ALT-PU-2023-1488-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-1227
A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=2070368
- https://bugzilla.redhat.com/show_bug.cgi?id=2070368
- https://github.com/containers/podman/issues/10941
- https://github.com/containers/podman/issues/10941
- FEDORA-2022-5e637f6cc6
- FEDORA-2022-5e637f6cc6
- https://security.netapp.com/advisory/ntap-20240628-0001/
- https://security.netapp.com/advisory/ntap-20240628-0001/
Modified: 2024-11-21
CVE-2022-27191
The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
- https://groups.google.com/g/golang-announce
- https://groups.google.com/g/golang-announce
- https://groups.google.com/g/golang-announce/c/-cp44ypCT5s
- https://groups.google.com/g/golang-announce/c/-cp44ypCT5s
- FEDORA-2022-5e637f6cc6
- FEDORA-2022-5e637f6cc6
- FEDORA-2022-14712f9699
- FEDORA-2022-14712f9699
- FEDORA-2022-a4c9009f3e
- FEDORA-2022-a4c9009f3e
- FEDORA-2022-c87047f163
- FEDORA-2022-c87047f163
- FEDORA-2022-d37fb34309
- FEDORA-2022-d37fb34309
- FEDORA-2022-30c5ed5625
- FEDORA-2022-30c5ed5625
- FEDORA-2022-3a63897745
- FEDORA-2022-3a63897745
- FEDORA-2022-ba365d3703
- FEDORA-2022-ba365d3703
- FEDORA-2022-08ae2dd481
- FEDORA-2022-08ae2dd481
- FEDORA-2022-5cbd6de569
- FEDORA-2022-5cbd6de569
- FEDORA-2022-fae3ecee19
- FEDORA-2022-fae3ecee19
- https://security.netapp.com/advisory/ntap-20220429-0002/
- https://security.netapp.com/advisory/ntap-20220429-0002/
Modified: 2024-11-21
CVE-2022-27649
A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions. A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
- https://bugzilla.redhat.com/show_bug.cgi?id=2066568
- https://bugzilla.redhat.com/show_bug.cgi?id=2066568
- https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0
- https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0
- https://github.com/containers/podman/security/advisories/GHSA-qvf8-p83w-v58j
- https://github.com/containers/podman/security/advisories/GHSA-qvf8-p83w-v58j
- FEDORA-2022-2067702f06
- FEDORA-2022-2067702f06
- FEDORA-2022-5e637f6cc6
- FEDORA-2022-5e637f6cc6
- FEDORA-2022-c87047f163
- FEDORA-2022-c87047f163
Modified: 2025-02-24
CVE-2023-0778
A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.