VYPR

apk package

chainguard/kyverno-init-container-1.8

pkg:apk/chainguard/kyverno-init-container-1.8

Vulnerabilities (12)

  • CVE-2023-45285Dec 6, 2023
    affected < 1.8.5-r6fixed 1.8.5-r6

    Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not

  • CVE-2023-39326Dec 6, 2023
    affected < 1.8.5-r6fixed 1.8.5-r6

    A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of d

  • CVE-2023-39325Oct 11, 2023
    affected < 1.8.5-r5fixed 1.8.5-r5

    A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attack

  • CVE-2023-3978Aug 2, 2023
    affected < 1.8.5-r5fixed 1.8.5-r5

    Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.

  • CVE-2023-33199May 26, 2023
    affected < 0fixed 0

    Rekor's goals are to provide an immutable tamper resistant ledger of metadata generated within a software projects supply chain. A malformed proposed entry of the `intoto/v0.0.2` type can cause a panic on a thread within the Rekor process. The thread is recovered so the client re

  • CVE-2023-1732May 10, 2023
    affected < 1.8.5-r2fixed 1.8.5-r2

    When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret. The tkn20 and blindr

  • CVE-2023-30551May 8, 2023
    affected < 0fixed 0

    Rekor is an open source software supply chain transparency log. Rekor prior to version 1.1.1 may crash due to out of memory (OOM) conditions caused by reading archive metadata files into memory without checking their sizes first. Verification of a JAR file submitted to Rekor can

  • CVE-2023-28840Apr 4, 2023
    affected < 0fixed 0

    Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby, is commonly referred to as *Docke

  • CVE-2023-28841Apr 4, 2023
    affected < 0fixed 0

    Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docker

  • CVE-2023-28842Apr 4, 2023
    affected < 0fixed 0

    Moby) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docke

  • CVE-2022-41723Feb 28, 2023
    affected < 1.8.5-r2fixed 1.8.5-r2

    A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

  • CVE-2022-41721Jan 13, 2023
    affected < 1.8.5-r2fixed 1.8.5-r2

    A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which coul