rpm package
opensuse/docker&distro=openSUSE Leap 15.5
pkg:rpm/opensuse/docker&distro=openSUSE%20Leap%2015.5
Vulnerabilities (16)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-41110 | Cri | 9.9 | < 25.0.6_ce-150000.207.1 | 25.0.6_ce-150000.207.1 | Jul 24, 2024 | Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood | |
| CVE-2024-3727 | Hig | 8.3 | < 25.0.6_ce-150000.207.1 | 25.0.6_ce-150000.207.1 | May 14, 2024 | A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks. | |
| CVE-2024-1753 | Hig | 8.6 | < 25.0.6_ce-150000.207.1 | 25.0.6_ce-150000.207.1 | Mar 18, 2024 | A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause t | |
| CVE-2024-28180 | — | < 25.0.6_ce-150000.207.1 | 25.0.6_ce-150000.207.1 | Mar 9, 2024 | Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now ret | ||
| CVE-2024-24786 | Hig | 7.5 | < 25.0.6_ce-150000.207.1 | 25.0.6_ce-150000.207.1 | Mar 5, 2024 | The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set. | |
| CVE-2024-23653 | — | < 24.0.7_ce-150000.193.1 | 24.0.7_ce-150000.193.1 | Jan 31, 2024 | BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use th | ||
| CVE-2024-23652 | — | < 24.0.7_ce-150000.193.1 | 24.0.7_ce-150000.193.1 | Jan 31, 2024 | BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file o | ||
| CVE-2024-23651 | — | < 24.0.7_ce-150000.193.1 | 24.0.7_ce-150000.193.1 | Jan 31, 2024 | BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host syste | ||
| CVE-2023-47108 | — | < 26.1.5_ce-150000.212.1 | 26.1.5_ce-150000.212.1 | Nov 10, 2023 | OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Starting in version 0.37.0 and prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. | ||
| CVE-2023-45142 | — | < 26.1.5_ce-150000.212.1 | 26.1.5_ce-150000.212.1 | Oct 12, 2023 | OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests | ||
| CVE-2023-28840 | — | < 24.0.5_ce-150000.185.1 | 24.0.5_ce-150000.185.1 | Apr 4, 2023 | Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby, is commonly referred to as *Docke | ||
| CVE-2023-28841 | — | < 24.0.5_ce-150000.185.1 | 24.0.5_ce-150000.185.1 | Apr 4, 2023 | Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docker | ||
| CVE-2023-28842 | — | < 24.0.5_ce-150000.185.1 | 24.0.5_ce-150000.185.1 | Apr 4, 2023 | Moby) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docke | ||
| CVE-2020-12912 | — | < 24.0.7_ce-150000.190.4 | 24.0.7_ce-150000.190.4 | Nov 12, 2020 | A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require pr | ||
| CVE-2020-8695 | — | < 24.0.7_ce-150000.190.4 | 24.0.7_ce-150000.190.4 | Nov 12, 2020 | Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access. | ||
| CVE-2020-8694 | — | < 24.0.7_ce-150000.190.4 | 24.0.7_ce-150000.190.4 | Nov 12, 2020 | Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. |
- affected < 25.0.6_ce-150000.207.1fixed 25.0.6_ce-150000.207.1
Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood
- affected < 25.0.6_ce-150000.207.1fixed 25.0.6_ce-150000.207.1
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
- affected < 25.0.6_ce-150000.207.1fixed 25.0.6_ce-150000.207.1
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause t
- CVE-2024-28180Mar 9, 2024affected < 25.0.6_ce-150000.207.1fixed 25.0.6_ce-150000.207.1
Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now ret
- affected < 25.0.6_ce-150000.207.1fixed 25.0.6_ce-150000.207.1
The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.
- CVE-2024-23653Jan 31, 2024affected < 24.0.7_ce-150000.193.1fixed 24.0.7_ce-150000.193.1
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use th
- CVE-2024-23652Jan 31, 2024affected < 24.0.7_ce-150000.193.1fixed 24.0.7_ce-150000.193.1
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file o
- CVE-2024-23651Jan 31, 2024affected < 24.0.7_ce-150000.193.1fixed 24.0.7_ce-150000.193.1
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host syste
- CVE-2023-47108Nov 10, 2023affected < 26.1.5_ce-150000.212.1fixed 26.1.5_ce-150000.212.1
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Starting in version 0.37.0 and prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality.
- CVE-2023-45142Oct 12, 2023affected < 26.1.5_ce-150000.212.1fixed 26.1.5_ce-150000.212.1
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests
- CVE-2023-28840Apr 4, 2023affected < 24.0.5_ce-150000.185.1fixed 24.0.5_ce-150000.185.1
Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby, is commonly referred to as *Docke
- CVE-2023-28841Apr 4, 2023affected < 24.0.5_ce-150000.185.1fixed 24.0.5_ce-150000.185.1
Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docker
- CVE-2023-28842Apr 4, 2023affected < 24.0.5_ce-150000.185.1fixed 24.0.5_ce-150000.185.1
Moby) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docke
- CVE-2020-12912Nov 12, 2020affected < 24.0.7_ce-150000.190.4fixed 24.0.7_ce-150000.190.4
A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require pr
- CVE-2020-8695Nov 12, 2020affected < 24.0.7_ce-150000.190.4fixed 24.0.7_ce-150000.190.4
Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
- CVE-2020-8694Nov 12, 2020affected < 24.0.7_ce-150000.190.4fixed 24.0.7_ce-150000.190.4
Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.