Описание
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 7 | podman | Fix deferred | ||
Red Hat Enterprise Linux 8 | container-tools:3.0/podman | Not affected | ||
Red Hat OpenShift Container Platform 3.11 | podman | Out of support scope | ||
Red Hat OpenShift Container Platform 4 | podman | Affected | ||
Red Hat Enterprise Linux 8 | container-tools | Fixed | RHSA-2022:7822 | 08.11.2022 |
Red Hat Enterprise Linux 8 | container-tools | Fixed | RHSA-2023:2802 | 16.05.2023 |
Red Hat Enterprise Linux 9 | buildah | Fixed | RHSA-2022:8008 | 15.11.2022 |
Red Hat Enterprise Linux 9 | podman | Fixed | RHSA-2022:8431 | 15.11.2022 |
Показывать по
Дополнительная информация
Статус:
3.6 Low
CVSS3
Связанные уязвимости
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
An incorrect handling of the supplementary groups in the Podman contai ...
3.6 Low
CVSS3