#VU62468 Security restrictions bypass in Podman - CVE-2022-1227
Published: April 21, 2022 / Updated: April 1, 2023
Podman
Container Projects
Description
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to improper privilege management when running podman top on a container made from a maliciously-crafted image and using a user namespace. An attacker with full access to the container can execute arbitrary code in the host context.