A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
[
{
"deprecated": false,
"source": "https://github.com/haproxy/haproxy/commit/8234f6dae8f6267de81b4683e4830decbb03cf21",
"id": "CVE-2022-1227-8bdef30e",
"target": {
"file": "src/haproxy.c",
"function": "display_version"
},
"digest": {
"function_hash": "15405782596605490502574083329462375374",
"length": 169.0
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://github.com/haproxy/haproxy/commit/8234f6dae8f6267de81b4683e4830decbb03cf21",
"id": "CVE-2022-1227-f9b96cab",
"target": {
"file": "src/haproxy.c"
},
"digest": {
"line_hashes": [
"120610671709248610693549997568906346205",
"163700210339292781460079079273025186373",
"37651287664491073009034039857899080904",
"9752528457442333656052258711668053961",
"106627004053978889922436985845191716638"
],
"threshold": 0.9
},
"signature_type": "Line",
"signature_version": "v1"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-1227.json"