kata-containers vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kata-containers package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Preservation of Permissions

*
  • M
CVE-2025-68121

*
  • M
Directory Traversal

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Missing Reference to Active Allocated Resource

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Validation of Specified Type of Input

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • M
Signed to Unsigned Conversion Error

*
  • M
Improper Certificate Validation

*
  • M
Resource Exhaustion

*
  • H
Incorrect Execution-Assigned Permissions

*
  • M
Reachable Assertion

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Directory Traversal

*
  • L
Improper Neutralization

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Encoding or Escaping of Output

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Buffer Over-read

*
  • L
Compiler Optimization Removal or Modification of Security-critical Code

*
  • M
CVE-2025-4673

*
  • M
Improper Validation of Unsafe Equivalence in Input

*
  • M
Double Free

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Integer Overflow or Wraparound

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Incorrect Authorization

*
  • L
Incorrect Authorization

*
  • M
Improper Input Validation

*
  • L
Use After Free

*
  • L
Improper Input Validation

*
  • M
Incorrect Default Permissions

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*