Libpod Project Libpod vulnerabilities

13 known vulnerabilities affecting libpod_project/libpod.

Total CVEs
13
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH7MEDIUM6

Vulnerabilities

Page 1 of 1
CVE-2023-0778MEDIUMCVSS 6.8≥ 0, < 4.3.1+ds1-72023-03-27
CVE-2023-0778 [MEDIUM] CVE-2023-0778: A Time-of-check Time-of-use (TOCTOU) flaw was found in podman A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.
osv
CVE-2022-2989HIGHCVSS 7.1≥ 0, < 3.0.1+dfsg1-3+deb11u5≥ 0, < 4.3.1+ds1-42022-09-13
CVE-2022-2989 [HIGH] CVE-2022-2989: An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data m An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binar
osv
CVE-2019-25067HIGHCVSS 8.8≥ 0, < 3.0.0+dfsg1-12022-06-09
CVE-2019-25067 [HIGH] CVE-2019-25067: A vulnerability, which was classified as critical, was found in Podman and Varlink 1 A vulnerability, which was classified as critical, was found in Podman and Varlink 1.5.1. This affects an unknown part of the component API. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-143949 was assigned to this vulnerability.
osv
CVE-2022-1227HIGHCVSS 8.8≥ 0, < 3.0.1+dfsg1-3+deb11u2≥ 0, < 3.4.7+ds1-12022-04-29
CVE-2022-1227 [HIGH] CVE-2022-1227: A privilege escalation flaw was found in Podman A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
osv
CVE-2022-27649HIGHCVSS 7.5≥ 0, < 3.0.1+dfsg1-3+deb11u2≥ 0, < 3.4.6+ds1-12022-04-04
CVE-2022-27649 [HIGH] CVE-2022-27649: A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions. A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate thos
osv
CVE-2021-4024MEDIUMCVSS 6.5≥ 0, < 3.4.3+ds1-12021-12-23
CVE-2021-4024 [MEDIUM] CVE-2021-4024: A flaw was found in podman A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on th
osv
CVE-2021-20188HIGHCVSS 7.0≥ 0, < 2.0.2+dfsg1-32021-02-11
CVE-2021-20188 [HIGH] CVE-2021-20188: A flaw was found in podman before 1 A flaw was found in podman before 1.7.0. File permissions for non-root users running in a privileged container are not correctly checked. This flaw can be abused by a low-privileged user inside the container to access any other file in the container, even if owned by the root user inside the container. It does not allow to directly escape the container, though being a privileged container means that a lot of security featu
osv
CVE-2021-20199MEDIUMCVSS 5.9≥ 0, < 3.0.0~rc2+dfsg1-22021-02-02
CVE-2021-20199 [MEDIUM] CVE-2021-20199: Rootless containers run with Podman, receive all traffic with a source IP address of 127 Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards.
osv
CVE-2020-14370MEDIUMCVSS 5.3≥ 0, < 2.0.6+dfsg1-12020-09-23
CVE-2020-14370 [MEDIUM] CVE-2020-14370: An information disclosure vulnerability was found in containers/podman in versions before 2 An information disclosure vulnerability was found in containers/podman in versions before 2.0.5. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container will get leaked into subsequent containers. An attacker who has control over the subsequent
osv
CVE-2020-1726MEDIUMCVSS 5.9v1.6.02020-02-11
CVE-2020-1726 [MEDIUM] CWE-552 CVE-2020-1726: A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite exi A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite fil
nvdosv
CVE-2019-18466MEDIUMCVSS 5.5fixed in 1.6.02019-10-28
CVE-2019-18466 [MEDIUM] CWE-59 CVE-2019-18466: An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existi
nvd
CVE-2019-10152HIGHCVSS 7.2fixed in 1.4.02019-07-30
CVE-2019-10152 [HIGH] CWE-22 CVE-2019-10152: A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it hand A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.
nvd
CVE-2018-10856HIGHCVSS 8.8fixed in 0.6.12018-07-03
CVE-2018-10856 [HIGH] CWE-250 CVE-2018-10856: It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.
nvd