Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-1227

Опубликовано: 15 июл. 2021
Источник: redhat
CVSS3: 8

Описание

A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8container-tools:2.0/podmanAffected
Red Hat Enterprise Linux 8container-tools:4.0/conmonNot affected
Red Hat Enterprise Linux 8container-tools:4.0/podmanNot affected
Red Hat Enterprise Linux 9conmonNot affected
Red Hat Enterprise Linux 9podmanNot affected
Red Hat OpenShift Container Platform 4cri-oUnder investigation
Red Hat OpenShift Container Platform 4openshift4/cnf-tests-rhel8Affected
Red Hat OpenShift Container Platform 4openshift4/file-integrity-rhel8-operatorAffected
Red Hat OpenShift Container Platform 4openshift4/ose-machine-config-operatorNot affected
Red Hat Quay 3quay/quay-builder-rhel8Affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-281
https://bugzilla.redhat.com/show_bug.cgi?id=2070368psgo: Privilege escalation in 'podman top'

8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 3 лет назад

A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.

CVSS3: 8.8
nvd
около 3 лет назад

A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.

CVSS3: 8.8
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 8.8
debian
около 3 лет назад

A privilege escalation flaw was found in Podman. This flaw allows an a ...

rocky
около 3 лет назад

Important: container-tools:3.0 security update

8 High

CVSS3