container-tools:2.0/podman-docker vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the container-tools:2.0/podman-docker package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Information Exposure

<0:1.6.4-24.module+el8.2.0+21264+96602818
  • H
Information Exposure

<0:1.6.4-24.module+el8.2.0+21264+96602818
  • H
Information Exposure

<0:1.6.4-24.module+el8.2.0+21264+96602818
  • L
Authentication Bypass by Primary Weakness

*
  • H
Improper Preservation of Permissions

*
  • H
Improper Preservation of Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • H
Improper Preservation of Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • H
Improper Preservation of Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • H
Improper Preservation of Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • H
Incorrect Default Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.4.0+14792+f44be4c2
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • H
Incorrect Default Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • H
Incorrect Default Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.4.0+14792+f44be4c2
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.4.0+14792+f44be4c2
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.4.0+14792+f44be4c2
  • H
Incorrect Default Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • H
Incorrect Default Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.4.0+14792+f44be4c2
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • H
Incorrect Default Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • H
Incorrect Default Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.4.0+14792+f44be4c2
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.4.0+14792+f44be4c2
  • H
Incorrect Default Permissions

<0:1.6.4-24.module+el8.2.0+14896+bf621b2a
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.5.0+14796+e4386a39
  • M
Incorrect Default Permissions

<0:1.6.4-28.module+el8.4.0+14792+f44be4c2
  • M
Missing Release of Resource after Effective Lifetime

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Resource Exhaustion

*
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-19.module+el8.2.0+11121+714aca16
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-19.module+el8.2.0+11121+714aca16
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-19.module+el8.2.0+11121+714aca16
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-19.module+el8.2.0+11121+714aca16
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.6.4-26.module+el8.4.0+10193+e90fd8eb
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-19.module+el8.2.0+10175+e12b0910
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-19.module+el8.2.0+10175+e12b0910
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-19.module+el8.2.0+10175+e12b0910
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-19.module+el8.2.0+10175+e12b0910
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Incorrect Authorization

<0:1.6.4-26.module+el8.3.0+10188+4c10031c
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • H
Directory Traversal

<0:1.6.4-11.module+el8.2.0+6369+1f4293b4
  • L
Resource Exhaustion

*
  • M
Incorrect Calculation

*
  • M
Improper Certificate Validation

*
  • M
Information Exposure

<0:1.6.4-26.module+el8.5.0+10223+f7559c42
  • M
Information Exposure

<0:1.6.4-26.module+el8.5.0+10223+f7559c42
  • M
Information Exposure

<0:1.6.4-26.module+el8.5.0+10223+f7559c42
  • M
Information Exposure

<0:1.6.4-26.module+el8.5.0+10223+f7559c42
  • M
Information Exposure

<0:1.6.4-26.module+el8.5.0+10223+f7559c42
  • M
Information Exposure

<0:1.6.4-26.module+el8.5.0+10223+f7559c42
  • M
Information Exposure

<0:1.6.4-26.module+el8.5.0+10223+f7559c42
  • M
Information Exposure

<0:1.6.4-26.module+el8.5.0+10223+f7559c42
  • M
Information Exposure

<0:1.6.4-26.module+el8.5.0+10223+f7559c42
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Improper Validation of Array Index

*
  • M
Improper Validation of Array Index

*