Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
红帽产品勘误 RHSA-2026:3337 - Security Advisory
发布:
2026-02-25
已更新:
2026-02-25

RHSA-2026:3337 - Security Advisory

  • 概述
  • 更新的软件包

概述

Important: podman security update

类型/严重性

Security Advisory: Important

Red Hat Lightspeed patch analysis

识别并修复受此公告影响的系统。

查看受影响的系统

标题

An update for podman is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

描述

The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fix(es):

  • crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
  • golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
  • golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
  • crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

解决方案

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

受影响的产品

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64

修复

  • BZ - 2418462 - CVE-2025-61729 crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate
  • BZ - 2434431 - CVE-2025-61728 golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip
  • BZ - 2434432 - CVE-2025-61726 golang: net/url: Memory exhaustion in query parameter parsing in net/url
  • BZ - 2437111 - CVE-2025-68121 crypto/tls: Unexpected session resumption in crypto/tls

CVE

  • CVE-2025-61726
  • CVE-2025-61728
  • CVE-2025-61729
  • CVE-2025-68121

参考

  • https://access.redhat.com/security/updates/classification/#important
注:: 可能有这些软件包的更新版本。 点击软件包名称查看详情。

Red Hat Enterprise Linux for x86_64 9

SRPM
podman-5.6.0-14.el9_7.src.rpm SHA-256: 1d391086380db67b576f9401e622ddd87adf94401d3a8c8ce7caca72670fd5f1
x86_64
podman-5.6.0-14.el9_7.x86_64.rpm SHA-256: 55f1346f7f76386207f0c07786f1ff4b6f713a6348c5cc343609b4265243fb0a
podman-debuginfo-5.6.0-14.el9_7.x86_64.rpm SHA-256: c694a11232d727d22ffad7dc53be12f01f4cd5da9dbb13b1fa9c18e7f7cbe933
podman-debugsource-5.6.0-14.el9_7.x86_64.rpm SHA-256: c1a23dd695c963a14a5562cb215196c9d7b869efa3fc6c0a54f87c31602ad596
podman-docker-5.6.0-14.el9_7.noarch.rpm SHA-256: 3cd8d551f0cb25a840a4097bab40442aa1779d6d01b367bffc94caa63689cefc
podman-plugins-5.6.0-14.el9_7.x86_64.rpm SHA-256: 896e0b279fca3156510164abe9f7e3b778098d446a853cd0eb111d9da05c7aeb
podman-plugins-debuginfo-5.6.0-14.el9_7.x86_64.rpm SHA-256: 0ae1f1f9f6136ec89bc200f5fc56a5de1935b873126a91d8312bea55ecdea4e7
podman-remote-5.6.0-14.el9_7.x86_64.rpm SHA-256: 872b62a28aecbc42878eca0929d7b65c30bb120f5138c89132ea0604f786321c
podman-remote-debuginfo-5.6.0-14.el9_7.x86_64.rpm SHA-256: dff369aedb944137b672f327aba6fee0d5161c62e18da94f020be46af6b61a5a
podman-tests-5.6.0-14.el9_7.x86_64.rpm SHA-256: d7f39ed1ceec11535af0b86bfd10047bc79861d763213b40fe9b5f54c4c3cead
podman-tests-debuginfo-5.6.0-14.el9_7.x86_64.rpm SHA-256: ec993697ce4bcefd7955b59352bc6ddbaa3020cf7389b31d343e32d48e767062

Red Hat Enterprise Linux for IBM z Systems 9

SRPM
podman-5.6.0-14.el9_7.src.rpm SHA-256: 1d391086380db67b576f9401e622ddd87adf94401d3a8c8ce7caca72670fd5f1
s390x
podman-5.6.0-14.el9_7.s390x.rpm SHA-256: 3c98004eb039a1f80932fe136e678097e6a793e39cde4dab64c9049a381493e6
podman-debuginfo-5.6.0-14.el9_7.s390x.rpm SHA-256: 8043033f5cd467a50740adfc0f1bcd5882dd8190cb7b517d5f94663456013f0f
podman-debugsource-5.6.0-14.el9_7.s390x.rpm SHA-256: 51aa64b18e2e94a6f400ee9e16b75d3c7030ff58d9299e09657a4786780efc05
podman-docker-5.6.0-14.el9_7.noarch.rpm SHA-256: 3cd8d551f0cb25a840a4097bab40442aa1779d6d01b367bffc94caa63689cefc
podman-plugins-5.6.0-14.el9_7.s390x.rpm SHA-256: 13a50a939957c0588289f85a51fdc2ed01040e78a98c1e7b8736efeea74b2d49
podman-plugins-debuginfo-5.6.0-14.el9_7.s390x.rpm SHA-256: 0de129af8391f35001b907113f8355e1e3066f4edfafb0e333643d586cfbe8e8
podman-remote-5.6.0-14.el9_7.s390x.rpm SHA-256: 38746eca65238c9ae64da921c97cb7282c0777982e33c4b4345dcaf2f7525a2b
podman-remote-debuginfo-5.6.0-14.el9_7.s390x.rpm SHA-256: 6bf07db73d6f51b3707c1b646dd26e8a6c742d6d2d3805ec05cb42ce444479d5
podman-tests-5.6.0-14.el9_7.s390x.rpm SHA-256: 5b1ad0ac2c728506af477a768e66e9681d569c613b72384c82c6204f2245de29
podman-tests-debuginfo-5.6.0-14.el9_7.s390x.rpm SHA-256: d082c5f64225ed3d4ea04be62be23572fc0da260613f784573f1eebadbdd23b3

Red Hat Enterprise Linux for Power, little endian 9

SRPM
podman-5.6.0-14.el9_7.src.rpm SHA-256: 1d391086380db67b576f9401e622ddd87adf94401d3a8c8ce7caca72670fd5f1
ppc64le
podman-5.6.0-14.el9_7.ppc64le.rpm SHA-256: 37ddb19548e1eb53c2e182a96a30e7788a1072c5ecfc8f713d9d773069aa427f
podman-debuginfo-5.6.0-14.el9_7.ppc64le.rpm SHA-256: 23ac4ce235a38d98278fb7ccd8ea69175e533b644f2ebf1f80335a69b9647275
podman-debugsource-5.6.0-14.el9_7.ppc64le.rpm SHA-256: 15e4656e766ef239ce94bfea59ae4d902d931b6dba9a8ab1faf5261b790c2032
podman-docker-5.6.0-14.el9_7.noarch.rpm SHA-256: 3cd8d551f0cb25a840a4097bab40442aa1779d6d01b367bffc94caa63689cefc
podman-plugins-5.6.0-14.el9_7.ppc64le.rpm SHA-256: 026a8b8fc57b1b5138c9b9e70328a37af14a70de4c5cf281ec4beefe2ade19c2
podman-plugins-debuginfo-5.6.0-14.el9_7.ppc64le.rpm SHA-256: eadefe303df44cf6a4ad54a0612d3a08c076b029e95a74e5090c41ec6b2b8758
podman-remote-5.6.0-14.el9_7.ppc64le.rpm SHA-256: f9bbfa14c7bca31c9a37ff847563e797baf00b30b691d6d3f078224080523cb6
podman-remote-debuginfo-5.6.0-14.el9_7.ppc64le.rpm SHA-256: eec12839e700d85bd57cd452086b1672e8d9738fa41085f8343e7c938e7ca492
podman-tests-5.6.0-14.el9_7.ppc64le.rpm SHA-256: dbe178dd1d1a4516a5173bde937da2ce13420e51e9d431b7368daea8f4f788af
podman-tests-debuginfo-5.6.0-14.el9_7.ppc64le.rpm SHA-256: a568b805ada07d07bdde33bd68c7788a3089c86bf4560cec35433b451fc1b67f

Red Hat Enterprise Linux for ARM 64 9

SRPM
podman-5.6.0-14.el9_7.src.rpm SHA-256: 1d391086380db67b576f9401e622ddd87adf94401d3a8c8ce7caca72670fd5f1
aarch64
podman-5.6.0-14.el9_7.aarch64.rpm SHA-256: da6f440cef4fa6c95be22131d3c261de0b30caa28b8cf05b9590ad52132eef5d
podman-debuginfo-5.6.0-14.el9_7.aarch64.rpm SHA-256: 7a44b31634948b1ee9c32adb9790154152f65b600be0a9012d1b5415ac9271f8
podman-debugsource-5.6.0-14.el9_7.aarch64.rpm SHA-256: 3a6f2c00c2ad66fd849e022cc95bc986aecd1e7209177ddfce051235ce36872f
podman-docker-5.6.0-14.el9_7.noarch.rpm SHA-256: 3cd8d551f0cb25a840a4097bab40442aa1779d6d01b367bffc94caa63689cefc
podman-plugins-5.6.0-14.el9_7.aarch64.rpm SHA-256: c8f7f005802699f25015bd1060356a064136b5ea104e220596d21ae4a1053494
podman-plugins-debuginfo-5.6.0-14.el9_7.aarch64.rpm SHA-256: 420ed6b79dbd58be5080b67b0b9293fece573c4e5ac42e1785083ba11c8d0410
podman-remote-5.6.0-14.el9_7.aarch64.rpm SHA-256: 3803d73128ac902735f3f74dc322c62242b5ddd522b28a9d4053afbdc4261853
podman-remote-debuginfo-5.6.0-14.el9_7.aarch64.rpm SHA-256: d00892267428a79766c0c08a6c338687ffa01fda585358e818833206b2bef0e9
podman-tests-5.6.0-14.el9_7.aarch64.rpm SHA-256: e46b86ee783558e1e17323bc8c1a05cd1f1ae985bc6a7297841da3f2bf344916
podman-tests-debuginfo-5.6.0-14.el9_7.aarch64.rpm SHA-256: e1ba6ae9e5ec7c5b6ab90b62b29b039a42245d85ae15feb417a6995683dc22ec

Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility