First published: Wed Feb 08 2023(Updated: )
A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/podman | <3:4.4.1-3.rhaos4.13.el9 | 3:4.4.1-3.rhaos4.13.el9 |
Podman Project Podman | ||
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
redhat/podman | <4.4.2 | 4.4.2 |
go/github.com/containers/podman/v4 | <4.4.2 | 4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-0778 is a Time-of-check Time-of-use (TOCTOU) flaw found in podman, which may allow a malicious user to access arbitrary files on the host file system.
CVE-2023-0778 affects podman by allowing a malicious user to replace a normal file in a volume with a symlink while exporting the volume.
The severity of CVE-2023-0778 is medium, with a severity value of 6.8.
Podman versions up to 3:4.4.1-3.rhaos4.13.el9, Red Hat Enterprise Linux 8.0, and Red Hat Enterprise Linux 9.0 are affected by CVE-2023-0778.
To fix CVE-2023-0778, update podman to version 3:4.4.1-3.rhaos4.13.el9 or apply the relevant security patch provided by Red Hat for Red Hat Enterprise Linux.