kata-runtime vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kata-runtime package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2023-39326

<0:1.12.1-11.el7
  • H
Allocation of Resources Without Limits or Throttling

<0:1.12.1-9.el7
  • H
CVE-2023-44487

<0:1.12.1-9.el7
  • H
CVE-2020-8554

<0:1.7.3-1.0.7.el7
  • H
Incorrect Permission Assignment for Critical Resource

<0:1.11.5-1.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.11.5-2.el7
  • H
Link Following

<0:1.7.3-1.0.5.el7
  • H
Origin Validation Error

<0:1.7.3-1.0.5.el7
  • H
Improper Preservation of Permissions

<0:1.7.3-1.0.5.el7
  • H
Resource Exhaustion

<0:1.7.3-1.0.5.el7
  • H
NULL Pointer Dereference

<0:1.7.3-1.0.5.el7
  • H
Use of Hard-coded Credentials

<0:1.7.3-1.0.5.el7
  • H
Link Following

<0:1.7.3-1.0.5.el7
  • H
Open Redirect

<0:1.7.3-1.0.5.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-1.0.6.el7
  • H
Improper Enforcement of Message or Data Structure

<0:1.7.3-1.0.5.el7