Red Hat Openshift Ironic
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Red Hat Openshift Ironic.
By the Year
In 2026 there have been 0 vulnerabilities in Red Hat Openshift Ironic. Last year, in 2025 Openshift Ironic had 1 security vulnerability published. Right now, Openshift Ironic is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 1 | 8.60 |
| 2024 | 3 | 6.73 |
| 2023 | 1 | 5.30 |
It may take a day or so for new Openshift Ironic vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Openshift Ironic Security Vulnerabilities
CVE-2024-11218: Podman Build Race Allows Host Enumeration
CVE-2024-11218
8.6 - High
- January 22, 2025
A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host.
Improper Privilege Management
Symlink Traversal via containers/storage leads Podman/CRIO OOM CVE20249676
CVE-2024-9676
6.5 - Medium
- October 15, 2024
A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.
Directory traversal
containers/common Go lib FIPS Path Validation Flaw Enables Host Dir Exposure
CVE-2024-9341
5.4 - Medium
- October 01, 2024
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
insecure temporary file
Authenticated Registry Access Path Traversal in containers/image
CVE-2024-3727
8.3 - High
- May 14, 2024
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
Improper Validation of Integrity Check Value
RedHat python-eventlet Regression: Patch CVE-2021-21419 Missing
CVE-2023-5625
5.3 - Medium
- November 01, 2023
A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.
Allocation of Resources Without Limits or Throttling
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Red Hat Openshift Ironic or by Red Hat? Click the Watch button to subscribe.