CVEFinder.io

CVE-2024-3056

âš ī¸ high
🔍 Scan for this CVE
Summary

A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious container will continue to exhaust resources until it is out-of-memory (OOM) killed. While the malicious container's cgroup will be removed, the IPC resources it created are not. Those resources are tied to the IPC namespace that will not be removed

Description

A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious container will continue to exhaust resources until it is out-of-memory (OOM) killed. While the malicious container's cgroup will be removed, the IPC resources it created are not. Those resources are tied to the IPC namespace that will not be removed until all containers using it are stopped, and one non-malicious container is holding the namespace open. The malicious container is restarted, either automatically or by attacker control, repeating the process and increasing the amount of memory consumed. With a container configured to restart always, such as `podman run --restart=always`, this can result in a memory-based denial of service of the system.

CVSS Score
7.7
High
EPSS Score
0.4
Exploit Probability
Published Date
2024-08-02
First Seen: 2026-01-05
📊 Relative Risk Intelligence

This CVE is Moderate Risk - more severe than 69.7% of all 318,071 vulnerabilities in our database.

#96,256
Above average severity
Severity Percentile
đŸŽ¯ CISA SSVC Assessment Updated: Aug 3, 2024
🔍 Exploitation Status
None
No known exploits
âš™ī¸ Automatable
NO
Requires human interaction
đŸ’Ĩ Technical Impact
Partial
Limited system impact
SSVC data provided by CISA
Last Modified 2024-12-27
CVSS Vector 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:H
CWE IDs (Weakness Types)

đŸ“Ļ Affected Products 5

🔗 References 3

🔗 Related CVEs 6

CVE ID Severity CVSS EPSS Summary Published
CVE-2026-4878 đŸ”ļ medium 6.7 0.0 A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition... 2026-04-09
CVE-2026-35091 âš ī¸ high 8.2 0.3 A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Co... 2026-04-01
CVE-2026-35092 âš ī¸ high 7.5 1.0 A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a re... 2026-04-01
CVE-2026-35093 âš ī¸ high 8.8 0.0 A flaw was found in libinput. A local attacker who can place a specially crafted Lua bytecode file in certain system or ... 2026-04-01
CVE-2026-35094 â„šī¸ low 3.3 0.0 A flaw was found in libinput. An attacker capable of deploying a Lua plugin file in specific system directories can expl... 2026-04-01
CVE-2026-5121 âš ī¸ high 7.5 0.1 A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer ... 2026-03-30
These CVEs affect the same products