VYPR

apk package

chainguard/berg

pkg:apk/chainguard/berg

Vulnerabilities (10)

  • CVE-2026-31812HigMar 10, 2026
    affected < 0.5.5-r2fixed 0.5.5-r2

    Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malf

  • CVE-2026-25727Feb 6, 2026
    affected < 0.5.5-r0fixed 0.5.5-r0

    time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used

  • CVE-2026-25541Feb 4, 2026
    affected < 0.5.4-r2fixed 0.5.4-r2

    Bytes is a utility library for working with bytes. From version 1.2.1 to before 1.11.1, Bytes is vulnerable to integer overflow in BytesMut::reserve. In the unique reclaim path of BytesMut::reserve, if the condition "v_capacity >= new_cap + offset" uses an unchecked addition. Whe

  • CVE-2025-58160LowAug 29, 2025
    affected < 0.4.11-r2fixed 0.4.11-r2

    tracing is a framework for instrumenting Rust programs to collect structured, event-based diagnostic information. Prior to version 0.3.20, tracing-subscriber was vulnerable to ANSI escape sequence injection attacks. Untrusted user input containing ANSI escape sequences could be i

  • CVE-2023-53159Jul 28, 2025
    affected < 0.3.5-r2fixed 0.3.5-r2

    The openssl crate before 0.10.55 for Rust allows an out-of-bounds read via an empty string to X509VerifyParamRef::set_host.

  • CVE-2024-12224May 30, 2025
    affected < 0.4.7-r0fixed 0.4.7-r0

    Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.

  • CVE-2025-24898MedFeb 3, 2025
    affected < 0.4.7-r1fixed 0.4.7-r1

    rust-openssl is a set of OpenSSL bindings for the Rust programming language. In affected versions `ssl::select_next_proto` can return a slice pointing into the `server` argument's buffer but with a lifetime bound to the `client` argument. In situations where the `sever` buffer's

  • CVE-2024-43806MedAug 26, 2024
    affected < 0.3.5-r2fixed 0.3.5-r2

    Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this c

  • CVE-2024-27308Mar 6, 2024
    affected < 0.3.5-r2fixed 0.3.5-r2

    Mio is a Metal I/O library for Rust. When using named pipes on Windows, mio will under some circumstances return invalid tokens that correspond to named pipes that have already been deregistered from the mio registry. The impact of this vulnerability depends on how mio is used. F

  • CVE-2020-26235Nov 24, 2020
    affected < 0.4.7-r0fixed 0.4.7-r0

    In Rust time crate from version 0.2.7 and before version 0.2.23, unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires the user to set any environment variable in a different thread than the affected functions. T