GHSA-65GG-3W2W-HR4H
Vulnerability from github – Published: 2025-06-25 21:57 – Updated: 2025-11-29 03:30
VLAI?
Summary
Podman Improper Certificate Validation; machine missing TLS verification
Details
Impact
The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry (which it does by default since 5.0.0) allowing a possible Man In The Middle attack.
Patches
https://github.com/containers/podman/commit/726b506acc8a00d99f1a3a1357ecf619a1f798c3 Fixed in v5.5.2
Workarounds
Download the disk image manually via some other tool that verifies the TLS connection. Then pass the local image as file path (podman machine init --image ./somepath)
Severity ?
8.3 (High)
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/containers/podman/v4"
},
"ranges": [
{
"events": [
{
"introduced": "4.8.0"
},
{
"last_affected": "4.9.5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/containers/podman/v5"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.5.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-6032"
],
"database_specific": {
"cwe_ids": [
"CWE-295"
],
"github_reviewed": true,
"github_reviewed_at": "2025-06-25T21:57:00Z",
"nvd_published_at": "2025-06-24T14:15:30Z",
"severity": "HIGH"
},
"details": "### Impact\nThe podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry (which it does by default since 5.0.0) allowing a possible Man In The Middle attack.\n\n### Patches\nhttps://github.com/containers/podman/commit/726b506acc8a00d99f1a3a1357ecf619a1f798c3\nFixed in v5.5.2\n\n### Workarounds\nDownload the disk image manually via some other tool that verifies the TLS connection. Then pass the local image as file path (podman machine init --image ./somepath)",
"id": "GHSA-65gg-3w2w-hr4h",
"modified": "2025-11-29T03:30:15Z",
"published": "2025-06-25T21:57:00Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/containers/podman/security/advisories/GHSA-65gg-3w2w-hr4h"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6032"
},
{
"type": "WEB",
"url": "https://github.com/containers/podman/commit/726b506acc8a00d99f1a3a1357ecf619a1f798c3"
},
{
"type": "PACKAGE",
"url": "https://github.com/containers/podman"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372501"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-6032"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:9766"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:9751"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:9726"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:11681"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:11677"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:11363"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:11359"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:10668"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:10551"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:10550"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:10549"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:10295"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Podman Improper Certificate Validation; machine missing TLS verification"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…