A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
29/04/2022
by Redhat
2 months ago
by Redhat
5 months ago
by Podman Project
a year ago
by Redhat
2 years ago
by Psgo Project
2 years ago
by Redhat
2 years ago
by Redhat
a month ago
by Fedoraproject
a month ago
by Redhat
2 months ago
by Redhat
2 months ago
by Redhat
2 months ago
by Redhat
2 months ago
by Redhat
2 months ago
by Redhat
2 months ago
by Redhat
2 months ago
by Redhat
2 months ago