VYPR

apk package

chainguard/nemo

pkg:apk/chainguard/nemo

Vulnerabilities (119)

  • CVE-2026-32281HigApr 8, 2026
    affected < 2.7.3-r0fixed 2.7.3-r0

    Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root C

  • CVE-2026-32280HigApr 8, 2026
    affected < 2.7.3-r0fixed 2.7.3-r0

    During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls

  • CVE-2026-27144HigApr 8, 2026
    affected < 2.7.3-r0fixed 2.7.3-r0

    The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.

  • CVE-2026-27143CriApr 8, 2026
    affected < 2.7.3-r0fixed 2.7.3-r0

    Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption.

  • CVE-2026-27140HigApr 8, 2026
    affected < 2.7.3-r0fixed 2.7.3-r0

    SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.

  • CVE-2026-1839HigApr 7, 2026
    affected < 2.7.3-r1fixed 2.7.3-r1

    A vulnerability in the HuggingFace Transformers library, specifically in the `Trainer` class, allows for arbitrary code execution. The `_load_rng_state()` method in `src/transformers/trainer.py` at line 3059 calls `torch.load()` without the `weights_only=True` parameter. This iss

  • CVE-2026-34165MedMar 31, 2026
    affected < 2.7.2-r2fixed 2.7.2-r2

    go-git is an extensible git implementation library written in pure Go. From version 5.0.0 to before version 5.17.1, a vulnerability has been identified in which a maliciously crafted .idx file can cause asymmetric memory consumption, potentially exhausting available memory and re

  • CVE-2026-33762LowMar 31, 2026
    affected < 2.7.2-r2fixed 2.7.2-r2

    go-git is an extensible git implementation library written in pure Go. Prior to version 5.17.1, go-git’s index decoder for format version 4 fails to validate the path name prefix length before applying it to the previously decoded path name. A maliciously crafted index file can t

  • CVE-2026-34073MedMar 31, 2026
    affected < 2.7.3-r2fixed 2.7.3-r2

    cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to version 46.0.6, DNS name constraints were only validated against SANs within child certificates, and not the "peer name" presented during each validation. Consequently

  • CVE-2026-25645Mar 25, 2026
    affected < 2.7.3-r2fixed 2.7.3-r2

    Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without valid

  • CVE-2026-33186CriMar 20, 2026
    affected < 2.7.2-r2fixed 2.7.2-r2

    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omi

  • CVE-2026-33231Mar 20, 2026
    affected < 2.7.2-r1fixed 2.7.2-r1

    NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, `nltk.app.wordnet_app` allows unauthenticated remote shutdown of the local WordNet B

  • CVE-2026-33230Mar 20, 2026
    affected < 2.7.2-r1fixed 2.7.2-r1

    NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, `nltk.app.wordnet_app` contains a reflected cross-site scripting issue in the `looku

  • CVE-2026-28500Mar 18, 2026
    affected < 2.7.2-r1fixed 2.7.2-r1

    Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is d

  • CVE-2026-32274Mar 12, 2026
    affected < 2.7.0-r2fixed 2.7.0-r2

    Black is the uncompromising Python code formatter. Prior to 26.3.1, Black writes a cache file, the name of which is computed from various formatting options. The value of the --python-cell-magics option was placed in the filename without sanitization, which allowed an attacker wh

  • CVE-2026-31826Mar 10, 2026
    affected < 2.7.0-r2fixed 2.7.0-r2

    pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing a content stream with a rather large /Length value, regardless of the actual data length insid

  • CVE-2026-27142MedMar 6, 2026
    affected < 2.7.0-r2fixed 2.7.0-r2

    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escap

  • CVE-2026-27139LowMar 6, 2026
    affected < 2.7.0-r2fixed 2.7.0-r2

    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary

  • CVE-2026-25679HigMar 6, 2026
    affected < 2.7.0-r2fixed 2.7.0-r2

    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.

  • CVE-2026-28351Feb 27, 2026
    affected < 2.7.0-r1fixed 2.7.0-r1

    pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter. This has been fixed in pypdf 6.7.

Page 2 of 6