The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.
An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.
Base Score: 5.8
Impact Score: 4.9
Exploitability Score: 8.6
Base Score: 5.5
Impact Score: 3.6
Exploitability Score: 1.8
|145671||CentOS 8 : container-tools:rhel8 (CESA-2019:4269)||Nessus||CentOS Local Security Checks|
|135081||RHEL 7 : podman (RHSA-2020:1227)||Nessus||Red Hat Local Security Checks|
|135004||openSUSE Security Update : cni / cni-plugins / conmon / etc (openSUSE-2020-398)||Nessus||SuSE Local Security Checks|
|134653||SUSE SLES15 Security Update : cni, cni-plugins, conmon, fuse-overlayfs, podman (SUSE-SU-2020:0697-1)||Nessus||SuSE Local Security Checks|
|132667||Oracle Linux 8 : container-tools:ol8 (ELSA-2019-4269) (Ping Flood) (Reset Flood)||Nessus||Oracle Linux Local Security Checks|
|132234||RHEL 8 : container-tools:rhel8 (RHSA-2019:4269) (Ping Flood) (Reset Flood)||Nessus||Red Hat Local Security Checks|