| Name | CVE-2022-1227 | 
| Description | A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service. | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
| Debian Bugs | 1020907 | 
The table below lists information on source packages.
| Source Package | Release | Version | Status | 
|---|---|---|---|
| golang-github-containers-psgo (PTS) | bullseye | 1.5.2-1+deb11u1 | fixed | 
| bookworm | 1.7.1+ds1-1 | fixed | |
| forky, sid, trixie | 1.9.0-1 | fixed | |
| libpod (PTS) | bullseye | 3.0.1+dfsg1-3+deb11u5 | fixed | 
| bookworm | 4.3.1+ds1-8+deb12u1 | fixed | 
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs | 
|---|---|---|---|---|---|---|
| golang-github-containers-psgo | source | bullseye | 1.5.2-1+deb11u1 | |||
| golang-github-containers-psgo | source | (unstable) | 1.7.1+ds1-1 | 1020907 | ||
| libpod | source | bullseye | 3.0.1+dfsg1-3+deb11u2 | |||
| libpod | source | (unstable) | 3.4.7+ds1-1 | 
https://bugzilla.redhat.com/show_bug.cgi?id=2070368
https://github.com/containers/psgo/pull/92
https://github.com/containers/psgo/commit/d9467da9f563a9de1ece79dcae86b37b1db75443 (v1.7.2)