VYPR

apk package

wolfi/podman

pkg:apk/wolfi/podman

Vulnerabilities (48)

  • CVE-2024-45310Sep 3, 2024
    affected < 5.2.2-r1fixed 5.2.2-r1

    runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between

  • CVE-2024-3056Aug 2, 2024
    affected < 5.6.2-r2fixed 5.6.2-r2

    A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious container will continue to exh

  • CVE-2024-1753HigMar 18, 2024
    affected < 0fixed 0

    A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause t

  • CVE-2024-21626Jan 31, 2024
    affected < 5.2.2-r1fixed 5.2.2-r1

    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the h

  • CVE-2023-25809Mar 29, 2023
    affected < 5.2.2-r1fixed 5.2.2-r1

    runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does n

  • CVE-2023-28642Mar 29, 2023
    affected < 5.2.2-r1fixed 5.2.2-r1

    runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibitin

  • CVE-2023-27561Mar 3, 2023
    affected < 5.2.2-r1fixed 5.2.2-r1

    runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this is

  • CVE-2022-29162May 17, 2022
    affected < 5.2.2-r1fixed 5.2.2-r1

    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environme

Page 3 of 3