7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.005 Low
EPSS
Percentile
76.6%
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
almalinux | 9 | aarch64 | podman-gvproxy | < 4.2.0-3.el9 | podman-gvproxy-4.2.0-3.el9.aarch64.rpm |
almalinux | 9 | noarch | podman-docker | < 4.2.0-3.el9 | podman-docker-4.2.0-3.el9.noarch.rpm |
almalinux | 9 | aarch64 | podman-plugins | < 4.2.0-3.el9 | podman-plugins-4.2.0-3.el9.aarch64.rpm |
almalinux | 9 | aarch64 | podman-tests | < 4.2.0-3.el9 | podman-tests-4.2.0-3.el9.aarch64.rpm |
almalinux | 9 | aarch64 | podman | < 4.2.0-3.el9 | podman-4.2.0-3.el9.aarch64.rpm |
almalinux | 9 | aarch64 | podman-remote | < 4.2.0-3.el9 | podman-remote-4.2.0-3.el9.aarch64.rpm |
almalinux | 9 | x86_64 | podman-remote | < 4.2.0-3.el9 | podman-remote-4.2.0-3.el9.x86_64.rpm |
almalinux | 9 | x86_64 | podman-tests | < 4.2.0-3.el9 | podman-tests-4.2.0-3.el9.x86_64.rpm |
almalinux | 9 | x86_64 | podman-gvproxy | < 4.2.0-3.el9 | podman-gvproxy-4.2.0-3.el9.x86_64.rpm |
almalinux | 9 | x86_64 | podman | < 4.2.0-3.el9 | podman-4.2.0-3.el9.x86_64.rpm |
access.redhat.com/errata/RHSA-2022:7954
access.redhat.com/security/cve/CVE-2020-28851
access.redhat.com/security/cve/CVE-2020-28852
access.redhat.com/security/cve/CVE-2021-20199
access.redhat.com/security/cve/CVE-2021-20291
access.redhat.com/security/cve/CVE-2021-33197
access.redhat.com/security/cve/CVE-2021-34558
access.redhat.com/security/cve/CVE-2021-4024
access.redhat.com/security/cve/CVE-2022-27191
bugzilla.redhat.com/1913333
bugzilla.redhat.com/1913338
bugzilla.redhat.com/1919050
bugzilla.redhat.com/1939485
bugzilla.redhat.com/1983596
bugzilla.redhat.com/1989570
bugzilla.redhat.com/2026675
bugzilla.redhat.com/2064702
errata.almalinux.org/9/ALSA-2022-7954.html
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.005 Low
EPSS
Percentile
76.6%