{
  "threat_severity" : "Low",
  "public_date" : "2020-02-11T00:00:00Z",
  "bugzilla" : {
    "description" : "podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created",
    "id" : "1801152",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1801152"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.9",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-552",
  "details" : [ "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.", "A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume." ],
  "statement" : "Podman versions earlier than 1.6.0 are not affected. That includes the podman versions in OCP 4.2 and earlier.",
  "acknowledgement" : "This issue was discovered by Tristan De Cacqueray (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2020-04-28T00:00:00Z",
    "advisory" : "RHSA-2020:1650",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "container-tools:rhel8-8020020200324071414.0d58ad57"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.3",
    "release_date" : "2020-03-10T00:00:00Z",
    "advisory" : "RHSA-2020:0680",
    "cpe" : "cpe:/a:redhat:openshift:4.3::el8",
    "package" : "podman-0:1.6.4-7.el8"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "podman",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "container-tools:1.0/podman",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "container-tools:2.0/podman",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Not affected",
    "package_name" : "podman",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-1726\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-1726" ],
  "name" : "CVE-2020-1726",
  "mitigation" : {
    "value" : "If a volume needs to be attached as read-only to an untrusted container or container image, first attach it to a trusted container. Using the volume for the first time will make the attack impossible for other containers that are going to use the volume.",
    "lang" : "en:us"
  },
  "csaw" : false
}