[CLSA-2026:1772456640] podman: Fix of 4 CVEs
Type:
security
Severity:
Critical
Release date:
2026-03-02 13:04:04 UTC
Description:
- rebuild with newer golang version 1.22.9-1.el9_2.tuxcare.els6 to fix the following CVE's - CVE-2025-68121: fix TLS session resumption bypass by preventing shared auto-rotated ticket keys in Config and validating full certificate chain expiry - CVE-2025-61726: limit parsed URL query parameters to mitigate excessive memory consumption during form parsing - CVE-2025-61728: fix denial-of-service in archive/zip by replacing super-linear index construction with an efficient algorithm - CVE-2025-61729: fix excessive resource consumption when constructing hostname error messages for certificates with many SANs
Updated packages:
  • podman-4.4.1-13.el9_2.tuxcare.els11.x86_64.rpm
    sha:19f6158dc9c43d06f9b3c4b034aa3f187836b6507f7062a7890778d2a3259d21
  • podman-docker-4.4.1-13.el9_2.tuxcare.els11.noarch.rpm
    sha:025c02fd801d22af03cc49c1e2751352c1bdd66b0e741c4ee81aa01f85772cf6
  • podman-gvproxy-4.4.1-13.el9_2.tuxcare.els11.x86_64.rpm
    sha:0fc58def5cad64deee2a14ba7cde347c81f197d4bd71884b829eab495e5119d8
  • podman-plugins-4.4.1-13.el9_2.tuxcare.els11.x86_64.rpm
    sha:c4d567095e3cfb49d7f68fdcc464222832227e3a86c1fca49eaed104131971b7
  • podman-remote-4.4.1-13.el9_2.tuxcare.els11.x86_64.rpm
    sha:c7ba5e2bce298b78608ec03cf3bc14075a375bcbd38be7fb2df98b9d89a1502f
  • podman-tests-4.4.1-13.el9_2.tuxcare.els11.x86_64.rpm
    sha:5587e40a47719f939ef1b59795be22ce37aeebee6927baf1aded80fb2bb3dfd2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.