Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-67046.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-67046
Upstream
Published
2025-09-05T20:15:36Z
Modified
2026-04-01T05:21:07.717231Z
Summary
CVE-2025-9566 affecting package podman 4.1.1-26
Details

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.

Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

References

Affected packages

Azure Linux:2 / podman

Package

Name
podman
Purl
pkg:rpm/azure-linux/podman

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
4.1.1-26

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-67046.json"