HeadlinesBriefing favicon HeadlinesBriefing.com

Podman rootless containers survive Copy Fail exploit

Hacker News •
×

On April 29 the vulnerability CVE‑2026‑31431 was published on copy.fail, allowing an unprivileged user to spawn a root shell via a short Python script. Because Linux containers share the host kernel, the exploit can be leveraged inside containers that host public services, CI jobs, or development environments, turning a compromised container into a foothold for further attacks in production environments.

The author, who migrated from Docker to Podman a year ago, used the case to test rootless container security for CI pipelines. Podman’s fork/exec model runs the container process as a descendant of the podman run command, enabling standard UID separation. Tests confirmed the exploit yields a container‑internal root shell, but host‑level privileges remain confined to the unprivileged user that launched the container.

Because the container’s root maps to the host UID of the launching user, the breach cannot directly escape the namespace. Podman mitigates blast radius through user namespaces, subuid ranges, and capability stripping. The author’s walkthrough demonstrates that while rootless containers are not immune to Copy Fail, their design for enterprise limits the damage to the permissions of the original unprivileged account.