VYPR

apk package

chainguard/istio-install-cni-fips-1.19-compat

pkg:apk/chainguard/istio-install-cni-fips-1.19-compat

Vulnerabilities (5)

  • CVE-2024-28180Mar 9, 2024
    affected < 1.19.8-r1fixed 1.19.8-r1

    Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now ret

  • CVE-2024-28122Mar 9, 2024
    affected < 1.19.7-r2fixed 1.19.7-r2

    JWX is Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. This vulnerability allows an attacker with a trusted public key to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exc

  • CVE-2024-24786HigMar 5, 2024
    affected < 1.19.8-r1fixed 1.19.8-r1

    The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.

  • CVE-2024-21664Jan 9, 2024
    affected < 1.19.6-r2fixed 1.19.6-r2

    jwx is a Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. Calling `jws.Parse` with a JSON serialized payload where the `signature` field is present while `protected` is absent can lead to a nil pointer dereference. The vulnerability

  • CVE-2023-49290Dec 4, 2023
    affected < 1.19.6-r1fixed 1.19.6-r1

    lestrrat-go/jwx is a Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. A p2c parameter set too high in JWE's algorithm PBES2-* could lead to a denial of service. The JWE key management algorithms based on PBKDF2 require a JOSE Header