An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container. Reference: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Looks like the patch is: https://github.com/containers/podman/commit/5c7f28336171f0a5137edd274e45608120d31289 Seems unreleased.
John, it's been replaced with https://github.com/containers/podman/pull/15696 - https://bugzilla.redhat.com/show_bug.cgi?id=2121542#c4
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7822 https://access.redhat.com/errata/RHSA-2022:7822
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8008 https://access.redhat.com/errata/RHSA-2022:8008
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8431 https://access.redhat.com/errata/RHSA-2022:8431
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2989
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2802 https://access.redhat.com/errata/RHSA-2023:2802