Skip to content

CVE(s) found in v0.21.5 #1621

@github-actions

Description

@github-actions

Latest lifecycle release v0.21.5 triggered CVE(s) from Grype. For further details, see: https://github.com/buildpacks/lifecycle/actions/runs/22984428253 json: {
"id": "CVE-2026-25679",
"severity": "High",
"description": "url.Parse insufficiently validated the host/authority component and accepted some invalid URLs."
}
{
"id": "CVE-2026-25679",
"severity": "High",
"description": "url.Parse insufficiently validated the host/authority component and accepted some invalid URLs."
}
{
"id": "CVE-2026-27142",
"severity": "High",
"description": "Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0."
}
{
"id": "CVE-2026-27142",
"severity": "High",
"description": "Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0."
}
{
"id": "CVE-2026-27138",
"severity": "Medium",
"description": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS."
}
{
"id": "CVE-2026-27138",
"severity": "Medium",
"description": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS."
}
{
"id": "CVE-2026-27137",
"severity": "High",
"description": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered."
}
{
"id": "CVE-2026-27137",
"severity": "High",
"description": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered."
}
{
"id": "CVE-2026-27139",
"severity": "Low",
"description": "On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root."
}
{
"id": "CVE-2026-27139",
"severity": "Low",
"description": "On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root."
}

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions