VYPR

apk package

wolfi/linkerd2-metrics-api-compat

pkg:apk/wolfi/linkerd2-metrics-api-compat

Vulnerabilities (13)

  • CVE-2025-58160LowAug 29, 2025
    affected < 25.8.5-r1fixed 25.8.5-r1

    tracing is a framework for instrumenting Rust programs to collect structured, event-based diagnostic information. Prior to version 0.3.20, tracing-subscriber was vulnerable to ANSI escape sequence injection attacks. Untrusted user input containing ANSI escape sequences could be i

  • CVE-2025-55198Aug 13, 2025
    affected < 25.8.3-r0fixed 25.8.3-r0

    Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, when parsing Chart.yaml and index.yaml files, an improper validation of type error can lead to a panic. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring YAML files are formatt

  • CVE-2025-55199Aug 13, 2025
    affected < 25.8.3-r0fixed 25.8.3-r0

    Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, it is possible to craft a JSON Schema file in a manner which could cause Helm to use all available memory and have an out of memory (OOM) termination. This issue has been resolved in Helm 3.18.5. A work

  • CVE-2025-55159MedAug 11, 2025
    affected < 25.8.2-r1fixed 25.8.2-r1

    slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potentia

  • CVE-2025-53547Jul 8, 2025
    affected < 25.7.1-r1fixed 25.7.1-r1

    Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lo

  • CVE-2025-4673MedJun 11, 2025
    affected < 25.6.2-r0fixed 25.6.2-r0

    Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information.

  • CVE-2025-22874HigJun 11, 2025
    affected < 25.6.2-r0fixed 25.6.2-r0

    Calling Verify with a VerifyOptions.KeyUsages that contains ExtKeyUsageAny unintentionally disabledpolicy validation. This only affected certificate chains which contain policy graphs, which are rather uncommon.

  • CVE-2024-12224May 30, 2025
    affected < 24.11.8-r1fixed 24.11.8-r1

    Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.

  • CVE-2024-40635Mar 17, 2025
    affected < 25.3.3-r0fixed 25.3.3-r0

    containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ult

  • CVE-2025-22868Feb 26, 2025
    affected < 25.3.1-r1fixed 25.3.1-r1

    An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

  • CVE-2025-22866MedFeb 6, 2025
    affected < 25.1.2-r2fixed 25.1.2-r2

    Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recover

  • CVE-2025-24898MedFeb 3, 2025
    affected < 25.1.2-r1fixed 25.1.2-r1

    rust-openssl is a set of OpenSSL bindings for the Rust programming language. In affected versions `ssl::select_next_proto` can return a slice pointing into the `server` argument's buffer but with a lifetime bound to the `client` argument. In situations where the `sever` buffer's

  • CVE-2024-45337CriDec 12, 2024
    affected < 24.11.8-r1fixed 24.11.8-r1

    Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that