VYPR

apk package

chainguard/kyverno-policy-reporter-kyverno-plugin-1.5-compat

pkg:apk/chainguard/kyverno-policy-reporter-kyverno-plugin-1.5-compat

Vulnerabilities (8)

  • CVE-2024-24786HigMar 5, 2024
    affected < 1.5.2-r6fixed 1.5.2-r6

    The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.

  • CVE-2023-45285Dec 6, 2023
    affected < 1.5.2-r4fixed 1.5.2-r4

    Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not

  • CVE-2023-39326Dec 6, 2023
    affected < 1.5.2-r4fixed 1.5.2-r4

    A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of d

  • CVE-2023-39325Oct 11, 2023
    affected < 1.5.2-r3fixed 1.5.2-r3

    A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attack

  • CVE-2023-3978Aug 2, 2023
    affected < 1.5.2-r3fixed 1.5.2-r3

    Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.

  • CVE-2023-34091Jun 1, 2023
    affected < 0fixed 0

    Kyverno is a policy engine designed for Kubernetes. In versions of Kyverno prior to 1.10.0, resources which have the `deletionTimestamp` field defined can bypass validate, generate, or mutate-existing policies, even in cases where the `validationFailureAction` field is set to `En

  • CVE-2023-33199May 26, 2023
    affected < 0fixed 0

    Rekor's goals are to provide an immutable tamper resistant ledger of metadata generated within a software projects supply chain. A malformed proposed entry of the `intoto/v0.0.2` type can cause a panic on a thread within the Rekor process. The thread is recovered so the client re

  • CVE-2023-30551May 8, 2023
    affected < 0fixed 0

    Rekor is an open source software supply chain transparency log. Rekor prior to version 1.1.1 may crash due to out of memory (OOM) conditions caused by reading archive metadata files into memory without checking their sizes first. Verification of a JAR file submitted to Rekor can