An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
podman project podman |
||
redhat enterprise linux 7.0 |
||
redhat openshift container platform 3.11 |
||
redhat enterprise linux 8.0 |
||
redhat openshift container platform 4.0 |
||
redhat enterprise linux 9.0 |