CVE-2022-1227: Podman publishes a malicious image to public registries
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.96585%
CWE
Published
4/30/2022
Updated
9/16/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/containers/psgo | go | < 1.7.2 | 1.7.2 |
github.com/containers/podman/v3 | go | < 3.4 | 3.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from psgo's namespace handling functions that executed container-provided nsenter binary and processed untrusted /proc data without proper isolation. The GitHub patch (containers/psgo#92) specifically modified these functions to remove nsenter dependency and implement safe user namespace mapping. Podman's 'top' command leveraged these vulnerable psgo functions, creating the privilege escalation path. The CWE-269 mapping confirms improper privilege management in these namespace joining operations.