summaryrefslogtreecommitdiffstats
path: root/recipes-containers/podman/podman_git.bb
diff options
context:
space:
mode:
authorDivya Chellam <divya.chellam@windriver.com>2025-10-13 17:17:25 +0530
committerBruce Ashfield <bruce.ashfield@gmail.com>2025-10-13 22:01:08 -0400
commit38008d99d5bedc7d9769b9e95e3d6019a2df1698 (patch)
tree4108fde201b18d05d8adcb4cfb6ee475637b1d22 /recipes-containers/podman/podman_git.bb
parent898239e810acbb7db93299f20deec8afe434f11b (diff)
downloadmeta-virtualization-walnascar.tar.gz
podman: fix CVE-2025-9566walnascar
There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. [EOL][EOL]Binary-Affected: podman[EOL]Upstream-version-introduced: v4.0.0[EOL]Upstream-version-fixed: v5.6.1 Reference: https://security-tracker.debian.org/tracker/CVE-2025-9566 Upstream-patch: https://github.com/containers/podman/commit/ca994186f07822b9048fe711b6903e51614d3e15 Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Diffstat (limited to 'recipes-containers/podman/podman_git.bb')
-rw-r--r--recipes-containers/podman/podman_git.bb1
1 files changed, 1 insertions, 0 deletions
diff --git a/recipes-containers/podman/podman_git.bb b/recipes-containers/podman/podman_git.bb
index d98521ba..dbbe59c3 100644
--- a/recipes-containers/podman/podman_git.bb
+++ b/recipes-containers/podman/podman_git.bb
@@ -22,6 +22,7 @@ SRC_URI = " \
22 ${@bb.utils.contains('PACKAGECONFIG', 'rootless', 'file://50-podman-rootless.conf', '', d)} \ 22 ${@bb.utils.contains('PACKAGECONFIG', 'rootless', 'file://50-podman-rootless.conf', '', d)} \
23 file://run-ptest \ 23 file://run-ptest \
24 file://CVE-2025-6032.patch;patchdir=src/import \ 24 file://CVE-2025-6032.patch;patchdir=src/import \
25 file://CVE-2025-9566.patch;patchdir=src/import \
25" 26"
26 27
27LICENSE = "Apache-2.0" 28LICENSE = "Apache-2.0"