Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: podman

Found 1 matching suggestions

View:
Compact
Detailed
updated 4 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    9 packages
    • podman-tui
    • podman-bootc
    • cockpit-podman
    • podman-compose
    • podman-desktop
    • nomad-driver-podman
    • python312Packages.podman
    • python313Packages.podman
    • python314Packages.podman
  • @LeSuisse dismissed
PowerShell Command Injection in Podman HyperV Machine

Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2.

Affected products

podman
  • ==>= 4.8.0, < 5.8.2

Matching in nixpkgs

pkgs.podman

Program for managing pods, containers and container images

Ignored packages (9)

pkgs.cockpit-podman

Cockpit UI for podman containers

  • nixos-unstable 124
    • nixpkgs-unstable 124
    • nixos-unstable-small 124

Package maintainers

Windows only