8.1
CVE-2025-9566
- EPSS 0.11%
- Veröffentlicht 05.09.2025 19:54:30
- Zuletzt bearbeitet 13.11.2025 10:15:55
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/containers/podman
≫
Paket
podman
Default Statusunaffected
Version <
5.6.1
Version
4.0.0
Status
affected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 10
Default Statusaffected
Version <
*
Version
6:5.4.0-13.el10_0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 10
Default Statusaffected
Version <
*
Version
7:5.6.0-5.el10_1
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8
Default Statusaffected
Version <
*
Version
8100020250911075811.afee755d
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
Default Statusaffected
Version <
*
Version
8060020250919150821.3b538bd8
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.6 Telecommunications Update Service
Default Statusaffected
Version <
*
Version
8060020250919150821.3b538bd8
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
Default Statusaffected
Version <
*
Version
8060020250919150821.3b538bd8
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.8 Telecommunications Update Service
Default Statusaffected
Version <
*
Version
8080020250919060528.0f77c1b7
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
Default Statusaffected
Version <
*
Version
8080020250919060528.0f77c1b7
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
5:5.4.0-13.el9_6
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
6:5.6.0-6.el9_7
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
Default Statusaffected
Version <
*
Version
2:4.2.0-6.el9_0.5
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
Default Statusaffected
Version <
*
Version
2:4.4.1-22.el9_2.4
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 9.4 Extended Update Support
Default Statusaffected
Version <
*
Version
4:4.9.4-18.el9_4.3
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.12
Default Statusaffected
Version <
*
Version
412.86.202510291903-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.13
Default Statusaffected
Version <
*
Version
413.92.202510150118-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.14
Default Statusaffected
Version <
*
Version
414.92.202510211419-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.17
Default Statusaffected
Version <
*
Version
417.94.202510112152-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.18
Default Statusaffected
Version <
*
Version
418.94.202510230424-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.19
Default Statusaffected
Version <
*
Version
4.19.9.6.202510140714-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.20
Default Statusaffected
Version <
*
Version
4.20.9.6.202510220229-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Dev Spaces (RHOSDS) 3.24
Default Statusaffected
Version <
*
Version
sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Dev Spaces (RHOSDS) 3.24
Default Statusaffected
Version <
*
Version
sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Dev Spaces
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Dev Spaces
Default Statusaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.11% | 0.301 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secalert@redhat.com | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.