Search for packages
| purl | pkg:rpm/redhat/cri-o@1.25.5-30.rhaos4.12.git53dc492?arch=el8 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-p3we-3y2n-vugu
Aliases: CVE-2024-9341 GHSA-mc76-5925-c5p6 |
Link Following in github.com/containers/common A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system. | There are no reported fixed by versions. |
|
VCID-zcxt-ccb2-eufc
Aliases: CVE-2024-9676 |
Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:44:52.241383+00:00 | RedHat Importer | Affected by | VCID-p3we-3y2n-vugu | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9341.json | 38.0.0 |
| 2026-04-01T13:44:45.982059+00:00 | RedHat Importer | Affected by | VCID-zcxt-ccb2-eufc | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9676.json | 38.0.0 |