Allocation of Resources Without Limits or Throttling The advisory has been revoked - it doesn't affect any version of package github.com/containers/podman/v5  (opens in a new tab)


Threat Intelligence

EPSS
0.23% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMCONTAINERSPODMANV5-7578250
  • published4 Aug 2024
  • disclosed25 Jul 2024
  • creditUnknown

Introduced: 25 Jul 2024

CVE-2024-3056  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

There is no fixed version for github.com/containers/podman/v5.

Amendment

This was deemed not a vulnerability.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling by standing up a malicious container on the same IPC as the victim container. The malicious container can exhaust resources in the shared IPC namespace, which will be created in /dev/shm and not destroyed when the malicious container runs out of memory and crashes. By configuring the malicious container to restart always, the attacker can deny service to the other container by repeatedly occupying and not releasing resources with every restart.