9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
AI Score
Confidence
High
0.024 Low
EPSS
Percentile
90.0%
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
almalinux | 9 | x86_64 | podman | < 4.6.1-5.el9 | podman-4.6.1-5.el9.x86_64.rpm |
almalinux | 9 | noarch | podman-docker | < 4.6.1-5.el9 | podman-docker-4.6.1-5.el9.noarch.rpm |
almalinux | 9 | x86_64 | podman-plugins | < 4.6.1-5.el9 | podman-plugins-4.6.1-5.el9.x86_64.rpm |
almalinux | 9 | x86_64 | podman-gvproxy | < 4.6.1-5.el9 | podman-gvproxy-4.6.1-5.el9.x86_64.rpm |
almalinux | 9 | x86_64 | podman-remote | < 4.6.1-5.el9 | podman-remote-4.6.1-5.el9.x86_64.rpm |
almalinux | 9 | x86_64 | podman-tests | < 4.6.1-5.el9 | podman-tests-4.6.1-5.el9.x86_64.rpm |
almalinux | 9 | aarch64 | podman-tests | < 4.6.1-5.el9 | podman-tests-4.6.1-5.el9.aarch64.rpm |
almalinux | 9 | aarch64 | podman-plugins | < 4.6.1-5.el9 | podman-plugins-4.6.1-5.el9.aarch64.rpm |
almalinux | 9 | aarch64 | podman | < 4.6.1-5.el9 | podman-4.6.1-5.el9.aarch64.rpm |
almalinux | 9 | aarch64 | podman-gvproxy | < 4.6.1-5.el9 | podman-gvproxy-4.6.1-5.el9.aarch64.rpm |
access.redhat.com/errata/RHSA-2023:6474
access.redhat.com/security/cve/CVE-2022-41723
access.redhat.com/security/cve/CVE-2022-41724
access.redhat.com/security/cve/CVE-2022-41725
access.redhat.com/security/cve/CVE-2023-24534
access.redhat.com/security/cve/CVE-2023-24536
access.redhat.com/security/cve/CVE-2023-24537
access.redhat.com/security/cve/CVE-2023-24538
access.redhat.com/security/cve/CVE-2023-24539
access.redhat.com/security/cve/CVE-2023-24540
access.redhat.com/security/cve/CVE-2023-25173
access.redhat.com/security/cve/CVE-2023-29400
access.redhat.com/security/cve/CVE-2023-29406
access.redhat.com/security/cve/CVE-2023-3978
bugzilla.redhat.com/2174485
bugzilla.redhat.com/2178358
bugzilla.redhat.com/2178488
bugzilla.redhat.com/2178492
bugzilla.redhat.com/2184481
bugzilla.redhat.com/2184482
bugzilla.redhat.com/2184483
bugzilla.redhat.com/2184484
bugzilla.redhat.com/2196026
bugzilla.redhat.com/2196027
bugzilla.redhat.com/2196029
bugzilla.redhat.com/2222167
bugzilla.redhat.com/2228689
errata.almalinux.org/9/ALSA-2023-6474.html
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
AI Score
Confidence
High
0.024 Low
EPSS
Percentile
90.0%