microshift-sriov-release-info vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the microshift-sriov-release-info package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Improper Certificate Validation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Certificate Validation

*
  • M
CVE-2025-68121

*
  • M
Missing Reference to Active Allocated Resource

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
CVE-2025-58186

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Reachable Assertion

*
  • M
Out-of-bounds Read

*
  • H
Reachable Assertion

*
  • M
Resource Exhaustion

*
  • M
CVE-2025-4673

*
  • M
Missing Authentication for Critical Function

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • M
Expected Behavior Violation

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Information Exposure

*
  • L
Incorrect Authorization

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • L
Incorrect Authorization

*
  • H
Asymmetric Resource Consumption (Amplification)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Expected Behavior Violation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Use of Uninitialized Variable

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Improper Verification of Cryptographic Signature

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Incorrect Execution-Assigned Permissions

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Information Exposure

*