buildah

Direct Vulnerabilities

Known vulnerabilities in the buildah package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-497x-jcxf-m478

<1.43.1-r3
  • H
NULL Pointer Dereference

<1.43.1-r3
  • L
GHSA-qf3q-3h68-mmh2

<1.43.1-r3
  • L
GHSA-8g2r-hhvj-mv99

<1.43.1-r3
  • L
CVE-2026-42499

<1.43.1-r3
  • H
Double Free

<1.43.1-r3
  • L
Cross-site Scripting (XSS)

<1.43.1-r3
  • L
GHSA-p9h5-jm8x-mjm5

<1.43.1-r3
  • L
GHSA-2283-wf8c-rw8r

<1.43.1-r3
  • L
GHSA-5m4p-2gjx-p2g8

<1.43.1-r3
  • L
CVE-2026-42501

<1.43.1-r3
  • L
GHSA-xq5j-9r39-c3vf

<1.43.1-r3
  • L
GHSA-3v2c-x6q9-f697

<1.43.1-r3
  • M
Out-of-bounds Write

<1.43.1-r3
  • H
Allocation of Resources Without Limits or Throttling

<1.43.1-r3
  • M
Link Following

<1.43.1-r3
  • L
GHSA-qc64-m6c2-v4x7

<1.43.1-r3
  • L
Improper Encoding or Escaping of Output

<1.43.1-r3
  • L
GHSA-mh2q-q3fh-2475

<1.43.1-r2
  • L
Allocation of Resources Without Limits or Throttling

<1.43.1-r2
  • L
CVE-2026-32280

<1.43.1-r1
  • L
GHSA-m4pr-4j3g-9v7v

<1.43.1-r1
  • H
Allocation of Resources Without Limits or Throttling

<1.43.1-r1
  • L
GHSA-x4jj-h2v8-hqqv

<1.43.1-r1
  • H
Improper Certificate Validation

<1.43.1-r1
  • H
Incorrect Authorization

<1.43.1-r1
  • M
Allocation of Resources Without Limits or Throttling

<1.43.1-r1
  • L
GHSA-7mr4-xjxg-34g6

<1.43.1-r1
  • M
Cross-site Scripting (XSS)

<1.43.1-r1
  • L
GHSA-5w89-2c2x-6x66

<1.43.1-r1
  • L
GHSA-gjvh-7jh8-7xhm

<1.43.1-r1
  • L
GHSA-jrg3-gfjw-hm96

<1.43.1-r1
  • L
GHSA-78h2-9frx-2jm8

<1.43.0-r7
  • L
Uncaught Exception

<1.43.0-r7
  • L
GHSA-p77j-4mvh-x3m3

<1.43.0-r5
  • L
Improper Authorization

<1.43.0-r5
  • L
GHSA-j3gx-2473-5fp8

<1.43.0-r1
  • L
Direct Request ('Forced Browsing')

<1.43.0-r1
  • L
GHSA-j4j7-vw47-rhfq

<1.43.0-r1
  • L
Cross-site Scripting (XSS)

<1.43.0-r1
  • L
GHSA-rv83-g57w-fr8j

<1.43.0-r1
  • L
Directory Traversal

<1.43.0-r1
  • L
GHSA-fcv2-xgw5-pqxf

<1.42.2-r4
  • L
Directory Traversal

<1.42.2-r4
  • H
Symlink Following

<1.42.2-r0
  • L
GHSA-hcg3-q754-cr77

<1.39.2-r31
  • L
GHSA-cgrx-mc8f-2prm

<1.42.2-r0
  • L
Information Exposure

<1.42.2-r2
  • L
GHSA-f83f-xpx7-ffpw

<1.42.2-r1
  • L
GHSA-jv3w-x3r3-g6rm

<1.42.2-r2
  • L
Asymmetric Resource Consumption (Amplification)

<1.42.2-r1
  • L
GHSA-f6x5-jh6r-wrfv

<1.42.1-r1
  • L
GHSA-j5w8-q4qc-rx2x

<1.42.1-r1
  • L
CVE-2025-58181

<1.42.1-r1
  • L
CVE-2025-47914

<1.42.1-r1
  • H
Symlink Following

<1.42.0-r1
  • H
Symlink Following

<1.42.0-r1
  • M
Missing Initialization of Resource

<1.41.0-r1
  • L
CVE-2025-22872

<1.39.4-r2
  • L
CVE-2025-22871

<1.39.4-r1
  • L
CVE-2025-22870

<1.39.2-r32
  • L
CVE-2025-22869

<1.39.2-r31
  • H
Improper Privilege Management

<1.39.0-r2
  • L
Allocation of Resources Without Limits or Throttling

<1.39.0-r2
  • M
Improper Input Validation

<1.39.0-r2
  • M
Directory Traversal

<1.39.0-r2
  • L
CVE-2025-22866

<1.39.0-r1
  • L
CVE-2024-45338

<1.38.0-r2
  • L
CVE-2024-45337

<1.38.0-r1
  • H
Link Following

<1.37.3-r1
  • L
CVE-2024-34156

<1.37.2-r1
  • L
CVE-2024-34158

<1.37.2-r1
  • L
CVE-2024-34155

<1.37.2-r1
  • L
CVE-2024-45310

<1.37.2-r1
  • L
CVE-2024-41110

<1.37.0-r0
  • L
CVE-2024-24791

<1.36.0-r2
  • M
CVE-2024-24789

<1.36.0-r1
  • C
CVE-2024-24790

<1.36.0-r1
  • L
Improper Validation of Integrity Check Value

<1.35.4-r0
  • L
Arbitrary Command Injection

<1.35.3-r1