VYPR

apk package

chainguard/ingress-nginx-custom-error-pages-compat-1.10

pkg:apk/chainguard/ingress-nginx-custom-error-pages-compat-1.10

Vulnerabilities (13)

  • CVE-2025-22871CriApr 8, 2025
    affected < 1.10.6-r41fixed 1.10.6-r41

    The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext.

  • CVE-2025-24514HigMar 25, 2025
    affected < 0fixed 0

    A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and dis

  • CVE-2025-24513MedMar 25, 2025
    affected < 0fixed 0

    A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where attacker-provided data are included in a filename by the ingress-nginx Admission Controller feature, resulting in directory traversal within the container. This could result in de

  • CVE-2025-1974CriMar 25, 2025
    affected < 0fixed 0

    A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the c

  • CVE-2025-1098HigMar 25, 2025
    affected < 0fixed 0

    A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the

  • CVE-2025-1097HigMar 25, 2025
    affected < 0fixed 0

    A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller

  • CVE-2025-22870MedMar 12, 2025
    affected < 1.10.6-r13fixed 1.10.6-r13

    Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

  • CVE-2025-22868Feb 26, 2025
    affected < 1.10.6-r12fixed 1.10.6-r12

    An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

  • CVE-2024-45338MedDec 18, 2024
    affected < 1.10.5-r2fixed 1.10.5-r2

    An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

  • CVE-2024-34158HigSep 6, 2024
    affected < 1.10.4-r2fixed 1.10.4-r2

    Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.

  • CVE-2024-34156HigSep 6, 2024
    affected < 1.10.4-r2fixed 1.10.4-r2

    Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

  • CVE-2024-34155MedSep 6, 2024
    affected < 1.10.4-r2fixed 1.10.4-r2

    Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.

  • CVE-2024-45310Sep 3, 2024
    affected < 1.10.4-r1fixed 1.10.4-r1

    runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between