VYPR

apk package

chainguard/knative-operator-1.17-webhook-compat

pkg:apk/chainguard/knative-operator-1.17-webhook-compat

Vulnerabilities (13)

  • CVE-2025-61725HigOct 29, 2025
    affected < 1.17.8-r4fixed 1.17.8-r4

    The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.

  • CVE-2025-58186MedOct 29, 2025
    affected < 1.17.8-r4fixed 1.17.8-r4

    Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

  • CVE-2025-58183MedOct 29, 2025
    affected < 1.17.8-r4fixed 1.17.8-r4

    tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When r

  • CVE-2025-61724Oct 29, 2025
    affected < 1.17.8-r4fixed 1.17.8-r4

    The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.

  • CVE-2025-58188Oct 29, 2025
    affected < 1.17.8-r4fixed 1.17.8-r4

    Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.

  • CVE-2025-58185Oct 29, 2025
    affected < 1.17.8-r4fixed 1.17.8-r4

    Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.

  • CVE-2025-47912Oct 29, 2025
    affected < 1.17.8-r4fixed 1.17.8-r4

    The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresse

  • CVE-2025-61723Oct 29, 2025
    affected < 1.17.8-r4fixed 1.17.8-r4

    The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.

  • CVE-2025-58189Oct 29, 2025
    affected < 1.17.8-r4fixed 1.17.8-r4

    When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.

  • CVE-2025-58187Oct 29, 2025
    affected < 1.17.8-r4fixed 1.17.8-r4

    Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.

  • CVE-2025-47907Aug 7, 2025
    affected < 1.17.8-r3fixed 1.17.8-r3

    Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the ex

  • CVE-2025-22872MedApr 16, 2025
    affected < 1.17.6-r1fixed 1.17.6-r1

    The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can resul

  • CVE-2025-22871CriApr 8, 2025
    affected < 1.17.5-r2fixed 1.17.5-r2

    The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext.