It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856 | third party advisory issue tracking |
https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24 | third party advisory patch |
https://access.redhat.com/errata/RHSA-2018:2037 | third party advisory vendor advisory |