DEBIAN-CVE-2025-9566

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2025-9566
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-9566.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-9566
Upstream
Published
2025-09-05T20:15:36Z
Modified
2025-09-18T05:20:11Z
Summary
[none]
Details

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

References

Affected packages

Debian:11 / libpod

Package

Name
libpod
Purl
pkg:deb/debian/libpod?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libpod

Package

Name
libpod
Purl
pkg:deb/debian/libpod?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / podman

Package

Name
podman
Purl
pkg:deb/debian/podman?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / podman

Package

Name
podman
Purl
pkg:deb/debian/podman?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}