VYPR

rpm package

suse/docker&distro=SUSE Linux Enterprise Module for Containers 15 SP5

pkg:rpm/suse/docker&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP5

Vulnerabilities (16)

  • CVE-2024-41110CriJul 24, 2024
    affected < 25.0.6_ce-150000.207.1fixed 25.0.6_ce-150000.207.1

    Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood

  • CVE-2024-3727HigMay 14, 2024
    affected < 25.0.6_ce-150000.207.1fixed 25.0.6_ce-150000.207.1

    A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.

  • CVE-2024-1753HigMar 18, 2024
    affected < 25.0.6_ce-150000.207.1fixed 25.0.6_ce-150000.207.1

    A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause t

  • CVE-2024-28180Mar 9, 2024
    affected < 25.0.6_ce-150000.207.1fixed 25.0.6_ce-150000.207.1

    Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now ret

  • CVE-2024-24786HigMar 5, 2024
    affected < 25.0.6_ce-150000.207.1fixed 25.0.6_ce-150000.207.1

    The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.

  • CVE-2024-23653Jan 31, 2024
    affected < 24.0.7_ce-150000.193.1fixed 24.0.7_ce-150000.193.1

    BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use th

  • CVE-2024-23652Jan 31, 2024
    affected < 24.0.7_ce-150000.193.1fixed 24.0.7_ce-150000.193.1

    BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file o

  • CVE-2024-23651Jan 31, 2024
    affected < 24.0.7_ce-150000.193.1fixed 24.0.7_ce-150000.193.1

    BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host syste

  • CVE-2023-47108Nov 10, 2023
    affected < 26.1.5_ce-150000.212.1fixed 26.1.5_ce-150000.212.1

    OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Starting in version 0.37.0 and prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality.

  • CVE-2023-45142Oct 12, 2023
    affected < 26.1.5_ce-150000.212.1fixed 26.1.5_ce-150000.212.1

    OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests

  • CVE-2023-28840Apr 4, 2023
    affected < 24.0.5_ce-150000.185.1fixed 24.0.5_ce-150000.185.1

    Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby, is commonly referred to as *Docke

  • CVE-2023-28841Apr 4, 2023
    affected < 24.0.5_ce-150000.185.1fixed 24.0.5_ce-150000.185.1

    Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docker

  • CVE-2023-28842Apr 4, 2023
    affected < 24.0.5_ce-150000.185.1fixed 24.0.5_ce-150000.185.1

    Moby) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docke

  • CVE-2020-12912Nov 12, 2020
    affected < 24.0.7_ce-150000.190.4fixed 24.0.7_ce-150000.190.4

    A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require pr

  • CVE-2020-8695Nov 12, 2020
    affected < 24.0.7_ce-150000.190.4fixed 24.0.7_ce-150000.190.4

    Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2020-8694Nov 12, 2020
    affected < 24.0.7_ce-150000.190.4fixed 24.0.7_ce-150000.190.4

    Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.