VYPR

Go modules package

github.com/containers/podman/v5

pkg:golang/github.com/containers/podman/v5

Vulnerabilities (6)

  • CVE-2026-33414HigApr 14, 2026
    affected < 5.8.2fixed 5.8.2

    Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitiz

  • CVE-2025-4953HigSep 16, 2025
    affected <= 5.5.0

    A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the c

  • CVE-2025-6032HigJun 24, 2025
    affected < 5.5.2fixed 5.5.2

    A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack.

  • CVE-2024-9407MedOct 1, 2024
    affected < 5.2.4fixed 5.2.4

    A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensi

  • CVE-2024-3056Aug 2, 2024
    affected <= 5.2.0

    A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious container will continue to exh

  • CVE-2024-1753HigMar 18, 2024
    affected < 5.0.1fixed 5.0.1

    A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause t