-
Notifications
You must be signed in to change notification settings - Fork 116
CVE(s) found in v0.21.5 #1621
Description
Latest lifecycle release v0.21.5 triggered CVE(s) from Grype. For further details, see: https://github.com/buildpacks/lifecycle/actions/runs/22984428253 json: {
"id": "CVE-2026-25679",
"severity": "High",
"description": "url.Parse insufficiently validated the host/authority component and accepted some invalid URLs."
}
{
"id": "CVE-2026-25679",
"severity": "High",
"description": "url.Parse insufficiently validated the host/authority component and accepted some invalid URLs."
}
{
"id": "CVE-2026-27142",
"severity": "High",
"description": "Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0."
}
{
"id": "CVE-2026-27142",
"severity": "High",
"description": "Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0."
}
{
"id": "CVE-2026-27138",
"severity": "Medium",
"description": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS."
}
{
"id": "CVE-2026-27138",
"severity": "Medium",
"description": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS."
}
{
"id": "CVE-2026-27137",
"severity": "High",
"description": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered."
}
{
"id": "CVE-2026-27137",
"severity": "High",
"description": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered."
}
{
"id": "CVE-2026-27139",
"severity": "Low",
"description": "On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root."
}
{
"id": "CVE-2026-27139",
"severity": "Low",
"description": "On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root."
}