Vulnerability Details CVE-2022-1227
A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.3
EPSS Ranking 96.4%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.8
Products affected by CVE-2022-1227
-
cpe:2.3:a:podman_project:podman:-
-
cpe:2.3:a:podman_project:podman:0.10.1
-
cpe:2.3:a:podman_project:podman:0.10.1.1
-
cpe:2.3:a:podman_project:podman:0.10.1.2
-
cpe:2.3:a:podman_project:podman:0.10.1.3
-
cpe:2.3:a:podman_project:podman:0.11.1
-
cpe:2.3:a:podman_project:podman:0.11.1.1
-
cpe:2.3:a:podman_project:podman:0.12.1
-
cpe:2.3:a:podman_project:podman:0.12.1.1
-
cpe:2.3:a:podman_project:podman:0.12.1.2
-
cpe:2.3:a:podman_project:podman:0.2
-
cpe:2.3:a:podman_project:podman:0.2.1
-
cpe:2.3:a:podman_project:podman:0.2.2
-
cpe:2.3:a:podman_project:podman:0.3.1
-
cpe:2.3:a:podman_project:podman:0.3.2
-
cpe:2.3:a:podman_project:podman:0.3.3
-
cpe:2.3:a:podman_project:podman:0.3.4
-
cpe:2.3:a:podman_project:podman:0.3.5
-
cpe:2.3:a:podman_project:podman:0.4.1
-
cpe:2.3:a:podman_project:podman:0.4.2
-
cpe:2.3:a:podman_project:podman:0.4.3
-
cpe:2.3:a:podman_project:podman:0.4.4
-
cpe:2.3:a:podman_project:podman:0.5.1
-
cpe:2.3:a:podman_project:podman:0.5.2
-
cpe:2.3:a:podman_project:podman:0.5.3
-
cpe:2.3:a:podman_project:podman:0.5.4
-
cpe:2.3:a:podman_project:podman:0.6.1
-
cpe:2.3:a:podman_project:podman:0.6.2
-
cpe:2.3:a:podman_project:podman:0.6.3
-
cpe:2.3:a:podman_project:podman:0.6.4
-
cpe:2.3:a:podman_project:podman:0.6.5
-
cpe:2.3:a:podman_project:podman:0.7.1
-
cpe:2.3:a:podman_project:podman:0.7.2
-
cpe:2.3:a:podman_project:podman:0.7.3
-
cpe:2.3:a:podman_project:podman:0.7.4
-
cpe:2.3:a:podman_project:podman:0.8.1
-
cpe:2.3:a:podman_project:podman:0.8.2
-
cpe:2.3:a:podman_project:podman:0.8.2.1
-
cpe:2.3:a:podman_project:podman:0.8.3
-
cpe:2.3:a:podman_project:podman:0.8.4
-
cpe:2.3:a:podman_project:podman:0.8.5
-
cpe:2.3:a:podman_project:podman:0.9.1
-
cpe:2.3:a:podman_project:podman:0.9.1.1
-
cpe:2.3:a:podman_project:podman:0.9.2
-
cpe:2.3:a:podman_project:podman:0.9.2.1
-
cpe:2.3:a:podman_project:podman:0.9.3
-
cpe:2.3:a:podman_project:podman:0.9.3.1
-
cpe:2.3:a:podman_project:podman:1.0.0
-
cpe:2.3:a:podman_project:podman:1.0.1
-
cpe:2.3:a:podman_project:podman:1.0.2
-
cpe:2.3:a:podman_project:podman:1.0.3
-
cpe:2.3:a:podman_project:podman:1.0.4
-
cpe:2.3:a:podman_project:podman:1.0.5
-
cpe:2.3:a:podman_project:podman:1.1.0
-
cpe:2.3:a:podman_project:podman:1.1.1
-
cpe:2.3:a:podman_project:podman:1.1.2
-
cpe:2.3:a:podman_project:podman:1.2.0
-
cpe:2.3:a:podman_project:podman:1.3.0
-
cpe:2.3:a:podman_project:podman:1.3.1
-
cpe:2.3:a:podman_project:podman:1.3.2
-
cpe:2.3:a:podman_project:podman:1.4.0
-
cpe:2.3:a:podman_project:podman:1.4.1
-
cpe:2.3:a:podman_project:podman:1.4.2
-
cpe:2.3:a:podman_project:podman:1.4.3
-
cpe:2.3:a:podman_project:podman:1.4.4
-
cpe:2.3:a:podman_project:podman:1.5.0
-
cpe:2.3:a:podman_project:podman:1.5.1
-
cpe:2.3:a:podman_project:podman:1.6.0
-
cpe:2.3:a:podman_project:podman:1.6.1
-
cpe:2.3:a:podman_project:podman:1.6.2
-
cpe:2.3:a:podman_project:podman:1.6.3
-
cpe:2.3:a:podman_project:podman:1.6.4
-
cpe:2.3:a:podman_project:podman:1.6.4-32.el7_9
-
cpe:2.3:a:podman_project:podman:1.6.5
-
cpe:2.3:a:podman_project:podman:1.7.0
-
cpe:2.3:a:podman_project:podman:1.8.0
-
cpe:2.3:a:podman_project:podman:1.8.1
-
cpe:2.3:a:podman_project:podman:1.8.2
-
cpe:2.3:a:podman_project:podman:1.9.0
-
cpe:2.3:a:podman_project:podman:1.9.1
-
cpe:2.3:a:podman_project:podman:1.9.2
-
cpe:2.3:a:podman_project:podman:1.9.3
-
cpe:2.3:a:podman_project:podman:2.0.0
-
cpe:2.3:a:podman_project:podman:2.0.1
-
cpe:2.3:a:podman_project:podman:2.0.2
-
cpe:2.3:a:podman_project:podman:2.0.3
-
cpe:2.3:a:podman_project:podman:2.0.4
-
cpe:2.3:a:podman_project:podman:2.0.5
-
cpe:2.3:a:podman_project:podman:2.0.6
-
cpe:2.3:a:podman_project:podman:2.1.0
-
cpe:2.3:a:podman_project:podman:2.1.1
-
cpe:2.3:a:podman_project:podman:2.2.0
-
cpe:2.3:a:podman_project:podman:2.2.1
-
cpe:2.3:a:podman_project:podman:3.0.0
-
cpe:2.3:a:podman_project:podman:3.0.1
-
cpe:2.3:a:podman_project:podman:3.0.2
-
cpe:2.3:a:podman_project:podman:3.1.0
-
cpe:2.3:a:podman_project:podman:3.1.1
-
cpe:2.3:a:podman_project:podman:3.1.2
-
cpe:2.3:a:podman_project:podman:3.2.0
-
cpe:2.3:a:podman_project:podman:3.2.1
-
cpe:2.3:a:podman_project:podman:3.2.2
-
cpe:2.3:a:podman_project:podman:3.2.3
-
cpe:2.3:a:podman_project:podman:3.3.0
-
cpe:2.3:a:podman_project:podman:3.3.1
-
cpe:2.3:a:podman_project:podman:3.4.0
-
cpe:2.3:a:podman_project:podman:3.4.1
-
cpe:2.3:a:podman_project:podman:3.4.2
-
cpe:2.3:a:podman_project:podman:3.4.3
-
cpe:2.3:a:podman_project:podman:3.4.4
-
cpe:2.3:a:podman_project:podman:3.4.5
-
cpe:2.3:a:podman_project:podman:3.4.6
-
cpe:2.3:a:podman_project:podman:3.4.7
-
cpe:2.3:a:psgo_project:psgo:-
-
cpe:2.3:a:psgo_project:psgo:1.1
-
cpe:2.3:a:psgo_project:psgo:1.2
-
cpe:2.3:a:psgo_project:psgo:1.2.0
-
cpe:2.3:a:psgo_project:psgo:1.2.1
-
cpe:2.3:a:psgo_project:psgo:1.3.0
-
cpe:2.3:a:psgo_project:psgo:1.3.1
-
cpe:2.3:a:psgo_project:psgo:1.3.2
-
cpe:2.3:a:psgo_project:psgo:1.4.0
-
cpe:2.3:a:psgo_project:psgo:1.5.0
-
cpe:2.3:a:psgo_project:psgo:1.5.1
-
cpe:2.3:a:psgo_project:psgo:1.5.2
-
cpe:2.3:a:psgo_project:psgo:1.6.0
-
cpe:2.3:a:psgo_project:psgo:1.7.0
-
cpe:2.3:a:psgo_project:psgo:1.7.1
-
cpe:2.3:a:redhat:developer_tools:1.0
-
cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.6
-
cpe:2.3:a:redhat:openshift_container_platform:4.0
-
cpe:2.3:a:redhat:quay:3.0.0
-
cpe:2.3:o:fedoraproject:fedora:34
-
cpe:2.3:o:fedoraproject:fedora:35
-
cpe:2.3:o:redhat:enterprise_linux:7.0
-
cpe:2.3:o:redhat:enterprise_linux:8.0
-
cpe:2.3:o:redhat:enterprise_linux_eus:8.6
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.6
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.6
-
cpe:2.3:o:redhat:enterprise_linux_server:7.0
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6
-
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6
-
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0