Search for packages
| purl | pkg:rpm/redhat/cri-o@1.23.0-92.rhaos4.10.gitdaab4d1?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2zj9-xmsh-xbcn
Aliases: CVE-2021-44717 |
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. | There are no reported fixed by versions. |
|
VCID-e4bk-d465-juhk
Aliases: CVE-2021-41190 GHSA-mc8v-mgrf-8f4m |
Clarify Content-Type handling ### Impact In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. ### Patches The OCI Distribution Specification will be updated to require that a `mediaType` value present in a manifest or index match the Content-Type header used during the push and pull operations. ### Workarounds Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields. ### References https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/opencontainers/distribution-spec/ * Email us at security@opencontainers.org | There are no reported fixed by versions. |
|
VCID-s6sw-jsfr-xyhv
Aliases: CVE-2022-0532 GHSA-jqmc-79gx-7g8p |
Incorrect Permission Assignment for Critical Resource in CRI-O An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace. | There are no reported fixed by versions. |
|
VCID-w53f-uad6-gqdn
Aliases: CVE-2021-44716 GHSA-vc3p-29h2-gpcp |
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:01:01.226164+00:00 | RedHat Importer | Affected by | VCID-e4bk-d465-juhk | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41190.json | 38.0.0 |
| 2026-04-01T14:00:54.623916+00:00 | RedHat Importer | Affected by | VCID-2zj9-xmsh-xbcn | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44717.json | 38.0.0 |
| 2026-04-01T14:00:53.941204+00:00 | RedHat Importer | Affected by | VCID-w53f-uad6-gqdn | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44716.json | 38.0.0 |
| 2026-04-01T13:59:48.346090+00:00 | RedHat Importer | Affected by | VCID-s6sw-jsfr-xyhv | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0532.json | 38.0.0 |