podman-remote vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the podman-remote package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Privilege Management

<4:5.2.2-13.0.1.el9_5
  • M
Link Following

<4:5.2.2-1.0.2.el9
  • M
CVE-2024-24789

<4:5.2.2-1.0.2.el9
  • M
CVE-2024-24791

<4:5.2.2-1.0.2.el9
  • M
Improper Validation of Integrity Check Value

<4:5.2.2-1.0.2.el9
  • H
Directory Traversal

<4:5.2.2-9.0.1.el9_5
  • H
Improper Input Validation

<4:5.2.2-9.0.1.el9_5
  • H
Directory Traversal

<4:5.2.2-9.0.1.el9_5
  • H
CVE-2024-34156

<4:5.2.2-9.0.1.el9_5
  • H
Link Following

<4:5.2.2-9.0.1.el9_5
  • H
CVE-2024-34155

<4:5.2.2-9.0.1.el9_5
  • H
CVE-2024-34158

<4:5.2.2-9.0.1.el9_5
  • M
CVE-2023-39321

<2:4.6.1-7.0.1.el9_3
  • M
Allocation of Resources Without Limits or Throttling

<2:4.6.1-7.0.1.el9_3
  • M
Cross-site Scripting (XSS)

<2:4.6.1-7.0.1.el9_3
  • H
Information Exposure Through Log Files

<4:4.9.4-10.0.1.el9_4
  • H
CVE-2024-24783

<4:4.9.4-10.0.1.el9_4
  • H
CVE-2024-37298

<4:4.9.4-10.0.1.el9_4
  • H
Memory Leak

<4:4.9.4-5.0.1.el9_4
  • M
CVE-2024-28180

<4:4.9.4-4.0.1.el9_4
  • M
CVE-2024-28176

<4:4.9.4-4.0.1.el9_4
  • M
CVE-2023-45290

<4:4.9.4-4.0.1.el9_4
  • M
CVE-2024-24786

<4:4.9.4-3.0.1.el9_4
  • M
Link Following

<4:4.9.4-3.0.1.el9_4
  • M
Information Exposure

<2:4.9.4-0.1.0.1.el9
  • M
CVE-2023-39326

<2:4.9.4-0.1.0.1.el9
  • M
Cross-site Scripting (XSS)

<2:4.6.1-7.0.1.el9_3
  • M
Resource Exhaustion

<2:4.6.1-7.0.1.el9_3
  • M
Integer Overflow or Wraparound

<2:4.6.1-5.0.1.el9
  • M
Allocation of Resources Without Limits or Throttling

<2:4.6.1-5.0.1.el9
  • M
Cross-site Scripting (XSS)

<2:4.6.1-5.0.1.el9
  • M
Arbitrary Code Injection

<2:4.6.1-5.0.1.el9
  • M
Incorrect Authorization

<2:4.6.1-5.0.1.el9
  • M
Resource Exhaustion

<2:4.6.1-5.0.1.el9
  • M
CVE-2023-24540

<2:4.6.1-5.0.1.el9
  • M
Arbitrary Code Injection

<2:4.6.1-5.0.1.el9
  • M
Arbitrary Code Injection

<2:4.6.1-5.0.1.el9
  • M
Resource Exhaustion

<2:4.6.1-5.0.1.el9
  • M
Interpretation Conflict

<2:4.6.1-5.0.1.el9
  • M
CVE-2022-41723

<2:4.6.1-5.0.1.el9
  • M
Allocation of Resources Without Limits or Throttling

<2:4.6.1-5.0.1.el9
  • M
Allocation of Resources Without Limits or Throttling

<2:4.4.1-3.0.1.el9
  • M
Information Exposure

<2:4.2.0-3.0.1.el9
  • L
Placement of User into Incorrect Group

<2:4.2.0-7.0.1.el9_1
  • L
Placement of User into Incorrect Group

<2:4.2.0-7.0.1.el9_1
  • M
CVE-2022-27191

<2:4.2.0-3.0.1.el9
  • M
Improper Validation of Array Index

<2:4.2.0-3.0.1.el9
  • M
Improper Validation of Array Index

<2:4.2.0-3.0.1.el9
  • M
Use of Insufficiently Random Values

<2:4.4.1-3.0.1.el9
  • M
Missing Authorization

<2:4.2.0-3.0.1.el9
  • M
Improper Locking

<2:4.2.0-3.0.1.el9
  • M
Improper Certificate Validation

<2:4.2.0-3.0.1.el9
  • M
Origin Validation Error

<2:4.2.0-3.0.1.el9