rpm package
almalinux/podman
pkg:rpm/almalinux/podman
Vulnerabilities (101)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-39326 | — | < 2:4.0.2-26.module_el8.9.0+3722+7fd8ab2b.alma.1 | 2:4.0.2-26.module_el8.9.0+3722+7fd8ab2b.alma.1 | Dec 6, 2023 | A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of d | ||
| CVE-2023-45287 | — | < 2:4.0.2-26.module_el8.9.0+3722+7fd8ab2b.alma.1 | 2:4.0.2-26.module_el8.9.0+3722+7fd8ab2b.alma.1 | Dec 5, 2023 | Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may l | ||
| CVE-2023-39322 | — | < 2:4.6.1-7.el9_3 | 2:4.6.1-7.el9_3 | Sep 8, 2023 | QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size. | ||
| CVE-2023-39321 | — | < 2:4.6.1-7.el9_3 | 2:4.6.1-7.el9_3 | Sep 8, 2023 | Processing an incomplete post-handshake message for a QUIC connection can cause a panic. | ||
| CVE-2023-39319 | — | < 2:4.6.1-7.el9_3 | 2:4.6.1-7.el9_3 | Sep 8, 2023 | The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be | ||
| CVE-2023-39318 | — | < 2:4.6.1-7.el9_3 | 2:4.6.1-7.el9_3 | Sep 8, 2023 | The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in contexts. This may cause the template parser to improperly interpret the contents of contexts, causing actions to be improperly escaped. This may | ||
| CVE-2023-3978 | — | < 2:4.6.1-5.el9 | 2:4.6.1-5.el9 | Aug 2, 2023 | Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack. | ||
| CVE-2023-29409 | — | < 2:4.6.1-7.el9_3 | 2:4.6.1-7.el9_3 | Aug 2, 2023 | Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are curr | ||
| CVE-2023-29406 | — | < 2:4.6.1-5.el9 | 2:4.6.1-5.el9 | Jul 11, 2023 | The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value. | ||
| CVE-2023-24539 | — | < 2:4.6.1-5.el9 | 2:4.6.1-5.el9 | May 11, 2023 | Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untru | ||
| CVE-2023-24540 | — | < 2:4.6.1-5.el9 | 2:4.6.1-5.el9 | May 11, 2023 | Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution. | ||
| CVE-2023-29400 | — | < 2:4.6.1-5.el9 | 2:4.6.1-5.el9 | May 11, 2023 | Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags. | ||
| CVE-2023-24537 | — | < 2:4.6.1-5.el9 | 2:4.6.1-5.el9 | Apr 6, 2023 | Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow. | ||
| CVE-2023-24538 | — | < 2:4.6.1-5.el9 | 2:4.6.1-5.el9 | Apr 6, 2023 | Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the act | ||
| CVE-2023-24534 | — | < 2:4.6.1-5.el9 | 2:4.6.1-5.el9 | Apr 6, 2023 | HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more m | ||
| CVE-2023-24536 | — | < 2:4.6.1-5.el9 | 2:4.6.1-5.el9 | Apr 6, 2023 | Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can under | ||
| CVE-2023-25809 | — | < 2:4.0.2-24.module_el8.9.0+3627+db8ec155 | 2:4.0.2-24.module_el8.9.0+3627+db8ec155 | Mar 29, 2023 | runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does n | ||
| CVE-2023-28642 | — | < 2:4.0.2-24.module_el8.9.0+3627+db8ec155 | 2:4.0.2-24.module_el8.9.0+3627+db8ec155 | Mar 29, 2023 | runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibitin | ||
| CVE-2023-0778 | — | < 3:4.4.1-8.module_el8.8.0+3568+e8578284 | 3:4.4.1-8.module_el8.8.0+3568+e8578284 | Mar 27, 2023 | A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system. | ||
| CVE-2023-27561 | — | < 2:4.0.2-24.module_el8.9.0+3627+db8ec155 | 2:4.0.2-24.module_el8.9.0+3627+db8ec155 | Mar 3, 2023 | runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this is |
- CVE-2023-39326Dec 6, 2023affected < 2:4.0.2-26.module_el8.9.0+3722+7fd8ab2b.alma.1fixed 2:4.0.2-26.module_el8.9.0+3722+7fd8ab2b.alma.1
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of d
- CVE-2023-45287Dec 5, 2023affected < 2:4.0.2-26.module_el8.9.0+3722+7fd8ab2b.alma.1fixed 2:4.0.2-26.module_el8.9.0+3722+7fd8ab2b.alma.1
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may l
- CVE-2023-39322Sep 8, 2023affected < 2:4.6.1-7.el9_3fixed 2:4.6.1-7.el9_3
QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.
- CVE-2023-39321Sep 8, 2023affected < 2:4.6.1-7.el9_3fixed 2:4.6.1-7.el9_3
Processing an incomplete post-handshake message for a QUIC connection can cause a panic.
- CVE-2023-39319Sep 8, 2023affected < 2:4.6.1-7.el9_3fixed 2:4.6.1-7.el9_3
The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be
- CVE-2023-39318Sep 8, 2023affected < 2:4.6.1-7.el9_3fixed 2:4.6.1-7.el9_3
The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in contexts. This may cause the template parser to improperly interpret the contents of contexts, causing actions to be improperly escaped. This may
- CVE-2023-3978Aug 2, 2023affected < 2:4.6.1-5.el9fixed 2:4.6.1-5.el9
Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.
- CVE-2023-29409Aug 2, 2023affected < 2:4.6.1-7.el9_3fixed 2:4.6.1-7.el9_3
Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are curr
- CVE-2023-29406Jul 11, 2023affected < 2:4.6.1-5.el9fixed 2:4.6.1-5.el9
The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
- CVE-2023-24539May 11, 2023affected < 2:4.6.1-5.el9fixed 2:4.6.1-5.el9
Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untru
- CVE-2023-24540May 11, 2023affected < 2:4.6.1-5.el9fixed 2:4.6.1-5.el9
Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
- CVE-2023-29400May 11, 2023affected < 2:4.6.1-5.el9fixed 2:4.6.1-5.el9
Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.
- CVE-2023-24537Apr 6, 2023affected < 2:4.6.1-5.el9fixed 2:4.6.1-5.el9
Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.
- CVE-2023-24538Apr 6, 2023affected < 2:4.6.1-5.el9fixed 2:4.6.1-5.el9
Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the act
- CVE-2023-24534Apr 6, 2023affected < 2:4.6.1-5.el9fixed 2:4.6.1-5.el9
HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more m
- CVE-2023-24536Apr 6, 2023affected < 2:4.6.1-5.el9fixed 2:4.6.1-5.el9
Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can under
- CVE-2023-25809Mar 29, 2023affected < 2:4.0.2-24.module_el8.9.0+3627+db8ec155fixed 2:4.0.2-24.module_el8.9.0+3627+db8ec155
runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does n
- CVE-2023-28642Mar 29, 2023affected < 2:4.0.2-24.module_el8.9.0+3627+db8ec155fixed 2:4.0.2-24.module_el8.9.0+3627+db8ec155
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibitin
- CVE-2023-0778Mar 27, 2023affected < 3:4.4.1-8.module_el8.8.0+3568+e8578284fixed 3:4.4.1-8.module_el8.8.0+3568+e8578284
A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.
- CVE-2023-27561Mar 3, 2023affected < 2:4.0.2-24.module_el8.9.0+3627+db8ec155fixed 2:4.0.2-24.module_el8.9.0+3627+db8ec155
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this is
Page 3 of 6