Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/cri-o@1.23.0-92.rhaos4.10.gitdaab4d1?arch=el7
purl pkg:rpm/redhat/cri-o@1.23.0-92.rhaos4.10.gitdaab4d1?arch=el7
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-2zj9-xmsh-xbcn
Aliases:
CVE-2021-44717
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. There are no reported fixed by versions.
VCID-e4bk-d465-juhk
Aliases:
CVE-2021-41190
GHSA-mc8v-mgrf-8f4m
Clarify Content-Type handling ### Impact In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. ### Patches The OCI Distribution Specification will be updated to require that a `mediaType` value present in a manifest or index match the Content-Type header used during the push and pull operations. ### Workarounds Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields. ### References https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/opencontainers/distribution-spec/ * Email us at security@opencontainers.org There are no reported fixed by versions.
VCID-s6sw-jsfr-xyhv
Aliases:
CVE-2022-0532
GHSA-jqmc-79gx-7g8p
Incorrect Permission Assignment for Critical Resource in CRI-O An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace. There are no reported fixed by versions.
VCID-w53f-uad6-gqdn
Aliases:
CVE-2021-44716
GHSA-vc3p-29h2-gpcp
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:01:01.226164+00:00 RedHat Importer Affected by VCID-e4bk-d465-juhk https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41190.json 38.0.0
2026-04-01T14:00:54.623916+00:00 RedHat Importer Affected by VCID-2zj9-xmsh-xbcn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44717.json 38.0.0
2026-04-01T14:00:53.941204+00:00 RedHat Importer Affected by VCID-w53f-uad6-gqdn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44716.json 38.0.0
2026-04-01T13:59:48.346090+00:00 RedHat Importer Affected by VCID-s6sw-jsfr-xyhv https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0532.json 38.0.0