podman-manpages vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the podman-manpages package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Incorrect Execution-Assigned Permissions

*
  • M
Reachable Assertion

*
  • H
CVE-2025-47913

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Link Following

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Creation of Temporary File With Insecure Permissions

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Race Condition

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • M
Cross-site Scripting (XSS)

*
  • L
Incorrect Authorization

*
  • L
Incorrect Authorization

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Improper Authorization

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Use of Uninitialized Variable

*
  • M
Improper Input Validation

*
  • H
Uncontrolled Recursion

*
  • M
Uncontrolled Recursion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Resource Exhaustion

*
  • M
Information Exposure Through Log Files

*
  • M
Improper Validation of Integrity Check Value

*
  • H
Memory Leak

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

*
  • M
Truncation of Security-relevant Information

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Placement of User into Incorrect Group

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Link Following

*
  • L
Directory Traversal

*
  • M
Algorithmic Complexity

*
  • M
CVE-2022-41715

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • L
Authentication Bypass by Primary Weakness

*
  • L
Insufficient Entropy

*
  • H
Improper Preservation of Permissions

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Information Exposure

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Resource Exhaustion

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Resource Exhaustion

*
  • H
Heap-based Buffer Overflow

<0:1.6.4-4.module+el8.1.1+5885+44006e55
  • H
Heap-based Buffer Overflow

<0:1.6.4-2.module+el8.1.1+5363+bf8ff1af
  • H
Use After Free

<0:1.6.4-2.module+el8.1.1+5363+bf8ff1af
  • H
Path Equivalence

<0:1.4.2-6.module+el8.1.0+4830+f49150d7
  • H
Link Following

<0:1.4.2-6.module+el8.1.0+4830+f49150d7
  • M
Incorrect Calculation

*
  • M
Improper Certificate Validation

*
  • H
Heap-based Buffer Overflow

<0:1.4.2-5.module+el8.1.0+4240+893c1ab8
  • H
Improper Enforcement of Behavioral Workflow

<0:1.4.2-5.module+el8.1.0+4240+893c1ab8
  • H
Insufficiently Protected Credentials

<0:1.4.2-5.module+el8.1.0+4240+893c1ab8
  • H
Resource Exhaustion

<0:1.4.2-6.module+el8.1.0+4830+f49150d7
  • H
Resource Exhaustion

<0:1.4.2-6.module+el8.1.0+4830+f49150d7
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Improper Validation of Array Index

*
  • M
Improper Validation of Array Index

*