All errata/sisyphus/ALT-PU-2022-1658-2
ALT-PU-2022-1658-2

Package update podman in branch sisyphus

Version4.0.3-alt1
Published2026-02-04
Max severityHIGH
Severity:

Closed issues (6)

BDU:2023-03685
HIGH8.8

Уязвимость реализации команды podman top программного средства управления и запуска OCI-контейнеров Podman операционных систем Red Hat Enterprise Linux, РедОС и корпоративной платформы Red Hat OpenShift Container Platform, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, повысить свои привилегии или вызвать отказ в обслуживании

Published: 2023-07-13Modified: 2025-09-24
CVSS 3.xHIGH 8.8
CVSS:3.x/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.0CRITICAL 10.0
CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C
References
BDU:2023-03753
HIGH7.5

Уязвимость программного средства управления и запуска OCI-контейнеров Podman операционных систем Red Hat Enterprise Linux, РедОС и корпоративной платформы Red Hat OpenShift Container Platform, позволяющая нарушителю обойти ограничения безопасности и повысить свои привилегии

Published: 2023-07-18Modified: 2025-09-24
CVSS 3.xHIGH 7.5
CVSS:3.x/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.0HIGH 7.1
CVSS:2.0/AV:N/AC:H/Au:S/C:C/I:C/A:C
References
CVE-2022-1227
HIGH8.8

A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.

Published: 2022-04-29Modified: 2024-11-21
CVSS 2.0MEDIUM 6.8
CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS 3.xHIGH 8.8
CVSS:3.x/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-27649
HIGH7.5

A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions. A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.

Published: 2022-04-04Modified: 2024-11-21
CVSS 2.0MEDIUM 6.0
CVSS:2.0/AV:N/AC:M/Au:S/C:P/I:P/A:P
CVSS 3.xHIGH 7.5
CVSS:3.x/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H