Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-10856 (GCVE-0-2018-10856)
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:2037 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2037 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24 | Patch, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:46:47.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24" }, { "name": "RHSA-2018:2037", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2037" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "podman", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "podman 0.6.1" } ] } ], "datePublic": "2018-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "CWE-250", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-03T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24" }, { "name": "RHSA-2018:2037", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2037" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-10856", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "podman", "version": { "version_data": [ { "version_value": "podman 0.6.1" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-250" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856" }, { "name": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24", "refsource": "CONFIRM", "url": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24" }, { "name": "RHSA-2018:2037", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2037" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-10856", "datePublished": "2018-07-02T18:00:00", "dateReserved": "2018-05-09T00:00:00", "dateUpdated": "2024-08-05T07:46:47.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-10856\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-07-03T01:29:00.643\",\"lastModified\":\"2024-11-21T03:42:09.173\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto que podman en versiones anteriores a la 0.6.1 no deja capacidades cuando ejecuta un contenedor como usuario no-root. Esto resulta en que se otorgan privilegios innecesarios al contenedor.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":3.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-250\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-732\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpod_project:libpod:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.6.1\",\"matchCriteriaId\":\"AA1A340D-B1C2-48F0-A7E6-BE8C639B4626\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2037\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2037\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
RHSA-2018:2037
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for podman is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nThe following packages have been upgraded to a later upstream version: podman (0.6.1). (BZ#1584429)\n\nSecurity Fix(es):\n\n* podman: Containers run as non-root users do not drop capabilities (CVE-2018-10856)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2037", "url": "https://access.redhat.com/errata/RHSA-2018:2037" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1592166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592166" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2037.json" } ], "title": "Red Hat Security Advisory: podman security update", "tracking": { "current_release_date": "2025-10-09T18:26:38+00:00", "generator": { "date": "2025-10-09T18:26:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2018:2037", "initial_release_date": "2018-06-26T19:01:08+00:00", "revision_history": [ { "date": "2018-06-26T19:01:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-06-29T09:31:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T18:26:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "product": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_id": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@0.6.1-3.git3e0ff12.el7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "product": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "product_id": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@0.6.1-3.git3e0ff12.el7?arch=s390x" } } }, { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_id": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@0.6.1-3.git3e0ff12.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.src", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.src", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.src", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le" }, "product_reference": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x" }, "product_reference": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" }, "product_reference": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10856", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1592166" } ], "notes": [ { "category": "description", "text": "It has been discovered that podman does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: Containers run as non-root users do not drop capabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10856" }, { "category": "external", "summary": "RHBZ#1592166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10856", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10856" } ], "release_date": "2018-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-26T19:01:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2037" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: Containers run as non-root users do not drop capabilities" } ] }
rhsa-2018_2037
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for podman is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nThe following packages have been upgraded to a later upstream version: podman (0.6.1). (BZ#1584429)\n\nSecurity Fix(es):\n\n* podman: Containers run as non-root users do not drop capabilities (CVE-2018-10856)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2037", "url": "https://access.redhat.com/errata/RHSA-2018:2037" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1592166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592166" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2037.json" } ], "title": "Red Hat Security Advisory: podman security update", "tracking": { "current_release_date": "2024-11-22T11:59:52+00:00", "generator": { "date": "2024-11-22T11:59:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2037", "initial_release_date": "2018-06-26T19:01:08+00:00", "revision_history": [ { "date": "2018-06-26T19:01:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-06-29T09:31:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:59:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "product": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_id": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@0.6.1-3.git3e0ff12.el7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "product": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "product_id": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@0.6.1-3.git3e0ff12.el7?arch=s390x" } } }, { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_id": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@0.6.1-3.git3e0ff12.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.src", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.src", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.src", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le" }, "product_reference": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x" }, "product_reference": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" }, "product_reference": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10856", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1592166" } ], "notes": [ { "category": "description", "text": "It has been discovered that podman does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: Containers run as non-root users do not drop capabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10856" }, { "category": "external", "summary": "RHBZ#1592166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10856", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10856" } ], "release_date": "2018-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-26T19:01:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2037" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: Containers run as non-root users do not drop capabilities" } ] }
rhsa-2018:2037
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for podman is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nThe following packages have been upgraded to a later upstream version: podman (0.6.1). (BZ#1584429)\n\nSecurity Fix(es):\n\n* podman: Containers run as non-root users do not drop capabilities (CVE-2018-10856)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2037", "url": "https://access.redhat.com/errata/RHSA-2018:2037" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1592166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592166" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2037.json" } ], "title": "Red Hat Security Advisory: podman security update", "tracking": { "current_release_date": "2025-10-09T18:26:38+00:00", "generator": { "date": "2025-10-09T18:26:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2018:2037", "initial_release_date": "2018-06-26T19:01:08+00:00", "revision_history": [ { "date": "2018-06-26T19:01:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-06-29T09:31:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T18:26:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "product": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_id": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@0.6.1-3.git3e0ff12.el7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "product": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "product_id": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@0.6.1-3.git3e0ff12.el7?arch=s390x" } } }, { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_id": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@0.6.1-3.git3e0ff12.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "podman-0:0.6.1-3.git3e0ff12.el7.src", "product": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.src", "product_id": "podman-0:0.6.1-3.git3e0ff12.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@0.6.1-3.git3e0ff12.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.src", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64" }, "product_reference": "podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le" }, "product_reference": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x" }, "product_reference": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" }, "product_reference": "podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10856", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1592166" } ], "notes": [ { "category": "description", "text": "It has been discovered that podman does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: Containers run as non-root users do not drop capabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10856" }, { "category": "external", "summary": "RHBZ#1592166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10856", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10856" } ], "release_date": "2018-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-26T19:01:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2037" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.src", "7Server-EXTRAS-7.5:podman-0:0.6.1-3.git3e0ff12.el7.x86_64", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.ppc64le", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.s390x", "7Server-EXTRAS-7.5:podman-debuginfo-0:0.6.1-3.git3e0ff12.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: Containers run as non-root users do not drop capabilities" } ] }
gsd-2018-10856
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-10856", "description": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.", "id": "GSD-2018-10856", "references": [ "https://www.suse.com/security/cve/CVE-2018-10856.html", "https://access.redhat.com/errata/RHSA-2018:2037" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-10856" ], "details": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.", "id": "GSD-2018-10856", "modified": "2023-12-13T01:22:41.710587Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-10856", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "podman", "version": { "version_data": [ { "version_value": "podman 0.6.1" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-250" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856" }, { "name": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24", "refsource": "CONFIRM", "url": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24" }, { "name": "RHSA-2018:2037", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2037" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003cv0.6.1", "affected_versions": "All versions before 0.6.1", "cvss_v2": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-732", "CWE-937" ], "date": "2023-07-21", "description": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.", "fixed_versions": [ "v0.6.1" ], "identifier": "CVE-2018-10856", "identifiers": [ "GHSA-wp7w-vx86-vj9h", "CVE-2018-10856" ], "not_impacted": "All versions starting from 0.6.1", "package_slug": "go/github.com/containers/podman/v4", "pubdate": "2022-05-13", "solution": "Upgrade to version 0.6.1 or above.", "title": "Incorrect Permission Assignment for Critical Resource", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2018-10856", "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24", "https://access.redhat.com/errata/RHSA-2018:2037", "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856", "https://github.com/advisories/GHSA-wp7w-vx86-vj9h" ], "uuid": "1d5ca3ce-e45f-4dba-acd9-cc1f3eb93b16", "versions": [ { "commit": { "sha": "c62d8e5cc80656d38df40ceb3e3a5e298eb80320", "tags": [ "v0.6.1" ], "timestamp": "20180601222006" }, "number": "v0.6.1" } ] } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libpod_project:libpod:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.6.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-10856" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-732" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856" }, { "name": "RHSA-2018:2037", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2037" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-09T23:33Z", "publishedDate": "2018-07-03T01:29Z" } } }
ghsa-wp7w-vx86-vj9h
Vulnerability from github
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/containers/podman" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.6.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2018-10856" ], "database_specific": { "cwe_ids": [ "CWE-732" ], "github_reviewed": true, "github_reviewed_at": "2023-07-21T21:42:33Z", "nvd_published_at": "2018-07-03T01:29:00Z", "severity": "HIGH" }, "details": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.", "id": "GHSA-wp7w-vx86-vj9h", "modified": "2024-09-16T15:00:24Z", "published": "2022-05-13T01:34:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10856" }, { "type": "WEB", "url": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2037" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856" }, { "type": "PACKAGE", "url": "https://github.com/containers/podman" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Podman Elevated Container Privileges" }
opensuse-su-2024:11177-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "podman-3.3.1-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the podman-3.3.1-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11177", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11177-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10856 page", "url": "https://www.suse.com/security/cve/CVE-2018-10856/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10152 page", "url": "https://www.suse.com/security/cve/CVE-2019-10152/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10214 page", "url": "https://www.suse.com/security/cve/CVE-2019-10214/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14370 page", "url": "https://www.suse.com/security/cve/CVE-2020-14370/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1726 page", "url": "https://www.suse.com/security/cve/CVE-2020-1726/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20199 page", "url": "https://www.suse.com/security/cve/CVE-2021-20199/" } ], "title": "podman-3.3.1-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11177-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "podman-3.3.1-2.1.aarch64", "product": { "name": "podman-3.3.1-2.1.aarch64", "product_id": "podman-3.3.1-2.1.aarch64" } }, { "category": "product_version", "name": "podman-cni-config-3.3.1-2.1.aarch64", "product": { "name": "podman-cni-config-3.3.1-2.1.aarch64", "product_id": "podman-cni-config-3.3.1-2.1.aarch64" } }, { "category": "product_version", "name": "podman-docker-3.3.1-2.1.aarch64", "product": { "name": "podman-docker-3.3.1-2.1.aarch64", "product_id": "podman-docker-3.3.1-2.1.aarch64" } }, { "category": "product_version", "name": "podman-remote-3.3.1-2.1.aarch64", "product": { "name": "podman-remote-3.3.1-2.1.aarch64", "product_id": "podman-remote-3.3.1-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "podman-3.3.1-2.1.ppc64le", "product": { "name": "podman-3.3.1-2.1.ppc64le", "product_id": "podman-3.3.1-2.1.ppc64le" } }, { "category": "product_version", "name": "podman-cni-config-3.3.1-2.1.ppc64le", "product": { "name": "podman-cni-config-3.3.1-2.1.ppc64le", "product_id": "podman-cni-config-3.3.1-2.1.ppc64le" } }, { "category": "product_version", "name": "podman-docker-3.3.1-2.1.ppc64le", "product": { "name": "podman-docker-3.3.1-2.1.ppc64le", "product_id": "podman-docker-3.3.1-2.1.ppc64le" } }, { "category": "product_version", "name": "podman-remote-3.3.1-2.1.ppc64le", "product": { "name": "podman-remote-3.3.1-2.1.ppc64le", "product_id": "podman-remote-3.3.1-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "podman-3.3.1-2.1.s390x", "product": { "name": "podman-3.3.1-2.1.s390x", "product_id": "podman-3.3.1-2.1.s390x" } }, { "category": "product_version", "name": "podman-cni-config-3.3.1-2.1.s390x", "product": { "name": "podman-cni-config-3.3.1-2.1.s390x", "product_id": "podman-cni-config-3.3.1-2.1.s390x" } }, { "category": "product_version", "name": "podman-docker-3.3.1-2.1.s390x", "product": { "name": "podman-docker-3.3.1-2.1.s390x", "product_id": "podman-docker-3.3.1-2.1.s390x" } }, { "category": "product_version", "name": "podman-remote-3.3.1-2.1.s390x", "product": { "name": "podman-remote-3.3.1-2.1.s390x", "product_id": "podman-remote-3.3.1-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "podman-3.3.1-2.1.x86_64", "product": { "name": "podman-3.3.1-2.1.x86_64", "product_id": "podman-3.3.1-2.1.x86_64" } }, { "category": "product_version", "name": "podman-cni-config-3.3.1-2.1.x86_64", "product": { "name": "podman-cni-config-3.3.1-2.1.x86_64", "product_id": "podman-cni-config-3.3.1-2.1.x86_64" } }, { "category": "product_version", "name": "podman-docker-3.3.1-2.1.x86_64", "product": { "name": "podman-docker-3.3.1-2.1.x86_64", "product_id": "podman-docker-3.3.1-2.1.x86_64" } }, { "category": "product_version", "name": "podman-remote-3.3.1-2.1.x86_64", "product": { "name": "podman-remote-3.3.1-2.1.x86_64", "product_id": "podman-remote-3.3.1-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "podman-3.3.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64" }, "product_reference": "podman-3.3.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3.3.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le" }, "product_reference": "podman-3.3.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3.3.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x" }, "product_reference": "podman-3.3.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3.3.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64" }, "product_reference": "podman-3.3.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-3.3.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64" }, "product_reference": "podman-cni-config-3.3.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-3.3.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le" }, "product_reference": "podman-cni-config-3.3.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-3.3.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x" }, "product_reference": "podman-cni-config-3.3.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-cni-config-3.3.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64" }, "product_reference": "podman-cni-config-3.3.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3.3.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64" }, "product_reference": "podman-docker-3.3.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3.3.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le" }, "product_reference": "podman-docker-3.3.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3.3.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x" }, "product_reference": "podman-docker-3.3.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3.3.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64" }, "product_reference": "podman-docker-3.3.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3.3.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64" }, "product_reference": "podman-remote-3.3.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3.3.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le" }, "product_reference": "podman-remote-3.3.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3.3.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x" }, "product_reference": "podman-remote-3.3.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3.3.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" }, "product_reference": "podman-remote-3.3.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10856" } ], "notes": [ { "category": "general", "text": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10856", "url": "https://www.suse.com/security/cve/CVE-2018-10856" }, { "category": "external", "summary": "SUSE Bug 1097970 for CVE-2018-10856", "url": "https://bugzilla.suse.com/1097970" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10856" }, { "cve": "CVE-2019-10152", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10152" } ], "notes": [ { "category": "general", "text": "A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10152", "url": "https://www.suse.com/security/cve/CVE-2019-10152" }, { "category": "external", "summary": "SUSE Bug 1136974 for CVE-2019-10152", "url": "https://bugzilla.suse.com/1136974" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-10152" }, { "cve": "CVE-2019-10214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10214" } ], "notes": [ { "category": "general", "text": "The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10214", "url": "https://www.suse.com/security/cve/CVE-2019-10214" }, { "category": "external", "summary": "SUSE Bug 1144065 for CVE-2019-10214", "url": "https://bugzilla.suse.com/1144065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10214" }, { "cve": "CVE-2020-14370", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14370" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability was found in containers/podman in versions before 2.0.5. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container will get leaked into subsequent containers. An attacker who has control over the subsequent containers could use this flaw to gain access to sensitive information stored in such variables.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14370", "url": "https://www.suse.com/security/cve/CVE-2020-14370" }, { "category": "external", "summary": "SUSE Bug 1176804 for CVE-2020-14370", "url": "https://bugzilla.suse.com/1176804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14370" }, { "cve": "CVE-2020-1726", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1726" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1726", "url": "https://www.suse.com/security/cve/CVE-2020-1726" }, { "category": "external", "summary": "SUSE Bug 1164090 for CVE-2020-1726", "url": "https://bugzilla.suse.com/1164090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-1726" }, { "cve": "CVE-2021-20199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20199" } ], "notes": [ { "category": "general", "text": "Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20199", "url": "https://www.suse.com/security/cve/CVE-2021-20199" }, { "category": "external", "summary": "SUSE Bug 1181640 for CVE-2021-20199", "url": "https://bugzilla.suse.com/1181640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:podman-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-cni-config-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-docker-3.3.1-2.1.x86_64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.aarch64", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.ppc64le", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.s390x", "openSUSE Tumbleweed:podman-remote-3.3.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2021-20199" } ] }
cnvd-2018-12555
Vulnerability from cnvd
Title: podman权限提升漏洞
Description:
libpod是一个用于在Pod中运行基于OCI的容器的库。podman是其中的一个用于管理Pods的工具。
podman 0.6.1及之前版本中存在安全漏洞。攻击者可利用该漏洞使容器获取提升的权限。
Severity: 高
Patch Name: podman权限提升漏洞的补丁
Patch Description:
libpod是一个用于在Pod中运行基于OCI的容器的库。podman是其中的一个用于管理Pods的工具。
podman 0.6.1及之前版本中存在安全漏洞。攻击者可利用该漏洞使容器获取提升的权限目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24
Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856 https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24
Name | podman podman <0.6.1 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-10856" } }, "description": "libpod\u662f\u4e00\u4e2a\u7528\u4e8e\u5728Pod\u4e2d\u8fd0\u884c\u57fa\u4e8eOCI\u7684\u5bb9\u5668\u7684\u5e93\u3002podman\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7528\u4e8e\u7ba1\u7406Pods\u7684\u5de5\u5177\u3002\r\n\r\npodman 0.6.1\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4f7f\u5bb9\u5668\u83b7\u53d6\u63d0\u5347\u7684\u6743\u9650\u3002", "discovererName": "Sam Fowler", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-12555", "openTime": "2018-07-05", "patchDescription": "libpod\u662f\u4e00\u4e2a\u7528\u4e8e\u5728Pod\u4e2d\u8fd0\u884c\u57fa\u4e8eOCI\u7684\u5bb9\u5668\u7684\u5e93\u3002podman\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7528\u4e8e\u7ba1\u7406Pods\u7684\u5de5\u5177\u3002\r\n\r\npodman 0.6.1\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4f7f\u5bb9\u5668\u83b7\u53d6\u63d0\u5347\u7684\u6743\u9650\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "podman\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "podman podman \u003c0.6.1" }, "referenceLink": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856\r\nhttps://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24", "serverity": "\u9ad8", "submitTime": "2018-07-05", "title": "podman\u6743\u9650\u63d0\u5347\u6f0f\u6d1e" }
fkie_cve-2018-10856
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:2037 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2037 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24 | Patch, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
libpod_project | libpod | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libpod_project:libpod:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA1A340D-B1C2-48F0-A7E6-BE8C639B4626", "versionEndExcluding": "0.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container." }, { "lang": "es", "value": "Se ha descubierto que podman en versiones anteriores a la 0.6.1 no deja capacidades cuando ejecuta un contenedor como usuario no-root. Esto resulta en que se otorgan privilegios innecesarios al contenedor." } ], "id": "CVE-2018-10856", "lastModified": "2024-11-21T03:42:09.173", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-03T01:29:00.643", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2037" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-250" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.