VYPR

apk package

wolfi/newrelic-k8s-metadata-injection-compat

pkg:apk/wolfi/newrelic-k8s-metadata-injection-compat

Vulnerabilities (6)

  • CVE-2025-61729Dec 2, 2025
    affected < 1.39.0-r1fixed 1.39.0-r1

    Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a

  • CVE-2025-4673MedJun 11, 2025
    affected < 1.34.1-r2fixed 1.34.1-r2

    Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information.

  • CVE-2025-22874HigJun 11, 2025
    affected < 1.34.1-r2fixed 1.34.1-r2

    Calling Verify with a VerifyOptions.KeyUsages that contains ExtKeyUsageAny unintentionally disabledpolicy validation. This only affected certificate chains which contain policy graphs, which are rather uncommon.

  • CVE-2025-22872MedApr 16, 2025
    affected < 1.32.2-r1fixed 1.32.2-r1

    The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can resul

  • CVE-2025-22866MedFeb 6, 2025
    affected < 1.31.1-r1fixed 1.31.1-r1

    Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recover

  • CVE-2024-45338MedDec 18, 2024
    affected < 1.30.3-r1fixed 1.30.3-r1

    An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.