Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:15900

Опубликовано: 10 окт. 2025
Источник: rocky
Оценка: Important

Описание

Important: podman security update

The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fix(es):

  • podman: Podman kube play command may overwrite host files (CVE-2025-9566)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
podmanx86_6413.el9_6podman-5.4.0-13.el9_6.x86_64.rpm
podman-dockernoarch13.el9_6podman-docker-5.4.0-13.el9_6.noarch.rpm
podman-dockernoarch13.el9_6podman-docker-5.4.0-13.el9_6.noarch.rpm
podman-dockernoarch13.el9_6podman-docker-5.4.0-13.el9_6.noarch.rpm
podman-dockernoarch13.el9_6podman-docker-5.4.0-13.el9_6.noarch.rpm
podman-pluginsx86_6413.el9_6podman-plugins-5.4.0-13.el9_6.x86_64.rpm
podman-remotex86_6413.el9_6podman-remote-5.4.0-13.el9_6.x86_64.rpm
podman-testsx86_6413.el9_6podman-tests-5.4.0-13.el9_6.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 8.1
ubuntu
4 месяца назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

CVSS3: 8.1
redhat
4 месяца назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

CVSS3: 8.1
nvd
4 месяца назад

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

msrc
3 месяца назад

Podman: podman kube play command may overwrite host files

CVSS3: 8.1
debian
4 месяца назад

There's a vulnerability in podman where an attacker may use the kube p ...