VYPR

rpm package

almalinux/fuse-overlayfs

pkg:rpm/almalinux/fuse-overlayfs

Vulnerabilities (102)

  • CVE-2022-1708Jun 7, 2022
    affected < 1.9-1.module_el8.7.0+3344+5bcd850ffixed 1.9-1.module_el8.7.0+3344+5bcd850f

    A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and

  • CVE-2022-29162May 17, 2022
    affected < 1.9-1.module_el8.7.0+3344+5bcd850ffixed 1.9-1.module_el8.7.0+3344+5bcd850f

    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environme

  • CVE-2022-1227Apr 29, 2022
    affected < 1.8.2-1.module_el8.6.0+2877+8e437bf5fixed 1.8.2-1.module_el8.6.0+2877+8e437bf5

    A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the a

  • CVE-2022-27650Apr 4, 2022
    affected < 1.8.2-1.module_el8.6.0+2877+8e437bf5fixed 1.8.2-1.module_el8.6.0+2877+8e437bf5

    A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker w

  • CVE-2022-27651Apr 4, 2022
    affected < 1.4.0-2.module_el8.6.0+2876+9ed4eae2fixed 1.4.0-2.module_el8.6.0+2876+9ed4eae2

    A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to p

  • CVE-2022-27649Apr 4, 2022
    affected < 1.4.0-2.module_el8.6.0+2876+9ed4eae2fixed 1.4.0-2.module_el8.6.0+2876+9ed4eae2

    A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions. A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attack

  • CVE-2022-27191Mar 18, 2022
    affected < 1.9-1.module_el8.7.0+3344+5bcd850ffixed 1.9-1.module_el8.7.0+3344+5bcd850f

    The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.

  • CVE-2021-3602Mar 3, 2022
    affected < 0.7.8-1.module_el8.5.0+108+00865455fixed 0.7.8-1.module_el8.5.0+108+00865455

    An information disclosure flaw was found in Buildah, when building containers using chroot isolation. Running processes in container builds (e.g. Dockerfile RUN commands) can access environment variables from parent and grandparent processes. When run in a container in a CI/CD en

  • CVE-2022-21698Feb 15, 2022
    affected < 1.8.2-1.module_el8.6.0+2877+8e437bf5fixed 1.8.2-1.module_el8.6.0+2877+8e437bf5

    client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounde

  • CVE-2021-4024Dec 23, 2021
    affected < 1.13-1.module_el8.10.0+3909+6e1c1eb7fixed 1.13-1.module_el8.10.0+3909+6e1c1eb7

    A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is op

  • CVE-2021-33198Aug 2, 2021
    affected < 1.13-1.module_el8.10.0+3909+6e1c1eb7fixed 1.13-1.module_el8.10.0+3909+6e1c1eb7

    In Go before 1.15.13 and 1.16.x before 1.16.5, there can be a panic for a large exponent to the math/big.Rat SetString or UnmarshalText method.

  • CVE-2021-30465May 27, 2021
    affected < 0.7.8-1.module_el8.5.0+108+00865455fixed 0.7.8-1.module_el8.5.0+108+00865455

    runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on

  • CVE-2021-20188Feb 11, 2021
    affected < 0.3-5.module_el8.3.0+2044+12421f43fixed 0.3-5.module_el8.3.0+2044+12421f43

    A flaw was found in podman before 1.7.0. File permissions for non-root users running in a privileged container are not correctly checked. This flaw can be abused by a low-privileged user inside the container to access any other file in the container, even if owned by the root use

  • CVE-2021-20199Feb 2, 2021
    affected < 1.4.0-2.module_el8.6.0+2876+9ed4eae2fixed 1.4.0-2.module_el8.6.0+2876+9ed4eae2

    Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podma

  • CVE-2020-29652Dec 17, 2020
    affected < 1.4.0-2.module_el8.6.0+2876+9ed4eae2fixed 1.4.0-2.module_el8.6.0+2876+9ed4eae2

    A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.

  • CVE-2020-10696Mar 31, 2020
    affected < 0.3-5.module_el8.3.0+2044+12421f43fixed 0.3-5.module_el8.3.0+2044+12421f43

    A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.

  • CVE-2019-19921Feb 12, 2020
    affected < 1.9-2.module_el8.9.0+3627+db8ec155fixed 1.9-2.module_el8.9.0+3627+db8ec155

    runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vul

  • CVE-2020-7039Jan 16, 2020
    affected < 0.3-5.module_el8.3.0+2044+12421f43fixed 0.3-5.module_el8.3.0+2044+12421f43

    tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.

  • CVE-2019-10214Nov 25, 2019
    affected < 0.3-5.module_el8.3.0+2044+12421f43fixed 0.3-5.module_el8.3.0+2044+12421f43

    The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulne

  • CVE-2019-9512Aug 13, 2019
    affected < 0.3-5.module_el8.3.0+2044+12421f43fixed 0.3-5.module_el8.3.0+2044+12421f43

    Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consum

Page 5 of 6