VYPR

apk package

chainguard/go-1.19

pkg:apk/chainguard/go-1.19

Vulnerabilities (15)

  • CVE-2023-29406Jul 11, 2023
    affected < 1.19.11-r0fixed 1.19.11-r0

    The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.

  • CVE-2023-24539May 11, 2023
    affected < 1.19.9-r0fixed 1.19.9-r0

    Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untru

  • CVE-2023-24540May 11, 2023
    affected < 1.19.9-r0fixed 1.19.9-r0

    Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

  • CVE-2023-29400May 11, 2023
    affected < 1.19.9-r0fixed 1.19.9-r0

    Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.

  • CVE-2023-24537Apr 6, 2023
    affected < 1.19.8-r0fixed 1.19.8-r0

    Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.

  • CVE-2023-24538Apr 6, 2023
    affected < 1.19.8-r0fixed 1.19.8-r0

    Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the act

  • CVE-2023-24534Apr 6, 2023
    affected < 1.19.8-r0fixed 1.19.8-r0

    HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more m

  • CVE-2023-24536Apr 6, 2023
    affected < 1.19.8-r0fixed 1.19.8-r0

    Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can under

  • CVE-2023-24532Mar 8, 2023
    affected < 1.19.7-r0fixed 1.19.7-r0

    The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh.

  • CVE-2022-41723Feb 28, 2023
    affected < 1.19.6-r1fixed 1.19.6-r1

    A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

  • CVE-2022-41717Dec 8, 2022
    affected < 0fixed 0

    An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the s

  • CVE-2022-41720Dec 7, 2022
    affected < 0fixed 0

    On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Op

  • CVE-2022-41716Nov 2, 2022
    affected < 0fixed 0

    Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can ex

  • CVE-2020-29509Dec 14, 2020
    affected < 0fixed 0

    The encoding/xml package in Go (all versions) does not correctly preserve the semantics of attribute namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected down

  • CVE-2020-29511Dec 14, 2020
    affected < 0fixed 0

    The encoding/xml package in Go (all versions) does not correctly preserve the semantics of element namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downst