cri-o vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the cri-o package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Open Redirect

*
  • M
CVE-2025-68121

*
  • M
Improper Validation of Integrity Check Value

*
  • M
Directory Traversal

*
  • M
Resource Exhaustion

*
  • M
Missing Reference to Active Allocated Resource

*
  • M
Server-Side Request Forgery (SSRF)

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • M
Improper Certificate Validation

*
  • M
Reachable Assertion

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
CVE-2025-4673

*
  • H
Resource Exhaustion

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Incorrect Authorization

*
  • L
Incorrect Authorization

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Improper Authorization

*
  • L
Race Condition

*
  • H
Resource Exhaustion

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Integer Overflow or Wraparound

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Incorrect Default Permissions

*
  • H
Resource Exhaustion

*
  • L
Improper Access Control

*
  • L
Incorrect Default Permissions

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Use After Free

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Incorrect Calculation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Directory Traversal

*