Vulnerability Name: | CVE-2022-2989 (CCN-236020) | ||||||||||||||||||||||||||||||||
Assigned: | 2022-08-22 | ||||||||||||||||||||||||||||||||
Published: | 2022-08-22 | ||||||||||||||||||||||||||||||||
Updated: | 2023-02-12 | ||||||||||||||||||||||||||||||||
Summary: | An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) 6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:U/RC:R)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:U/RC:R)
3.2 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.8 High (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:N)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-842 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-2989 Source: CCN Type: Red Hat Bugzilla - Bug 2121445 (CVE-2022-2989) - CVE-2022-2989 podman: possible information disclosure and modification Source: secalert@redhat.com Type: Exploit, Issue Tracking, Patch, Third Party Advisory secalert@redhat.com Source: XF Type: UNKNOWN podman-cve20222989-sec-bypass(236020) Source: CCN Type: Podman Web site Podman Source: secalert@redhat.com Type: Exploit, Third Party Advisory secalert@redhat.com | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |