Symlink Following Affecting podman package, versions <5.6.2-r3


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.01% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-WOLFILATEST-PODMAN-15409494
  • published5 Mar 2026
  • disclosed6 Nov 2025

Introduced: 6 Nov 2025

CVE-2025-31133  (opens in a new tab)
CWE-61  (opens in a new tab)
CWE-363  (opens in a new tab)

How to fix?

Upgrade Wolfi podman to version 5.6.2-r3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream podman package and not the podman package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

CVSS Base Scores

version 3.1