Security information

Upgraded the following middleware component versions to resolve vulnerabilities in MKE:

  • [MKE-13690] Golang 1.25.9

  • [MKE-13689] CoreDNS 1.14.2

  • [MKE-13688] enzi 1.4.1

  • [MKE-13686] Cloud Controller 1.31.9

  • [MKE-13684] alertmanager 0.32.1

  • [MKE-13683] swarm 1.4.0-ucp5

  • [MKE-13682] Gatekeeper 3.22.2

  • [MKE-13681] cri-dockerd 0.4.3

  • [MKE-13680] containerd-shim 3.8.1

  • [MKE-13679] Interlock 3.4.1

  • [MKE-13671] Ingress Controller 1.14.5-mirantis

  • [MKE-13287] etcd 3.5.29

  • [MKE-13182] NVIDIA GPU Feature Discovery 0.18.2

  • [MKE-13181] Node Feature Discovery 0.18.3

  • [MKE-13174] Calico 3.29.7

The following table details the specific CVEs addressed, including which images are affected per CVE.

CVE

Status

Image mitigated

Problem details from upstream

CVE-2026-40200

Resolved

  • ucp-auth

  • ucp-interlock

  • ucp-interlock-extension

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

CVE-2026-39892

Resolved

  • ucp-sf-notifier

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. From 45.0.0 to before 46.0.7, if a non-contiguous buffer was passed to APIs which accepted Python buffers (e.g. Hash.update()), this could lead to buffer overflows. This vulnerability is fixed in 46.0.7.

CVE-2026-39883

Resolved

  • ucp-cloud-controller-manager

  • ucp-coredns

  • ucp-etcd

  • ucp-gatekeeper

  • ucp-node-feature-discovery

OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.15.0 to 1.42.0, the fix for CVE-2026-24051 changed the Darwin ioreg command to use an absolute path but left the BSD kenv command using a bare name, allowing the same PATH hijacking attack on BSD and Solaris platforms. This vulnerability is fixed in 1.43.0.

CVE-2026-35579

Resolved

  • ucp-node-local-dns

CoreDNS is a DNS server written in Go. In versions prior to 1.14.3, the gRPC, QUIC, DoH, and DoH3 transport implementations incorrectly handle TSIG authentication. For gRPC and QUIC, the server checks whether the TSIG key name exists in the configuration but never calls dns.TsigVerify() to validate the HMAC. If the key name matches a configured key, the tsigStatus field remains nil and the tsig plugin treats the request as successfully authenticated regardless of the MAC value. For DoH and DoH3, the issue is more severe: the DoHWriter.TsigStatus() method unconditionally returns nil, and the server never inspects the TSIG record at all. Any request containing a TSIG record is treated as authenticated over DoH and DoH3, even if the key name is invalid and the MAC is arbitrary. An unauthenticated network attacker can exploit this to bypass TSIG-protected functionality such as AXFR/IXFR zone transfers, dynamic DNS updates, or other TSIG-gated plugin behavior. The DoH and DoH3 variants have a lower exploitation bar because the attacker does not need to know a valid TSIG key name. This issue has been fixed in version 1.14.3. As a workaround, disable gRPC, QUIC, DoH, and DoH3 listeners where TSIG authentication is required, or restrict network-level access to affected transport ports to trusted sources only.

CVE-2026-33487

Resolved

  • ucp

  • ucp-agent

  • ucp-auth

  • ucp-auth-store

  • ucp-controller

goxmlsig provides XML Digital Signatures implemented in Go. Prior to version 1.6.0, the validateSignature function in validate.go goes through the references in the SignedInfo block to find one that matches the signed element’s ID. In Go versions before 1.22, or when go.mod uses an older version, there is a loop variable capture issue. The code takes the address of the loop variable _ref instead of its value. As a result, if more than one reference matches the ID or if the loop logic is incorrect, the ref pointer will always end up pointing to the last element in the SignedInfo.References slice after the loop. goxmlsig version 1.6.0 contains a patch.

CVE-2026-33186

Resolved

  • ucp

  • ucp-agent

  • ucp-cloud-controller-manager

  • ucp-containerd-shim-process

  • ucp-controller

  • ucp-coredns

  • ucp-etcd

  • ucp-gatekeeper

  • ucp-interlock

  • ucp-interlock-extension

  • ucp-multus-cni

  • ucp-node-feature-discovery

  • ucp-nvidia-device-plugin

gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 :path pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the :path omitted the mandatory leading slash (e.g., Service/Method instead of /Service/Method). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official grpc/authz package) evaluated the raw, non-canonical path string. Consequently, “deny” rules defined using canonical paths (starting with /) failed to match the incoming request, allowing it to bypass the policy if a fallback “allow” rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in google.golang.org/grpc/authz or custom interceptors relying on info.FullMethod or grpc.Method(ctx); AND that have a security policy contains specific “deny” rules for canonical paths but allows other requests by default (a fallback “allow” rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed :path headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a :path that does not start with a leading slash is immediately rejected with a codes.Unimplemented error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening.

CVE-2026-32288

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-cadvisor

  • ucp-calico-node

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-compose

  • ucp-containerd-shim-process

  • ucp-controller

  • ucp-coredns

  • ucp-dsinfo

  • ucp-etcd

  • ucp-gatekeeper

  • ucp-hardware-info

  • ucp-hyperkube

  • ucp-interlock

  • ucp-interlock-extension

  • ucp-kube-ingress-controller

  • ucp-kube-state-metrics

  • ucp-metrics

  • ucp-metrics-swarm-only

  • ucp-multus-cni

  • ucp-node-exporter

  • ucp-node-feature-discovery

  • ucp-node-local-dns

  • ucp-nvidia-device-plugin

  • ucp-nvidia-gpu-feature-discovery

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-swarm

tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the “old GNU sparse map” format.

CVE-2026-32283

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-containerd-shim-process

  • ucp-controller

  • ucp-coredns

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-extension

  • ucp-kube-state-metrics

  • ucp-multus-cni

  • ucp-node-exporter

  • ucp-node-feature-discovery

  • ucp-nvidia-device-plugin

  • ucp-nvidia-gpu-feature-discovery

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-swarm

If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.

CVE-2026-32281

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-containerd-shim-process

  • ucp-controller

  • ucp-coredns

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-extension

  • ucp-kube-state-metrics

  • ucp-multus-cni

  • ucp-node-exporter

  • ucp-node-feature-discovery

  • ucp-nvidia-device-plugin

  • ucp-nvidia-gpu-feature-discovery

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-swarm

Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

CVE-2026-32280

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-containerd-shim-process

  • ucp-controller

  • ucp-coredns

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-extension

  • ucp-kube-state-metrics

  • ucp-multus-cni

  • ucp-node-exporter

  • ucp-node-feature-discovery

  • ucp-nvidia-device-plugin

  • ucp-nvidia-gpu-feature-discovery

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-swarm

During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.

CVE-2026-31790

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-calico-cni-firewalld-chroot

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-extension

  • ucp-interlock-proxy

  • ucp-kube-ingress-controller

  • ucp-metrics

  • ucp-metrics-swarm-only

  • ucp-multus-cni

  • ucp-node-exporter

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-sf-notifier

  • ucp-swarm

Applications using RSASVE key encapsulation to establish a secret encryption key can send contents of an uninitialized memory buffer to a malicious peer.

CVE-2026-31789

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-cadvisor

  • ucp-calico-cni-firewalld-chroot

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-extension

  • ucp-interlock-proxy

  • ucp-kube-ingress-controller

  • ucp-metrics

  • ucp-metrics-swarm-only

  • ucp-multus-cni

  • ucp-node-exporter

  • ucp-node-local-dns

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-sf-notifier

  • ucp-swarm

Converting an excessively large OCTET STRING value to a hexadecimal string leads to a heap buffer overflow on 32 bit platforms.

CVE-2026-28390

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-calico-cni-firewalld-chroot

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-extension

  • ucp-interlock-proxy

  • ucp-kube-ingress-controller

  • ucp-metrics

  • ucp-metrics-swarm-only

  • ucp-multus-cni

  • ucp-node-exporter

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-sf-notifier

  • ucp-swarm

During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo a NULL pointer dereference can happen.

CVE-2026-28389

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-calico-cni-firewalld-chroot

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-extension

  • ucp-interlock-proxy

  • ucp-kube-ingress-controller

  • ucp-metrics

  • ucp-metrics-swarm-only

  • ucp-multus-cni

  • ucp-node-exporter

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-sf-notifier

  • ucp-swarm

During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen.

CVE-2026-28388

Resolved

  • ucp-auth

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-extension

  • ucp-interlock-proxy

When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL pointer dereference might happen if the required CRL Number extension is missing.

CVE-2026-28387

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-calico-cni-firewalld-chroot

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-extension

  • ucp-interlock-proxy

  • ucp-kube-ingress-controller

  • ucp-metrics

  • ucp-metrics-swarm-only

  • ucp-multus-cni

  • ucp-node-exporter

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-sf-notifier

  • ucp-swarm

An uncommon configuration of clients performing DANE TLSA-based server authentication, when paired with uncommon server DANE TLSA records, may result in a use-after-free and/or double-free on the client side.

CVE-2026-27784

Resolved

  • ucp-interlock-config

  • ucp-interlock-proxy

The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVE-2026-27141

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-compose

  • ucp-controller

  • ucp-dsinfo

  • ucp-hardware-info

  • ucp-hyperkube

  • ucp-kube-state-metrics

  • ucp-metrics-swarm-only

  • ucp-multus-cni

  • ucp-node-exporter

  • ucp-node-feature-discovery

  • ucp-nvidia-gpu-feature-discovery

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic

CVE-2026-27135

Resolved

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-kube-ingress-controller

  • ucp-metrics

  • ucp-metrics-swarm-only

  • ucp-rethinkdb-exporter

  • ucp-sf-notifier

nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API nghttp2_session_terminate_session or nghttp2_session_terminate_session2 is called by the application. They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available.

CVE-2026-25646

Resolved

  • ucp-interlock-config

  • ucp-interlock-proxy

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user’s display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.

CVE-2026-24512

Resolved

  • ucp-kube-ingress-controller

A security issue was discovered in ingress-nginx where the rules.http.paths.path Ingress field can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

CVE-2026-24051

Resolved

  • ucp

  • ucp-agent

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-coredns

  • ucp-etcd

  • ucp-gatekeeper

  • ucp-interlock

  • ucp-node-feature-discovery

  • ucp-swarm

OpenTelemetry-Go is the Go implementation of OpenTelemetry. The OpenTelemetry Go SDK in version v1.20.0-1.39.0 is vulnerable to Path Hijacking (Untrusted Search Paths) on macOS/Darwin systems. The resource detection code in sdk/resource/host_id.go executes the ioreg system command using a search path. An attacker with the ability to locally modify the PATH environment variable can achieve Arbitrary Code Execution (ACE) within the context of the application. A fix was released with v1.40.0.

CVE-2026-22184

Resolved

  • ucp-agent

  • ucp-auth

  • ucp-calico-cni-firewalld-chroot

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-extension

  • ucp-kube-ingress-controller

  • ucp-node-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-swarm

zlib versions up to and including 1.3.1.2 include a global buffer overflow in the untgz utility located under contrib/untgz. The vulnerability is limited to the standalone demonstration utility and does not affect the core zlib compression library. The flaw occurs when a user executes the untgz command with an excessively long archive name supplied via the command line, leading to an out-of-bounds write in a fixed-size global buffer.

CVE-2026-21441

Resolved

  • ucp-sf-notifier

urllib3 is an HTTP client library for Python. urllib3’s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting preload_content=False when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when preload_content=False. If upgrading is not immediately possible, disable redirects by setting redirect=False for requests to untrusted source.

CVE-2026-1580

Resolved

  • ucp-kube-ingress-controller

A security issue was discovered in ingress-nginx where the nginx.ingress.kubernetes.io/auth-method Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

CVE-2026-0861

Resolved

  • ucp-multus-cni

Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.

CVE-2025-7709

Resolved

  • ucp-multus-cni

An integer overflow exists in the FTS5 https://sqlite.org/fts5.html extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.

CVE-2025-68121

Resolved

  • ucp-gatekeeper

  • ucp-kube-ingress-controller

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

CVE-2025-61729

Resolved

  • ucp-gatekeeper

  • ucp-kube-ingress-controller

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVE-2025-61727

Resolved

  • ucp-gatekeeper

  • ucp-kube-ingress-controller

An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.

CVE-2025-61726

Resolved

  • ucp-gatekeeper

  • ucp-kube-ingress-controller

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.

CVE-2025-61725

Resolved

  • ucp-calico-node

  • ucp-compose

  • ucp-dsinfo

The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.

CVE-2025-61724

Resolved

  • ucp-calico-node

  • ucp-compose

  • ucp-dsinfo

The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.

CVE-2025-61723

Resolved

  • ucp-calico-node

  • ucp-compose

  • ucp-dsinfo

The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.

CVE-2025-58188

Resolved

  • ucp-calico-node

  • ucp-compose

  • ucp-dsinfo

Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.

CVE-2025-58187

Resolved

  • ucp-calico-node

  • ucp-compose

  • ucp-dsinfo

Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.

CVE-2025-58186

Resolved

  • ucp-calico-node

  • ucp-compose

  • ucp-dsinfo

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as “a=;”, an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

CVE-2025-58185

Resolved

  • ucp-calico-node

  • ucp-compose

  • ucp-dsinfo

Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.

CVE-2025-58183

Resolved

  • ucp-calico-node

  • ucp-compose

  • ucp-dsinfo

tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.

CVE-2025-58181

Resolved

  • ucp-etcd

  • ucp-gatekeeper

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

CVE-2025-52881

Resolved

  • ucp-node-feature-discovery

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.

CVE-2025-52565

Resolved

  • ucp-node-feature-discovery

runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting /dev/pts/$n to /dev/console inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of /dev/pts/$n to /dev/console as configured for all containers that allocate a console). This happens after pivot_root(2), so this cannot be used to write to host files directly – however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of /proc/sysrq-trigger or /proc/sys/kernel/core_pattern (respectively). This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

CVE-2025-47914

Resolved

  • ucp-etcd

  • ucp-gatekeeper

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

CVE-2025-47913

Resolved

  • ucp-calico-node

  • ucp-etcd

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.

CVE-2025-31133

Resolved

  • ucp-node-feature-discovery

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container’s /dev/null) was actually a real /dev/null inode when using the container’s /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.