DEBIAN-CVE-2026-33414

Source
https://security-tracker.debian.org/tracker/CVE-2026-33414
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33414.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-33414
Upstream
Published
2026-04-14T23:16:27.987Z
Modified
2026-04-28T20:32:47.433623Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2.

References

Affected packages

Debian:13 / podman

Package

Name
podman
Purl
pkg:deb/debian/podman?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.4.2+ds1-2
5.6.1+ds1-1
5.6.1+ds1-2
5.6.1+ds2-2
5.6.1+ds2-3
5.6.2+ds1-1
5.6.2+ds1-2
5.6.2+ds1-3
5.6.2+ds1-3+exp1
5.6.2+ds1-4
5.7.0+ds2-1
5.7.0+ds2-2
5.7.0+ds2-3
5.8.0+ds1-1
5.8.1+ds1-1
5.8.1+ds1-2
5.8.1+ds1-3
5.8.2+ds1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33414.json"

Debian:14 / podman

Package

Name
podman
Purl
pkg:deb/debian/podman?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.8.2+ds1-1

Affected versions

5.*
5.4.2+ds1-2
5.6.1+ds1-1
5.6.1+ds1-2
5.6.1+ds2-2
5.6.1+ds2-3
5.6.2+ds1-1
5.6.2+ds1-2
5.6.2+ds1-3
5.6.2+ds1-3+exp1
5.6.2+ds1-4
5.7.0+ds2-1
5.7.0+ds2-2
5.7.0+ds2-3
5.8.0+ds1-1
5.8.1+ds1-1
5.8.1+ds1-2
5.8.1+ds1-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33414.json"