First published: Tue Aug 09 2022(Updated: )
The version of podman as released for Red Hat Enterprise Linux 7 Extras via RHSA-2022:2190 advisory included an incorrect version of podman missing the fix for CVE-2020-8945, which was previously fixed via RHSA-2020:2117. This issue could possibly be used to crash or cause potential code execution in Go applications that use the Go GPGME wrapper library, under certain conditions, during GPG signature verification.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/podman | <0:1.6.4-36.el7_9 | 0:1.6.4-36.el7_9 |
Red Hat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Podman Project Podman | =1.6.4-32.el7_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-2738.
The podman package with version 1.6.4-36.el7_9 on Red Hat Enterprise Linux 7 Extras is affected by this vulnerability.
The severity of CVE-2022-2738 is high.
Upgrade the podman package to version 1.6.4-36.el7_9 or higher.
You can find more information about this vulnerability on the Red Hat Security Advisory RHSA-2022:2190.