CVE-2022-1227

8.8 HIGH

📋 TL;DR

CVE-2022-1227 is a privilege escalation vulnerability in Podman that allows attackers to gain host filesystem access when users run 'podman top' on malicious container images. This affects Podman users who pull images from public registries. The vulnerability can lead to information disclosure or denial of service on the host system.

💻 Affected Systems

Products:
  • Podman
Versions: Podman versions before 4.1.0
Operating Systems: Linux distributions with Podman
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when running 'podman top' command on malicious container images.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete host compromise allowing attacker to read sensitive files, modify system configurations, or cause system crashes leading to denial of service.

🟠

Likely Case

Information disclosure where attackers can read sensitive host files and potentially escalate privileges further.

🟢

If Mitigated

Limited impact if users only run trusted images from verified sources and have proper container isolation.

🌐 Internet-Facing: MEDIUM - Requires user interaction (running podman top) and downloading malicious images from public registries.
🏢 Internal Only: LOW - Internal registries with proper image scanning and trusted sources reduce exposure significantly.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires convincing users to download and run malicious images, then execute 'podman top' command.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Podman 4.1.0 and later

Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=2070368

Restart Required: No

Instructions:

1. Update Podman to version 4.1.0 or later using your package manager. 2. For RHEL/CentOS: 'sudo yum update podman'. 3. For Fedora: 'sudo dnf update podman'. 4. For Ubuntu/Debian: Use official repositories or build from source.

🔧 Temporary Workarounds

Avoid podman top command

linux

Do not run 'podman top' command on untrusted container images

Use trusted registries only

linux

Configure Podman to only pull images from trusted, verified registries

podman system connection add --default <trusted-registry>

🧯 If You Can't Patch

  • Implement strict image provenance policies and only use signed images from trusted sources
  • Disable or restrict 'podman top' command usage through SELinux policies or user permissions

🔍 How to Verify

Check if Vulnerable:

Check Podman version with 'podman --version' and verify if it's below 4.1.0

Check Version:

podman --version

Verify Fix Applied:

Run 'podman --version' and confirm version is 4.1.0 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual 'podman top' command executions
  • Container image pulls from unknown registries
  • Unexpected file access patterns from containers

Network Indicators:

  • Downloads from untrusted container registries
  • Unusual outbound connections from container hosts

SIEM Query:

source="podman" AND (command="top" OR command="pull") AND registry NOT IN ["trusted-registry1", "trusted-registry2"]

🔗 References

📤 Share & Export