podman-manpages vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the podman-manpages package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use of Uninitialized Variable

*
  • M
Improper Input Validation

*
  • H
Uncontrolled Recursion

*
  • M
Uncontrolled Recursion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Information Exposure Through Log Files

*
  • M
Improper Validation of Integrity Check Value

*
  • H
Memory Leak

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

*
  • M
Truncation of Security-relevant Information

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Placement of User into Incorrect Group

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Link Following

*
  • L
Directory Traversal

*
  • M
Algorithmic Complexity

*
  • M
CVE-2022-41715

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • L
Authentication Bypass by Primary Weakness

*
  • L
Insufficient Entropy

*
  • H
Improper Preservation of Permissions

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Information Exposure

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Resource Exhaustion

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Resource Exhaustion

*
  • H
Heap-based Buffer Overflow

<0:1.6.4-4.module+el8.1.1+5885+44006e55
  • H
Heap-based Buffer Overflow

<0:1.6.4-2.module+el8.1.1+5363+bf8ff1af
  • H
Use After Free

<0:1.6.4-2.module+el8.1.1+5363+bf8ff1af
  • H
Path Equivalence

<0:1.4.2-6.module+el8.1.0+4830+f49150d7
  • H
Link Following

<0:1.4.2-6.module+el8.1.0+4830+f49150d7
  • M
Incorrect Calculation

*
  • M
Improper Certificate Validation

*
  • H
Heap-based Buffer Overflow

<0:1.4.2-5.module+el8.1.0+4240+893c1ab8
  • H
Improper Enforcement of Behavioral Workflow

<0:1.4.2-5.module+el8.1.0+4240+893c1ab8
  • H
Insufficiently Protected Credentials

<0:1.4.2-5.module+el8.1.0+4240+893c1ab8
  • H
Resource Exhaustion

<0:1.4.2-6.module+el8.1.0+4830+f49150d7
  • H
Resource Exhaustion

<0:1.4.2-6.module+el8.1.0+4830+f49150d7
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Improper Validation of Array Index

*
  • M
Improper Validation of Array Index

*