8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.005 Low
EPSS
Percentile
76.6%
Information disclosure flaw was found in Buildah (CVE-2021-3602) podman allows forwarding hosts ports to vm from within vm (CVE-2021-4024) Allows use “…/” separators in containernetworking/cni to reference binaries such as ‘reboot’ in network configuration (CVE-2021-20206) github.com/containers/storage ddos via crafted tar file (CVE-2021-20291) buildah improper checking of X.509 certificate (CVE-2021-34558) buildah improper Content-Type checking (CVE-2021-41190) podman privilege escalation (CVE-2022-1227) podman incorrect handling of the supplementary groups (CVE-2022-2989) buildah incorrect handling of the supplementary groups (CVE-2022-2990) skopeo/podman Denial of Service through unbounded cardinality, and potential memory exhaustion (CVE-2022-21698) buildah/podman AddHostKey denail of service (CVE-2022-27191) podman inheritable file capabilities (CVE-2022-27649) buildah inheritable file capabilities (CVE-2022-27651)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 8 | noarch | skopeo | < 1.12.0-2 | skopeo-1.12.0-2.mga8 |
Mageia | 8 | noarch | conmon | < 2.1.5-1 | conmon-2.1.5-1.mga8 |
Mageia | 8 | noarch | buildah | < 1.30.0-1 | buildah-1.30.0-1.mga8 |
Mageia | 8 | noarch | podman | < 4.5.1-1 | podman-4.5.1-1.mga8 |
access.redhat.com/errata/RHSA-2022:7822
bugs.mageia.org/show_bug.cgi?id=28885
bugzilla.redhat.com/show_bug.cgi?id=1969264
github.com/containers/buildah/security/advisories/GHSA-7638-r9r3-rmjj
lists.fedoraproject.org/archives/list/[email protected]/message/SPYOHNG2Q7DCAQZMGYLMENLKALGDLG3X/
lists.fedoraproject.org/archives/list/[email protected]/thread/25LCWXTFK5CEUYRWF74Y4C7VIMWDH2OI/
lists.fedoraproject.org/archives/list/[email protected]/thread/2IK53GWZ475OQ6ENABKMJMTOBZG6LXUR/
lists.fedoraproject.org/archives/list/[email protected]/thread/2VWH6X6HOFPO6HTESF42HIJZEPXSWVIO/
lists.fedoraproject.org/archives/list/[email protected]/thread/3TUZNDAH2B26VPBK342UC3BHZNLBUXGX/
lists.fedoraproject.org/archives/list/[email protected]/thread/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/
lists.fedoraproject.org/archives/list/[email protected]/thread/4ZGUZD4KLTFHCQDYKB64PUVEWIB3YTL2/
lists.fedoraproject.org/archives/list/[email protected]/thread/75MV35CPCW3Q5MAQR6OGEJEYVVEZ2MXI/
lists.fedoraproject.org/archives/list/[email protected]/thread/A4W4OXY44AKASYVR6NZPWKHHCVDI7LMX/
lists.fedoraproject.org/archives/list/[email protected]/thread/CAYDF5STQQ2MWYFKJISEVKKCDRW6K3MP/
lists.fedoraproject.org/archives/list/[email protected]/thread/F3ARUFZTP54XZ36JGEVCIBJZPX4LTF3G/
lists.fedoraproject.org/archives/list/[email protected]/thread/FY3N7H6VSDZM37B4SKM2PFFCUWU7QYWN/
lists.fedoraproject.org/archives/list/[email protected]/thread/GDWE3ABI6VTR2BO4UV3HXEUYUN5CKUES/
lists.fedoraproject.org/archives/list/[email protected]/thread/GWKDCFQ4EVHMJJ6V2EAABHSRZK34HUUT/
lists.fedoraproject.org/archives/list/[email protected]/thread/HRFGZZIO26CZN3P2K72PZABZKT5J4IUT/
lists.fedoraproject.org/archives/list/[email protected]/thread/HX2XHVJTED7LYWP3LLJ3FTJMPQ4KYG44/
lists.fedoraproject.org/archives/list/[email protected]/thread/I5RR5DUZHU2FFOE3EKYH6T74SA43EB4T/
lists.fedoraproject.org/archives/list/[email protected]/thread/IA7RFWWF2TAD6ABTSEOCANQQEGMSU4YP/
lists.fedoraproject.org/archives/list/[email protected]/thread/IKOQ2O3CAYO75ZV2PUCTL6G72K7JVGCT/
lists.fedoraproject.org/archives/list/[email protected]/thread/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX/
lists.fedoraproject.org/archives/list/[email protected]/thread/JYIUSR4YP52PWG7YE7AA3DZ5OSURNFJB/
lists.fedoraproject.org/archives/list/[email protected]/thread/LALQQUUGFHODEBITRRY26YKZFR2FQN5X/
lists.fedoraproject.org/archives/list/[email protected]/thread/OPCGIPJ4YWKRBYUO5NIO6H5RZROPWZVJ/
lists.fedoraproject.org/archives/list/[email protected]/thread/QKTJEKY2C35BIT22ZIPQZRQ4WY6ZW4W5/
lists.fedoraproject.org/archives/list/[email protected]/thread/R5D7XL7FL24TWFMGQ3K2S72EOUSLZMKL/
lists.fedoraproject.org/archives/list/[email protected]/thread/WXJ2MVMAHOIGRH37ZSFYC4EVWLJFL2EQ/
lists.fedoraproject.org/archives/list/[email protected]/thread/WYEKQOCOMRYA54WFUPJNNBZD5CPNRGHX/
lists.fedoraproject.org/archives/list/[email protected]/thread/XNDJJ36ISNZQL6I3K25POE5HZZJYUEIV/
lists.fedoraproject.org/archives/list/[email protected]/thread/XOKBC52ABMXFW242S6YAQLBUX3QPEDOR/
lists.fedoraproject.org/archives/list/[email protected]/thread/ZAB6D3CGIKTOPITATFKEJEJZRRFUNAAF/
lists.fedoraproject.org/archives/list/[email protected]/thread/ZNMB7O2UIXE34PGSCSOULGHPX5LIJBMM/
lists.opensuse.org/archives/list/[email protected]/thread/3XQI3JGSN3QUR2TTD5PKGO62TDA7VS3I/
lists.opensuse.org/archives/list/[email protected]/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/
lists.opensuse.org/archives/list/[email protected]/thread/BOSR3QWWI2B7POIUKKJJMCEE2T3PFI5B/
lists.opensuse.org/archives/list/[email protected]/thread/COAZMKGIFFK6JHHLFRHHTVMQ4HK5XI73/
lists.opensuse.org/archives/list/[email protected]/thread/NKDIDANN2OO6H6AMGCEODFI5ZES7PJYI/
lists.opensuse.org/archives/list/[email protected]/thread/PL4K6SMPK6ISI4ZPOM3PI6GAYO6XYPYB/
lists.opensuse.org/archives/list/[email protected]/thread/WFIDXN6UAK2I4PPVFPBE4STNQH2FZQ4A/
lists.suse.com/pipermail/sle-security-updates/2022-October/012775.html
lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html
ubuntu.com/security/notices/USN-6170-1
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.005 Low
EPSS
Percentile
76.6%