Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-9566

Опубликовано: 05 сент. 2025
Источник: debian
EPSS Низкий

Описание

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

Пакеты

ПакетСтатусВерсия исправленияРелизТип
podmanfixed5.6.1+ds1-1experimentalpackage
podmanunfixedpackage
podmanno-dsatrixiepackage
libpodremovedpackage
libpodno-dsabookwormpackage
libpodno-dsabullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2393152

  • Fixed by: https://github.com/containers/podman/commit/aaf8b9dc0cfec76444f7eda60660347646b90a13 (v5.6.1)

EPSS

Процентиль: 23%
0.00073
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
12 дней назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

CVSS3: 8.1
redhat
14 дней назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

CVSS3: 8.1
nvd
12 дней назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

msrc
11 дней назад

Podman: podman kube play command may overwrite host files

CVSS3: 8.1
github
13 дней назад

podman kube play symlink traversal vulnerability

EPSS

Процентиль: 23%
0.00073
Низкий