Several security issues in libpod 3.4.x
Bug #1971034 reported by
Reinhard Tartler
This bug affects 9 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
libpod (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
Impish |
Confirmed
|
Undecided
|
Unassigned | ||
Jammy |
Confirmed
|
Undecided
|
Unassigned | ||
Kinetic |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
Ubuntu 20.04 ships currently with podman 3.4.4. Current upstream is at version 3.4.7 and ships with a number of security updates:
3.4.7
* This release addresses CVE-2022-1227, where running podman top on a container made from a maliciously-crafted image and using a user namespace could allow for code execution in the host context.
3.4.6
* This release addresses CVE-2022-27191, where an attacker could potentially cause crashes in remote Podman by using incorrect SSH ciphers.
3.4.5
* This release addresses CVE-2022-27649, where Podman would set excess inheritable capabilities for processes in containers.
Bugfixes
CVE References
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res