buildah vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the buildah package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-fcv2-xgw5-pqxf

<1.42.2-r4
  • L
Directory Traversal

<1.42.2-r4
  • H
Symlink Following

<1.42.2-r0
  • L
GHSA-hcg3-q754-cr77

<1.39.2-r31
  • L
GHSA-cgrx-mc8f-2prm

<1.42.2-r0
  • L
Information Exposure

<1.42.2-r2
  • L
GHSA-f83f-xpx7-ffpw

<1.42.2-r1
  • L
GHSA-jv3w-x3r3-g6rm

<1.42.2-r2
  • L
Asymmetric Resource Consumption (Amplification)

<1.42.2-r1
  • L
GHSA-f6x5-jh6r-wrfv

<1.42.1-r1
  • L
GHSA-j5w8-q4qc-rx2x

<1.42.1-r1
  • L
CVE-2025-58181

<1.42.1-r1
  • L
CVE-2025-47914

<1.42.1-r1
  • H
Symlink Following

<1.42.0-r1
  • L
GHSA-9493-h29p-rfm2

<1.42.0-r1
  • L
GHSA-qw9x-cqr3-wc7r

<1.42.0-r1
  • H
Symlink Following

<1.42.0-r1
  • L
GHSA-x4rx-4gw3-53p4

<1.41.0-r1
  • M
Missing Initialization of Resource

<1.41.0-r1
  • L
GHSA-vvgc-356p-c3xw

<1.39.4-r2
  • L
CVE-2025-22872

<1.39.4-r2
  • L
GHSA-g9pc-8g42-g6vq

<1.39.4-r1
  • L
CVE-2025-22871

<1.39.4-r1
  • L
GHSA-qxp5-gwg8-xv66

<1.39.2-r32
  • L
CVE-2025-22870

<1.39.2-r32
  • L
CVE-2025-22869

<1.39.2-r31
  • L
GHSA-586p-749j-fhwp

<1.39.0-r2
  • L
GHSA-fhqq-8f65-5xfc

<1.39.0-r2
  • L
GHSA-5vpc-35f4-r8w6

<1.39.0-r2
  • H
Improper Privilege Management

<1.39.0-r2
  • L
Allocation of Resources Without Limits or Throttling

<1.39.0-r2
  • L
GHSA-c6gw-w398-hv78

<1.39.0-r2
  • M
Improper Input Validation

<1.39.0-r2
  • M
Directory Traversal

<1.39.0-r2
  • L
CVE-2025-22866

<1.39.0-r1
  • L
GHSA-3whm-j4xm-rv8x

<1.39.0-r1
  • L
CVE-2024-45338

<1.38.0-r2
  • L
GHSA-w32m-9786-jp63

<1.38.0-r2
  • L
CVE-2024-45337

<1.38.0-r1
  • L
GHSA-v778-237x-gjrc

<1.38.0-r1
  • L
GHSA-mc76-5925-c5p6

<1.37.3-r1
  • H
Link Following

<1.37.3-r1
  • L
GHSA-j7vj-rw65-4v26

<1.37.2-r1
  • L
CVE-2024-34156

<1.37.2-r1
  • L
GHSA-crqm-pwhx-j97f

<1.37.2-r1
  • L
CVE-2024-34158

<1.37.2-r1
  • L
GHSA-8xfx-rj4p-23jm

<1.37.2-r1
  • L
CVE-2024-34155

<1.37.2-r1
  • L
CVE-2024-45310

<1.37.2-r1
  • L
GHSA-jfvp-7x6p-h2pv

<1.37.2-r1
  • L
CVE-2024-41110

<1.37.0-r0
  • L
GHSA-v23v-6jw2-98fq

<1.37.0-r0
  • L
GHSA-hw49-2p59-3mhj

<1.36.0-r2
  • L
CVE-2024-24791

<1.36.0-r2
  • M
CVE-2024-24789

<1.36.0-r1
  • L
GHSA-49gw-vxvf-fc2g

<1.36.0-r1
  • C
CVE-2024-24790

<1.36.0-r1
  • L
GHSA-236w-p7wf-5ph8

<1.36.0-r1
  • L
GHSA-6wvf-f2vw-3425

<1.35.4-r0
  • L
GHSA-2cgq-h8xw-2v5j

<1.35.3-r1
  • L
Improper Validation of Integrity Check Value

<1.35.4-r0
  • L
Arbitrary Command Injection

<1.35.3-r1