Upstream information

CVE-2025-9566 at MITRE

Description

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.

Binary-Affected: podman
Upstream-version-introduced: v4.0.0
Upstream-version-fixed: v5.6.1

SUSE information

Overall state of this security issue: Pending

This issue is currently rated as having important severity.

CVSS v3 Scores
CVSS detail CNA (Red Hat) SUSE
Base Score 8.1 8.1
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Attack Vector Network Network
Attack Complexity Low Low
Privileges Required Low Low
User Interaction None None
Scope Unchanged Unchanged
Confidentiality Impact None None
Integrity Impact High High
Availability Impact High High
CVSSv3 Version 3.1 3.1
CVSS v4 Scores
CVSS detail SUSE
Base Score 7.2
Vector CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
Attack Vector Network
Attack Complexity Low
Attack Requirements None
Privileges Required Low
User Interaction None
Vulnerable System Confidentiality Impact None
Vulnerable System Integrity Impact High
Vulnerable System Availability Impact High
Subsequent System Confidentiality Impact None
Subsequent System Integrity Impact None
Subsequent System Availability Impact None
CVSSv4 Version 4.0
SUSE Bugzilla entry: 1249154 [IN_PROGRESS]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Container suse/sl-micro/6.1/baremetal-os-container:2.2.1-7.23
  • podman >= 5.4.2-slfo.1.1_2.1
Container suse/sle-micro/5.5:2.0.4-5.5.390
Image SLES15-SP5-Manager-Proxy-5-0-BYOS
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE
Image SLES15-SP5-Manager-Server-5-0
Image SLES15-SP5-Manager-Server-5-0-Azure-llc
Image SLES15-SP5-Manager-Server-5-0-Azure-ltd
Image SLES15-SP5-Manager-Server-5-0-BYOS
Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure
Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2
Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE
Image SLES15-SP5-Manager-Server-5-0-EC2-llc
Image SLES15-SP5-Manager-Server-5-0-EC2-ltd
Image SLES15-SP5-Micro-5-5
Image SLES15-SP5-Micro-5-5-Azure
Image SLES15-SP5-Micro-5-5-BYOS
Image SLES15-SP5-Micro-5-5-BYOS-Azure
Image SLES15-SP5-Micro-5-5-BYOS-EC2
Image SLES15-SP5-Micro-5-5-BYOS-GCE
Image SLES15-SP5-Micro-5-5-EC2
Image SLES15-SP5-Micro-5-5-GCE
  • podman >= 4.9.5-150500.3.49.1
SUSE Enterprise Storage 7.1
  • podman >= 4.9.5-150300.9.55.1
  • podman-remote >= 4.9.5-150300.9.55.1
Patchnames:
SUSE-Storage-7.1-2025-3534
SUSE Liberty Linux 8
  • aardvark-dns >= 1.10.1-2.module+el8.10.0+23498+f7d19d48
  • buildah >= 1.33.12-2.module+el8.10.0+23498+f7d19d48
  • buildah-tests >= 1.33.12-2.module+el8.10.0+23498+f7d19d48
  • cockpit-podman >= 84.1-1.module+el8.10.0+23498+f7d19d48
  • conmon >= 2.1.10-1.module+el8.10.0+23498+f7d19d48
  • container-selinux >= 2.229.0-2.module+el8.10.0+23498+f7d19d48
  • containernetworking-plugins >= 1.4.0-6.module+el8.10.0+23498+f7d19d48
  • containers-common >= 1-82.module+el8.10.0+23498+f7d19d48
  • crit >= 3.18-5.module+el8.10.0+23498+f7d19d48
  • criu >= 3.18-5.module+el8.10.0+23498+f7d19d48
  • criu-devel >= 3.18-5.module+el8.10.0+23498+f7d19d48
  • criu-libs >= 3.18-5.module+el8.10.0+23498+f7d19d48
  • crun >= 1.14.3-2.module+el8.10.0+23498+f7d19d48
  • fuse-overlayfs >= 1.13-1.module+el8.10.0+23498+f7d19d48
  • libslirp >= 4.4.0-2.module+el8.10.0+23498+f7d19d48
  • libslirp-devel >= 4.4.0-2.module+el8.10.0+23498+f7d19d48
  • netavark >= 1.10.3-1.module+el8.10.0+23498+f7d19d48
  • oci-seccomp-bpf-hook >= 1.2.10-1.module+el8.10.0+23498+f7d19d48
  • podman >= 4.9.4-23.module+el8.10.0+23498+f7d19d48
  • podman-catatonit >= 4.9.4-23.module+el8.10.0+23498+f7d19d48
  • podman-docker >= 4.9.4-23.module+el8.10.0+23498+f7d19d48
  • podman-gvproxy >= 4.9.4-23.module+el8.10.0+23498+f7d19d48
  • podman-plugins >= 4.9.4-23.module+el8.10.0+23498+f7d19d48
  • podman-remote >= 4.9.4-23.module+el8.10.0+23498+f7d19d48
  • podman-tests >= 4.9.4-23.module+el8.10.0+23498+f7d19d48
  • python3-criu >= 3.18-5.module+el8.10.0+23498+f7d19d48
  • python3-podman >= 4.9.0-3.module+el8.10.0+23498+f7d19d48
  • runc >= 1.1.12-6.module+el8.10.0+23498+f7d19d48
  • skopeo >= 1.14.5-4.module+el8.10.0+23498+f7d19d48
  • skopeo-tests >= 1.14.5-4.module+el8.10.0+23498+f7d19d48
  • slirp4netns >= 1.2.3-1.module+el8.10.0+23498+f7d19d48
  • toolbox >= 0.0.99.5-2.module+el8.10.0+23498+f7d19d48
  • toolbox-tests >= 0.0.99.5-2.module+el8.10.0+23498+f7d19d48
  • udica >= 0.2.6-21.module+el8.10.0+23498+f7d19d48
Patchnames:
RHSA-2025:15904
SUSE Liberty Linux 9
  • podman >= 5.4.0-13.el9_6
  • podman-docker >= 5.4.0-13.el9_6
  • podman-plugins >= 5.4.0-13.el9_6
  • podman-remote >= 5.4.0-13.el9_6
  • podman-tests >= 5.4.0-13.el9_6
Patchnames:
RHSA-2025:15900
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
  • podman >= 4.9.5-150300.9.55.1
  • podman-remote >= 4.9.5-150300.9.55.1
Patchnames:
SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3534
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
  • podman >= 4.9.5-150400.4.53.1
  • podman-docker >= 4.9.5-150400.4.53.1
  • podman-remote >= 4.9.5-150400.4.53.1
Patchnames:
SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3584
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
  • podman >= 4.9.5-150400.4.53.1
  • podman-docker >= 4.9.5-150400.4.53.1
  • podman-remote >= 4.9.5-150400.4.53.1
Patchnames:
SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3584
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS
  • podman >= 4.9.5-150500.3.49.1
  • podman-docker >= 4.9.5-150500.3.49.1
  • podman-remote >= 4.9.5-150500.3.49.1
  • podmansh >= 4.9.5-150500.3.49.1
Patchnames:
SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3782
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS
  • podman >= 4.9.5-150500.3.49.1
  • podman-docker >= 4.9.5-150500.3.49.1
  • podman-remote >= 4.9.5-150500.3.49.1
  • podmansh >= 4.9.5-150500.3.49.1
Patchnames:
SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3782
SUSE Linux Enterprise High Performance Computing 15 SP6
SUSE Linux Enterprise Module for Containers 15 SP6
SUSE Linux Enterprise Server 15 SP6
SUSE Linux Enterprise Server for SAP Applications 15 SP6
  • podman >= 4.9.5-150500.3.49.1
  • podman-docker >= 4.9.5-150500.3.49.1
  • podman-remote >= 4.9.5-150500.3.49.1
  • podmansh >= 4.9.5-150500.3.49.1
Patchnames:
SUSE-SLE-Module-Containers-15-SP6-2025-3782
SUSE Linux Enterprise High Performance Computing 15 SP7
SUSE Linux Enterprise Module for Containers 15 SP7
SUSE Linux Enterprise Server 15 SP7
SUSE Linux Enterprise Server for SAP Applications 15 SP7
  • podman >= 4.9.5-150500.3.49.1
  • podman-docker >= 4.9.5-150500.3.49.1
  • podman-remote >= 4.9.5-150500.3.49.1
  • podmansh >= 4.9.5-150500.3.49.1
Patchnames:
SUSE-SLE-Module-Containers-15-SP7-2025-3782
SUSE Linux Enterprise Micro 5.1
  • podman >= 4.9.5-150300.9.55.1
  • podman-remote >= 4.9.5-150300.9.55.1
Patchnames:
SUSE-SUSE-MicroOS-5.1-2025-3534
SUSE Linux Enterprise Micro 5.2
  • podman >= 4.9.5-150300.9.55.1
  • podman-remote >= 4.9.5-150300.9.55.1
Patchnames:
SUSE-SUSE-MicroOS-5.2-2025-3534
SUSE Linux Enterprise Micro 5.3
  • podman >= 4.9.5-150400.4.53.1
  • podman-remote >= 4.9.5-150400.4.53.1
Patchnames:
SUSE-SLE-Micro-5.3-2025-3584
SUSE Linux Enterprise Micro 5.4
  • podman >= 4.9.5-150400.4.53.1
  • podman-remote >= 4.9.5-150400.4.53.1
Patchnames:
SUSE-SLE-Micro-5.4-2025-3584
SUSE Linux Enterprise Micro 5.5
  • podman >= 4.9.5-150500.3.49.1
  • podman-docker >= 4.9.5-150500.3.49.1
  • podman-remote >= 4.9.5-150500.3.49.1
  • podmansh >= 4.9.5-150500.3.49.1
Patchnames:
SUSE-SLE-Micro-5.5-2025-3782
SUSE Linux Enterprise Server 15 SP3-LTSS
  • podman >= 4.9.5-150300.9.55.1
  • podman-remote >= 4.9.5-150300.9.55.1
Patchnames:
SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3534
SUSE Linux Enterprise Server 15 SP4-LTSS
  • podman >= 4.9.5-150400.4.53.1
  • podman-docker >= 4.9.5-150400.4.53.1
  • podman-remote >= 4.9.5-150400.4.53.1
Patchnames:
SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3584
SUSE Linux Enterprise Server 15 SP5-LTSS
  • podman >= 4.9.5-150500.3.49.1
  • podman-docker >= 4.9.5-150500.3.49.1
  • podman-remote >= 4.9.5-150500.3.49.1
  • podmansh >= 4.9.5-150500.3.49.1
Patchnames:
SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3782
SUSE Linux Enterprise Server for SAP Applications 15 SP3
  • podman >= 4.9.5-150300.9.55.1
  • podman-remote >= 4.9.5-150300.9.55.1
Patchnames:
SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3534
SUSE Linux Enterprise Server for SAP Applications 15 SP4
  • podman >= 4.9.5-150400.4.53.1
  • podman-docker >= 4.9.5-150400.4.53.1
  • podman-remote >= 4.9.5-150400.4.53.1
Patchnames:
SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3584
SUSE Linux Enterprise Server for SAP Applications 15 SP5
  • podman >= 4.9.5-150500.3.49.1
  • podman-docker >= 4.9.5-150500.3.49.1
  • podman-remote >= 4.9.5-150500.3.49.1
  • podmansh >= 4.9.5-150500.3.49.1
Patchnames:
SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3782
SUSE Linux Micro 6.0
  • podman >= 4.9.5-8.1
  • podman-docker >= 4.9.5-8.1
  • podman-remote >= 4.9.5-8.1
  • podmansh >= 4.9.5-8.1
Patchnames:
SUSE-SLE-Micro-6.0-501
SUSE Linux Micro 6.1
  • podman >= 5.4.2-slfo.1.1_2.1
  • podman-docker >= 5.4.2-slfo.1.1_2.1
  • podman-remote >= 5.4.2-slfo.1.1_2.1
  • podmansh >= 5.4.2-slfo.1.1_2.1
Patchnames:
SUSE-SLE-Micro-6.1-319
SUSE Multi-Linux Manager Proxy Extension for SLE 5.1
  • podman >= 4.9.5-150500.3.49.1
Patchnames:
SUSE-Multi-Linux-Manager-Proxy-SLE-5.1-2025-3782
SUSE Multi-Linux Manager Retail Branch Server Extension for SLE 5.1
  • podman >= 4.9.5-150500.3.49.1
Patchnames:
SUSE-Multi-Linux-Manager-Retail-Branch-Server-SLE-5.1-2025-3782
SUSE Multi-Linux Manager Server Extension for SLE 5.1
  • podman >= 4.9.5-150500.3.49.1
Patchnames:
SUSE-Multi-Linux-Manager-Server-SLE-5.1-2025-3782
openSUSE Leap 15.6
  • podman >= 4.9.5-150500.3.49.1
  • podman-docker >= 4.9.5-150500.3.49.1
  • podman-remote >= 4.9.5-150500.3.49.1
  • podmansh >= 4.9.5-150500.3.49.1
Patchnames:
openSUSE-SLE-15.6-2025-3289
openSUSE-SLE-15.6-2025-3782
openSUSE Tumbleweed
  • govulncheck-vulndb >= 0.0.20250908T141310-1.1
Patchnames:
openSUSE-Tumbleweed-2025-15538


First public cloud image revisions this CVE is fixed in:


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.

Product(s) Source package State
Products under general support and receiving all security fixes.
SUSE Linux Enterprise High Performance Computing 15 SP6 podman Released
SUSE Linux Enterprise High Performance Computing 15 SP7 podman Released
SUSE Linux Enterprise Micro 5.2 podman Released
SUSE Linux Enterprise Micro 5.3 podman Released
SUSE Linux Enterprise Micro 5.4 podman Released
SUSE Linux Enterprise Micro 5.5 podman Released
SUSE Linux Enterprise Module for Containers 15 SP6 podman Released
SUSE Linux Enterprise Module for Containers 15 SP7 podman Released
SUSE Linux Enterprise Server 15 SP6 podman Released
SUSE Linux Enterprise Server 15 SP7 podman Released
SUSE Linux Enterprise Server 16.0 podman Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP6 podman Released
SUSE Linux Enterprise Server for SAP Applications 15 SP7 podman Released
SUSE Linux Micro 6.0 podman Released
SUSE Linux Micro 6.1 podman Released
SUSE Linux Micro 6.2 podman Affected
openSUSE Leap 15.6 podman Affected
Products under Long Term Service Pack support and receiving important and critical security fixes.
SUSE Linux Enterprise High Performance Computing 15 SP3 podman Affected
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS podman Affected
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS podman Released
SUSE Linux Enterprise High Performance Computing 15 SP4 podman Affected
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS podman Released
SUSE Linux Enterprise High Performance Computing 15 SP5 podman Affected
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS podman Released
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS podman Released
SUSE Linux Enterprise Module for Containers 15 SP3 podman Affected
SUSE Linux Enterprise Module for Containers 15 SP4 podman Affected
SUSE Linux Enterprise Module for Containers 15 SP5 podman Affected
SUSE Linux Enterprise Server 15 SP3 podman Affected
SUSE Linux Enterprise Server 15 SP3-LTSS podman Released
SUSE Linux Enterprise Server 15 SP4 podman Affected
SUSE Linux Enterprise Server 15 SP4-LTSS podman Released
SUSE Linux Enterprise Server 15 SP5 podman Affected
SUSE Linux Enterprise Server 15 SP5-LTSS podman Released
SUSE Manager Proxy 4.3 podman Affected
SUSE Manager Retail Branch Server 4.3 podman Affected
SUSE Manager Server 4.3 podman Affected
Products past their end of life and not receiving proactive updates anymore.
SUSE CaaS Platform 4.0 podman Unsupported
SUSE Enterprise Storage 6 podman Unsupported
SUSE Enterprise Storage 7 podman Unsupported
SUSE Enterprise Storage 7.1 podman Released
SUSE Linux Enterprise High Performance Computing 15 SP1 podman Unsupported
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS podman Unsupported
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS podman Unsupported
SUSE Linux Enterprise High Performance Computing 15 SP2 podman Unsupported
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS podman Unsupported
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS podman Unsupported
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS podman Released
SUSE Linux Enterprise Micro 5.0 podman Unsupported
SUSE Linux Enterprise Micro 5.1 podman Released
SUSE Linux Enterprise Module for Containers 15 SP1 podman Unsupported
SUSE Linux Enterprise Module for Containers 15 SP2 podman Unsupported
SUSE Linux Enterprise Server 15 SP1 podman Unsupported
SUSE Linux Enterprise Server 15 SP1-BCL podman Unsupported
SUSE Linux Enterprise Server 15 SP1-LTSS podman Unsupported
SUSE Linux Enterprise Server 15 SP2 podman Unsupported
SUSE Linux Enterprise Server 15 SP2-BCL podman Unsupported
SUSE Linux Enterprise Server 15 SP2-LTSS podman Unsupported
SUSE Linux Enterprise Server 15 SP3-BCL podman Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP1 podman Unsupported
SUSE Linux Enterprise Server for SAP Applications 15 SP2 podman Unsupported
SUSE Linux Enterprise Server for SAP Applications 15 SP3 podman Released
SUSE Linux Enterprise Server for SAP Applications 15 SP4 podman Released
SUSE Linux Enterprise Server for SAP Applications 15 SP5 podman Released
SUSE Manager Proxy 4.0 podman Unsupported
SUSE Manager Proxy 4.1 podman Unsupported
SUSE Manager Proxy 4.2 podman Affected
SUSE Manager Retail Branch Server 4.0 podman Unsupported
SUSE Manager Retail Branch Server 4.1 podman Unsupported
SUSE Manager Retail Branch Server 4.2 podman Affected
SUSE Manager Server 4.0 podman Unsupported
SUSE Manager Server 4.1 podman Unsupported
SUSE Manager Server 4.2 podman Affected
openSUSE Leap 15.3 podman Affected
openSUSE Leap 15.4 podman Affected
openSUSE Leap 15.5 podman Affected
openSUSE Leap Micro 5.2 podman Affected
openSUSE Leap Micro 5.3 podman Affected
openSUSE Leap Micro 5.4 podman Affected
openSUSE Leap Micro 5.5 podman Affected
Products at an unknown state of their lifecycle.
SUSE Linux Enterprise Server for SAP Applications 16.0 podman Affected
SUSE Multi-Linux Manager Proxy Extension for SLE 5.1 podman Released
SUSE Multi-Linux Manager Retail Branch Server Extension for SLE 5.1 podman Released
SUSE Multi-Linux Manager Server Extension for SLE 5.1 podman Released
Container Status
rancher/elemental-teal-rt/5.4
rancher/elemental-teal/5.4
suse/sle-micro/5.5
podmanAffected


SUSE Timeline for this CVE

CVE page created: Thu Sep 4 18:00:13 2025
CVE page last modified: Thu Nov 6 16:56:16 2025