and openSUSE package and\n ship the some mounts.conf default configuration on both platforms.\n As the sources for the mount point do not exist on openSUSE by\n default this config will basically have no effect on openSUSE.\n (jsc#SLE-12122, bsc#1175821) \n\n- Update to image 5.4.4\n - Remove registries.conf VERSION 2 references from man page\n - Intial authfile man page\n - Add $HOME/.config/containers/certs.d to perHostCertDirPath\n - Add $HOME/.config/containers/registries.conf to config path\n - registries.conf.d: add stances for the registries.conf\n- update to libpod 1.9.3\n - userns: support --userns=auto\n - Switch to using --time as opposed to --timeout to better match Docker\n - Add support for specifying CNI networks in podman play kube\n - man pages: fix inconsistencies\n- Update to storage 1.19.1\n - userns: add support for auto\n - store: change the default user to containers\n - config: honor XDG_CONFIG_HOME\n- Remove the /var/lib/ca-certificates/pem/SUSE.pem workaround again.\n It never ended up in SLES and a different way to fix the underlying\n problem is being worked on.\n\n- Add registry.opensuse.org as default registry [bsc#1171578] \n\n- Add /var/lib/ca-certificates/pem/SUSE.pem to the SLES mounts.\n This for making container-suseconnect working in the public\n cloud on-demand images. It needs that file for being able to\n verify the server certificates of the RMT servers hosted\n in the public cloud.\n (https://github.com/SUSE/container-suseconnect/issues/41)\n \n\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2731,SUSE-SLE-Module-Basesystem-15-SP1-2020-2731,SUSE-SLE-Module-Basesystem-15-SP2-2020-2731,SUSE-SLE-Module-Containers-15-SP1-2020-2731,SUSE-SLE-Module-Containers-15-SP2-2020-2731", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2731-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2731-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202731-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2731-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007476.html" }, { "category": "self", "summary": "SUSE Bug 1162432", "url": "https://bugzilla.suse.com/1162432" }, { "category": "self", "summary": "SUSE Bug 1164090", "url": "https://bugzilla.suse.com/1164090" }, { "category": "self", "summary": "SUSE Bug 1165738", "url": "https://bugzilla.suse.com/1165738" }, { "category": "self", "summary": "SUSE Bug 1171578", "url": "https://bugzilla.suse.com/1171578" }, { "category": "self", "summary": "SUSE Bug 1174075", "url": "https://bugzilla.suse.com/1174075" }, { "category": "self", "summary": "SUSE Bug 1175821", "url": "https://bugzilla.suse.com/1175821" }, { "category": "self", "summary": "SUSE Bug 1175957", "url": "https://bugzilla.suse.com/1175957" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1726 page", "url": "https://www.suse.com/security/cve/CVE-2020-1726/" } ], "title": "Security update for conmon, fuse-overlayfs, libcontainers-common, podman", "tracking": { "current_release_date": "2020-09-24T05:42:41Z", "generator": { "date": "2020-09-24T05:42:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2731-1", "initial_release_date": "2020-09-24T05:42:41Z", "revision_history": [ { "date": "2020-09-24T05:42:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "conmon-2.0.20-3.6.1.aarch64", "product": { "name": "conmon-2.0.20-3.6.1.aarch64", "product_id": "conmon-2.0.20-3.6.1.aarch64" } }, { "category": "product_version", "name": "fuse-overlayfs-1.1.2-3.9.1.aarch64", "product": { "name": "fuse-overlayfs-1.1.2-3.9.1.aarch64", "product_id": "fuse-overlayfs-1.1.2-3.9.1.aarch64" } }, { "category": "product_version", "name": "podman-2.0.6-4.25.1.aarch64", "product": { "name": "podman-2.0.6-4.25.1.aarch64", "product_id": "podman-2.0.6-4.25.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "conmon-2.0.20-3.6.1.i586", "product": { "name": "conmon-2.0.20-3.6.1.i586", "product_id": "conmon-2.0.20-3.6.1.i586" } }, { "category": "product_version", "name": "fuse-overlayfs-1.1.2-3.9.1.i586", "product": { "name": "fuse-overlayfs-1.1.2-3.9.1.i586", "product_id": "fuse-overlayfs-1.1.2-3.9.1.i586" } }, { "category": "product_version", "name": "podman-2.0.6-4.25.1.i586", "product": { "name": "podman-2.0.6-4.25.1.i586", "product_id": "podman-2.0.6-4.25.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libcontainers-common-20200727-3.12.1.noarch", "product": { "name": "libcontainers-common-20200727-3.12.1.noarch", "product_id": "libcontainers-common-20200727-3.12.1.noarch" } }, { "category": "product_version", "name": "podman-cni-config-2.0.6-4.25.1.noarch", "product": { "name": "podman-cni-config-2.0.6-4.25.1.noarch", "product_id": "podman-cni-config-2.0.6-4.25.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "conmon-2.0.20-3.6.1.ppc64le", "product": { "name": "conmon-2.0.20-3.6.1.ppc64le", "product_id": "conmon-2.0.20-3.6.1.ppc64le" } }, { "category": "product_version", "name": "fuse-overlayfs-1.1.2-3.9.1.ppc64le", "product": { "name": "fuse-overlayfs-1.1.2-3.9.1.ppc64le", "product_id": "fuse-overlayfs-1.1.2-3.9.1.ppc64le" } }, { "category": "product_version", "name": "podman-2.0.6-4.25.1.ppc64le", "product": { "name": "podman-2.0.6-4.25.1.ppc64le", "product_id": "podman-2.0.6-4.25.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "conmon-2.0.20-3.6.1.s390x", "product": { "name": "conmon-2.0.20-3.6.1.s390x", "product_id": "conmon-2.0.20-3.6.1.s390x" } }, { "category": "product_version", "name": "fuse-overlayfs-1.1.2-3.9.1.s390x", "product": { "name": "fuse-overlayfs-1.1.2-3.9.1.s390x", "product_id": "fuse-overlayfs-1.1.2-3.9.1.s390x" } }, { "category": "product_version", "name": "podman-2.0.6-4.25.1.s390x", "product": { "name": "podman-2.0.6-4.25.1.s390x", "product_id": "podman-2.0.6-4.25.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "conmon-2.0.20-3.6.1.x86_64", "product": { "name": "conmon-2.0.20-3.6.1.x86_64", "product_id": "conmon-2.0.20-3.6.1.x86_64" } }, { "category": "product_version", "name": "fuse-overlayfs-1.1.2-3.9.1.x86_64", "product": { "name": "fuse-overlayfs-1.1.2-3.9.1.x86_64", "product_id": "fuse-overlayfs-1.1.2-3.9.1.x86_64" } }, { "category": "product_version", "name": "podman-2.0.6-4.25.1.x86_64", "product": { "name": "podman-2.0.6-4.25.1.x86_64", "product_id": "podman-2.0.6-4.25.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libcontainers-common-20200727-3.12.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcontainers-common-20200727-3.12.1.noarch" }, "product_reference": "libcontainers-common-20200727-3.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libcontainers-common-20200727-3.12.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libcontainers-common-20200727-3.12.1.noarch" }, "product_reference": "libcontainers-common-20200727-3.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2.0.20-3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.aarch64" }, "product_reference": "conmon-2.0.20-3.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2.0.20-3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.ppc64le" }, "product_reference": "conmon-2.0.20-3.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2.0.20-3.6.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.s390x" }, "product_reference": "conmon-2.0.20-3.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2.0.20-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.x86_64" }, "product_reference": "conmon-2.0.20-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-1.1.2-3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.aarch64" }, "product_reference": "fuse-overlayfs-1.1.2-3.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-1.1.2-3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.ppc64le" }, "product_reference": "fuse-overlayfs-1.1.2-3.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-1.1.2-3.9.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.s390x" }, "product_reference": "fuse-overlayfs-1.1.2-3.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-1.1.2-3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.x86_64" }, "product_reference": "fuse-overlayfs-1.1.2-3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2.0.6-4.25.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.aarch64" }, "product_reference": "podman-2.0.6-4.25.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2.0.6-4.25.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.ppc64le" }, "product_reference": "podman-2.0.6-4.25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2.0.6-4.25.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.s390x" }, "product_reference": "podman-2.0.6-4.25.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2.0.6-4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.x86_64" }, "product_reference": "podman-2.0.6-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-2.0.6-4.25.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP1", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP1:podman-cni-config-2.0.6-4.25.1.noarch" }, "product_reference": "podman-cni-config-2.0.6-4.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2.0.20-3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.aarch64" }, "product_reference": "conmon-2.0.20-3.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2.0.20-3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.ppc64le" }, "product_reference": "conmon-2.0.20-3.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2.0.20-3.6.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.s390x" }, "product_reference": "conmon-2.0.20-3.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2.0.20-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.x86_64" }, "product_reference": "conmon-2.0.20-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-1.1.2-3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.aarch64" }, "product_reference": "fuse-overlayfs-1.1.2-3.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-1.1.2-3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.ppc64le" }, "product_reference": "fuse-overlayfs-1.1.2-3.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-1.1.2-3.9.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.s390x" }, "product_reference": "fuse-overlayfs-1.1.2-3.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-1.1.2-3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.x86_64" }, "product_reference": "fuse-overlayfs-1.1.2-3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2.0.6-4.25.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.aarch64" }, "product_reference": "podman-2.0.6-4.25.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2.0.6-4.25.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.ppc64le" }, "product_reference": "podman-2.0.6-4.25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2.0.6-4.25.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.s390x" }, "product_reference": "podman-2.0.6-4.25.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2.0.6-4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.x86_64" }, "product_reference": "podman-2.0.6-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-2.0.6-4.25.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP2", "product_id": "SUSE Linux Enterprise Module for Containers 15 SP2:podman-cni-config-2.0.6-4.25.1.noarch" }, "product_reference": "podman-cni-config-2.0.6-4.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-1726", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1726" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcontainers-common-20200727-3.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libcontainers-common-20200727-3.12.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-cni-config-2.0.6-4.25.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-cni-config-2.0.6-4.25.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1726", "url": "https://www.suse.com/security/cve/CVE-2020-1726" }, { "category": "external", "summary": "SUSE Bug 1164090 for CVE-2020-1726", "url": "https://bugzilla.suse.com/1164090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcontainers-common-20200727-3.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libcontainers-common-20200727-3.12.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-cni-config-2.0.6-4.25.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-cni-config-2.0.6-4.25.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcontainers-common-20200727-3.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libcontainers-common-20200727-3.12.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP1:conmon-2.0.20-3.6.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP1:fuse-overlayfs-1.1.2-3.9.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-2.0.6-4.25.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP1:podman-cni-config-2.0.6-4.25.1.noarch", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP2:conmon-2.0.20-3.6.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP2:fuse-overlayfs-1.1.2-3.9.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.aarch64", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.ppc64le", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.s390x", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-2.0.6-4.25.1.x86_64", "SUSE Linux Enterprise Module for Containers 15 SP2:podman-cni-config-2.0.6-4.25.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-09-24T05:42:41Z", "details": "moderate" } ], "title": "CVE-2020-1726" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…