<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Podman-Desktop — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/podman-desktop/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 21:17:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/podman-desktop/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unauthenticated Denial-of-Service and Information Disclosure in Podman Desktop</title><link>https://feed.craftedsignal.io/briefs/2026-04-podman-desktop-dos/</link><pubDate>Tue, 07 Apr 2026 21:17:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-podman-desktop-dos/</guid><description>Podman Desktop versions prior to 1.26.2 expose an unauthenticated HTTP server, allowing remote attackers to trigger denial-of-service conditions by exhausting resources and extract sensitive information through verbose error responses.</description><content:encoded><![CDATA[<p>Podman Desktop, a graphical tool for container and Kubernetes development, is vulnerable to an unauthenticated remote attack in versions prior to 1.26.2. The exposed HTTP server lacks proper connection limits and timeouts, enabling attackers to exhaust file descriptors and kernel memory. This resource exhaustion leads to denial-of-service conditions, potentially crashing the application or freezing the entire host system. Furthermore, verbose error responses from the server inadvertently disclose internal paths and system details, including usernames on Windows systems. This information leakage facilitates further exploitation attempts. The vulnerability, identified as CVE-2026-34045, requires no authentication or user interaction and is exploitable over a network, making it a significant threat to systems running vulnerable versions of Podman Desktop. Users should update to version 1.26.2 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Podman Desktop instance running a version prior to 1.26.2 exposed on the network.</li>
<li>Attacker connects to the unauthenticated HTTP server exposed by Podman Desktop.</li>
<li>The attacker sends a large number of HTTP requests without proper connection management.</li>
<li>The server fails to enforce connection limits, leading to an exhaustion of available file descriptors on the host system.</li>
<li>The attacker sends specially crafted requests designed to trigger resource-intensive operations, consuming excessive kernel memory.</li>
<li>As file descriptors and kernel memory are depleted, the Podman Desktop application becomes unresponsive.</li>
<li>The system experiences a denial-of-service condition, potentially leading to application crash or a full host freeze.</li>
<li>The attacker analyzes verbose error responses to gain insights into internal paths and system details, potentially including usernames on Windows, to prepare for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34045 can lead to a complete denial-of-service of the Podman Desktop application, disrupting container and Kubernetes development workflows. In severe cases, the entire host system may freeze, requiring a reboot and causing data loss or corruption. The information disclosure aspect of the vulnerability, leaking internal paths and usernames, can aid attackers in crafting more targeted and sophisticated attacks against the compromised system. The lack of authentication makes all installations of vulnerable Podman Desktop versions potential targets, impacting developers and organizations relying on this tool.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Podman Desktop to version 1.26.2 or later to patch CVE-2026-34045.</li>
<li>Implement network segmentation and firewall rules to restrict access to the Podman Desktop HTTP server only to trusted networks, mitigating external exploitation.</li>
<li>Deploy the Sigma rule &ldquo;Detect Excessive HTTP Requests to Podman Desktop&rdquo; to identify potential denial-of-service attempts against vulnerable Podman Desktop instances.</li>
<li>Monitor webserver logs for unusual HTTP requests and error responses from Podman Desktop, correlating them with potential exploitation attempts. Enable webserver logging to activate the rule above.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>podman-desktop</category><category>denial-of-service</category><category>information-disclosure</category><category>cve-2026-34045</category><category>linux</category><category>windows</category></item></channel></rss>