Search for packages
| purl | pkg:rpm/redhat/podman@6:5.4.0-9?arch=el10_0 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-cmts-6kz4-zkh8
Aliases: CVE-2025-22869 GHSA-hcg3-q754-cr77 |
golang.org/x/crypto Vulnerable to Denial of Service (DoS) via Slow or Incomplete Key Exchange SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted. | There are no reported fixed by versions. |
|
VCID-rbtx-222u-zudf
Aliases: CVE-2025-27144 GHSA-c6gw-w398-hv78 |
DoS in go-jose Parsing ### Impact When parsing compact JWS or JWE input, go-jose could use excessive memory. The code used strings.Split(token, ".") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of '.' characters. An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service. ### Patches Version 4.0.5 fixes this issue ### Workarounds Applications could pre-validate payloads passed to go-jose do not contain an excessive number of '.' characters. ### References This is the same sort of issue as in the golang.org/x/oauth2/jws package as CVE-2025-22868 and Go issue https://go.dev/issue/71490. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:42:40.066364+00:00 | RedHat Importer | Affected by | VCID-rbtx-222u-zudf | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27144.json | 38.0.0 |
| 2026-04-01T13:42:14.959774+00:00 | RedHat Importer | Affected by | VCID-cmts-6kz4-zkh8 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22869.json | 38.0.0 |