Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Podman Vulnerability: Remote Code Execution via Container
RHSA-2026:3337
Summary
Podman, a container management tool, has a vulnerability that could allow an attacker to run malicious code on a system. This could happen if a user uses a compromised container or if an attacker gains access to a system with Podman installed. Update your system to the latest version of Podman to fix this issue.
What to do
- Update redhat podman to version 6:5.6.0-14.el9_7.
- Update redhat podman-debuginfo to version 6:5.6.0-14.el9_7.
- Update redhat podman-debugsource to version 6:5.6.0-14.el9_7.
- Update redhat podman-docker to version 6:5.6.0-14.el9_7.
- Update redhat podman-plugins to version 6:5.6.0-14.el9_7.
- Update redhat podman-plugins-debuginfo to version 6:5.6.0-14.el9_7.
- Update redhat podman-remote to version 6:5.6.0-14.el9_7.
- Update redhat podman-remote-debuginfo to version 6:5.6.0-14.el9_7.
- Update redhat podman-tests to version 6:5.6.0-14.el9_7.
- Update redhat podman-tests-debuginfo to version 6:5.6.0-14.el9_7.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | podman | <= 6:5.6.0-14.el9_7 | 6:5.6.0-14.el9_7 |
| redhat | podman-debuginfo | <= 6:5.6.0-14.el9_7 | 6:5.6.0-14.el9_7 |
| redhat | podman-debugsource | <= 6:5.6.0-14.el9_7 | 6:5.6.0-14.el9_7 |
| redhat | podman-docker | <= 6:5.6.0-14.el9_7 | 6:5.6.0-14.el9_7 |
| redhat | podman-plugins | <= 6:5.6.0-14.el9_7 | 6:5.6.0-14.el9_7 |
| redhat | podman-plugins-debuginfo | <= 6:5.6.0-14.el9_7 | 6:5.6.0-14.el9_7 |
| redhat | podman-remote | <= 6:5.6.0-14.el9_7 | 6:5.6.0-14.el9_7 |
| redhat | podman-remote-debuginfo | <= 6:5.6.0-14.el9_7 | 6:5.6.0-14.el9_7 |
| redhat | podman-tests | <= 6:5.6.0-14.el9_7 | 6:5.6.0-14.el9_7 |
| redhat | podman-tests-debuginfo | <= 6:5.6.0-14.el9_7 | 6:5.6.0-14.el9_7 |
Original title
Red Hat Security Advisory: podman security update
osv CVSS3.1
7.5
- https://access.redhat.com/errata/RHSA-2026:3337 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2418462 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2434431 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2434432 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2437111 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3337.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61726 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61726 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61726 Vendor Advisory
- https://go.dev/cl/736712 Third Party Advisory
- https://go.dev/issue/77101 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4341 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61728 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61728 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61728 Vendor Advisory
- https://go.dev/cl/736713 Third Party Advisory
- https://go.dev/issue/77102 Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4342 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61729 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61729 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61729 Vendor Advisory
- https://go.dev/cl/725920 Third Party Advisory
- https://go.dev/issue/76445 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 Third Party Advisory
- https://pkg.go.dev/vuln/GO-2025-4155 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-68121 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68121 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68121 Vendor Advisory
- https://go.dev/cl/737700 Third Party Advisory
- https://go.dev/issue/77217 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/K09ubi9FQFk Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4337 Vendor Advisory
Published: 26 Feb 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026