Security information

Upgraded the following middleware component versions to resolve vulnerabilities in MKE:

  • [MKE-13690] Golang 1.25.9

  • [MKE-13689] CoreDNS 1.14.2

  • [MKE-13688] enzi 1.5.1

  • [MKE-13686] Cloud Controller 1.34.2

  • [MKE-13684] alertmanager 0.32.1

  • [MKE-13683] swarm 1.5.5

  • [MKE-13682] Gatekeeper 3.22.2

  • [MKE-13681] cri-dockerd 0.4.3

  • [MKE-13680] containerd-shim 3.8.1

  • [MKE-13679] Interlock 3.5.2

  • [MKE-13671] Ingress Controller 1.14.5-mirantis

  • [MKE-13287] etcd 3.5.29

  • [MKE-13182] NVIDIA GPU Feature Discovery 0.18.2

  • [MKE-13181] Node Feature Discovery 0.18.3

  • [MKE-13174] Calico 3.31.4

The following table details the specific CVEs addressed, including which images are affected per CVE.

CVE

Status

Image mitigated

Problem details from upstream

CVE-2026-40200

Resolved

  • ucp-interlock

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

CVE-2026-39883

Resolved

  • ucp

  • ucp-agent

  • ucp-controller

  • ucp-gatekeeper

  • ucp-swarm

OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.15.0 to 1.42.0, the fix for CVE-2026-24051 changed the Darwin ioreg command to use an absolute path but left the BSD kenv command using a bare name, allowing the same PATH hijacking attack on BSD and Solaris platforms. This vulnerability is fixed in 1.43.0.

CVE-2026-35579

Resolved

  • ucp-node-local-dns

CoreDNS is a DNS server written in Go. In versions prior to 1.14.3, the gRPC, QUIC, DoH, and DoH3 transport implementations incorrectly handle TSIG authentication. For gRPC and QUIC, the server checks whether the TSIG key name exists in the configuration but never calls dns.TsigVerify() to validate the HMAC. If the key name matches a configured key, the tsigStatus field remains nil and the tsig plugin treats the request as successfully authenticated regardless of the MAC value. For DoH and DoH3, the issue is more severe: the DoHWriter.TsigStatus() method unconditionally returns nil, and the server never inspects the TSIG record at all. Any request containing a TSIG record is treated as authenticated over DoH and DoH3, even if the key name is invalid and the MAC is arbitrary. An unauthenticated network attacker can exploit this to bypass TSIG-protected functionality such as AXFR/IXFR zone transfers, dynamic DNS updates, or other TSIG-gated plugin behavior. The DoH and DoH3 variants have a lower exploitation bar because the attacker does not need to know a valid TSIG key name. This issue has been fixed in version 1.14.3. As a workaround, disable gRPC, QUIC, DoH, and DoH3 listeners where TSIG authentication is required, or restrict network-level access to affected transport ports to trusted sources only.

CVE-2026-33487

Resolved

  • ucp

  • ucp-agent

  • ucp-controller

goxmlsig provides XML Digital Signatures implemented in Go. Prior to version 1.6.0, the validateSignature function in validate.go goes through the references in the SignedInfo block to find one that matches the signed element’s ID. In Go versions before 1.22, or when go.mod uses an older version, there is a loop variable capture issue. The code takes the address of the loop variable _ref instead of its value. As a result, if more than one reference matches the ID or if the loop logic is incorrect, the ref pointer will always end up pointing to the last element in the SignedInfo.References slice after the loop. goxmlsig version 1.6.0 contains a patch.

CVE-2026-32288

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-cadvisor

  • ucp-calico-node

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-compose

  • ucp-containerd-shim-process

  • ucp-controller

  • ucp-coredns

  • ucp-dsinfo

  • ucp-envoy-gateway-controller

  • ucp-etcd

  • ucp-gatekeeper

  • ucp-hardware-info

  • ucp-hyperkube

  • ucp-interlock

  • ucp-interlock-extension

  • ucp-kube-ingress-controller

  • ucp-kube-state-metrics

  • ucp-multus-cni

  • ucp-node-exporter

  • ucp-node-feature-discovery

  • ucp-node-local-dns

  • ucp-nvidia-device-plugin

  • ucp-nvidia-gpu-feature-discovery

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-swarm

tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the “old GNU sparse map” format.

CVE-2026-32283

Resolved

  • ucp

  • ucp-agent

  • ucp-blackbox-exporter

  • ucp-controller

  • ucp-etcd

  • ucp-interlock

  • ucp-swarm

If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.

CVE-2026-32281

Resolved

  • ucp

  • ucp-agent

  • ucp-blackbox-exporter

  • ucp-controller

  • ucp-etcd

  • ucp-interlock

  • ucp-swarm

Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

CVE-2026-32280

Resolved

  • ucp

  • ucp-agent

  • ucp-blackbox-exporter

  • ucp-controller

  • ucp-etcd

  • ucp-interlock

  • ucp-swarm

During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.

CVE-2026-31790

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

  • ucp-kube-ingress-controller

  • ucp-node-exporter

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-sf-notifier

  • ucp-swarm

Applications using RSASVE key encapsulation to establish a secret encryption key can send contents of an uninitialized memory buffer to a malicious peer.

CVE-2026-31789

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-cadvisor

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-extension

  • ucp-interlock-proxy

  • ucp-kube-ingress-controller

  • ucp-node-exporter

  • ucp-node-local-dns

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-sf-notifier

  • ucp-swarm

Converting an excessively large OCTET STRING value to a hexadecimal string leads to a heap buffer overflow on 32 bit platforms.

CVE-2026-28390

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

  • ucp-kube-ingress-controller

  • ucp-node-exporter

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-sf-notifier

  • ucp-swarm

During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo a NULL pointer dereference can happen.

CVE-2026-28389

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

  • ucp-kube-ingress-controller

  • ucp-node-exporter

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-sf-notifier

  • ucp-swarm

During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen.

CVE-2026-28388

Resolved

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL pointer dereference might happen if the required CRL Number extension is missing.

CVE-2026-28387

Resolved

  • ucp

  • ucp-agent

  • ucp-alertmanager

  • ucp-auth-store

  • ucp-azure-ip-allocator

  • ucp-blackbox-exporter

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

  • ucp-kube-ingress-controller

  • ucp-node-exporter

  • ucp-rethinkdb-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-sf-notifier

  • ucp-swarm

An uncommon configuration of clients performing DANE TLSA-based server authentication, when paired with uncommon server DANE TLSA records, may result in a use-after-free and/or double-free on the client side.

CVE-2026-27784

Resolved

  • ucp-interlock-config

  • ucp-interlock-proxy

The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVE-2026-27135

Resolved

  • ucp-auth-store

  • ucp-blackbox-exporter

  • ucp-kube-ingress-controller

  • ucp-sf-notifier

nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API nghttp2_session_terminate_session or nghttp2_session_terminate_session2 is called by the application. They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available.

CVE-2026-25646

Resolved

  • ucp-interlock-config

  • ucp-interlock-proxy

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user’s display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.

CVE-2026-24512

Resolved

  • ucp-kube-ingress-controller

A security issue was discovered in ingress-nginx where the rules.http.paths.path Ingress field can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

CVE-2026-24051

Resolved

  • ucp-coredns

  • ucp-gatekeeper

  • ucp-interlock

OpenTelemetry-Go is the Go implementation of OpenTelemetry. The OpenTelemetry Go SDK in version v1.20.0-1.39.0 is vulnerable to Path Hijacking (Untrusted Search Paths) on macOS/Darwin systems. The resource detection code in sdk/resource/host_id.go executes the ioreg system command using a search path. An attacker with the ability to locally modify the PATH environment variable can achieve Arbitrary Code Execution (ACE) within the context of the application. A fix was released with v1.40.0.

CVE-2026-23949

Resolved

  • ucp-sf-notifier

jaraco.context, an open-source software package that provides some useful decorators and context managers, has a Zip Slip path traversal vulnerability in the jaraco.context.tarball() function starting in version 5.2.0 and prior to version 6.1.0. The vulnerability may allow attackers to extract files outside the intended extraction directory when malicious tar archives are processed. The strip_first_component filter splits the path on the first / and extracts the second component, while allowing ../ sequences. Paths like dummy_dir/../../etc/passwd become ../../etc/passwd. Note that this suffers from a nested tarball attack as well with multi-level tar files such as dummy_dir/inner.tar.gz, where the inner.tar.gz includes a traversal dummy_dir/../../config/.env that also gets translated to ../../config/.env. Version 6.1.0 contains a patch for the issue.

CVE-2026-22801

Resolved

  • ucp-interlock-config

  • ucp-interlock-proxy

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.

CVE-2026-22796

Resolved

  • ucp-cloud-controller-manager

  • ucp-etcd

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data.

CVE-2026-22795

Resolved

  • ucp-cloud-controller-manager

  • ucp-etcd

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file.

CVE-2026-22695

Resolved

  • ucp-interlock-config

  • ucp-interlock-proxy

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.

CVE-2026-22184

Resolved

  • ucp-agent

  • ucp-cfssl

  • ucp-cloud-controller-manager

  • ucp-controller

  • ucp-etcd

  • ucp-hardware-info

  • ucp-interlock

  • ucp-node-exporter

  • ucp-secureoverlay-agent

  • ucp-secureoverlay-mgr

  • ucp-swarm

zlib versions up to and including 1.3.1.2 include a global buffer overflow in the untgz utility located under contrib/untgz. The vulnerability is limited to the standalone demonstration utility and does not affect the core zlib compression library. The flaw occurs when a user executes the untgz command with an excessively long archive name supplied via the command line, leading to an out-of-bounds write in a fixed-size global buffer.

CVE-2026-1580

Resolved

  • ucp-kube-ingress-controller

A security issue was discovered in ingress-nginx where the nginx.ingress.kubernetes.io/auth-method Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

CVE-2025-9232

Resolved

  • ucp-node-local-dns

An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the ‘no_proxy’ environment variable is set and the host portion of the authority component of the HTTP URL is an IPv6 address.

CVE-2025-69421

Resolved

  • ucp-cloud-controller-manager

  • ucp-etcd

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function.

CVE-2025-69420

Resolved

  • ucp-blackbox-exporter

  • ucp-cloud-controller-manager

  • ucp-etcd

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

  • ucp-kube-ingress-controller

  • ucp-sf-notifier

A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file.

CVE-2025-69419

Resolved

  • ucp-cloud-controller-manager

  • ucp-etcd

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer.

CVE-2025-68973

Resolved

  • ucp-compose

  • ucp-dsinfo

  • ucp-hyperkube

  • ucp-node-feature-discovery

In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)

CVE-2025-68160

Resolved

  • ucp-cloud-controller-manager

  • ucp-etcd

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write.

CVE-2025-68156

Resolved

  • ucp-coredns

Expr is an expression language and expression evaluation for Go. Prior to version 1.17.7, several builtin functions in Expr, including flatten, min, max, mean, and median, perform recursive traversal over user-provided data structures without enforcing a maximum recursion depth. If the evaluation environment contains deeply nested or cyclic data structures, these functions may recurse indefinitely until exceed the Go runtime stack limit. This results in a stack overflow panic, causing the host application to crash. While exploitability depends on whether an attacker can influence or inject cyclic or pathologically deep data into the evaluation environment, this behavior represents a denial-of-service (DoS) risk and affects overall library robustness. Instead of returning a recoverable evaluation error, the process may terminate unexpectedly. In affected versions, evaluation of expressions that invoke certain builtin functions on untrusted or insufficiently validated data structures can lead to a process-level crash due to stack exhaustion. This issue is most relevant in scenarios where Expr is used to evaluate expressions against externally supplied or dynamically constructed environments; cyclic references (directly or indirectly) can be introduced into arrays, maps, or structs; and there are no application-level safeguards preventing deeply nested input data. In typical use cases with controlled, acyclic data, the issue may not manifest. However, when present, the resulting panic can be used to reliably crash the application, constituting a denial of service. The issue has been fixed in the v1.17.7 versions of Expr. The patch introduces a maximum recursion depth limit for affected builtin functions. When this limit is exceeded, evaluation aborts gracefully and returns a descriptive error instead of panicking. Additionally, the maximum depth can be customized by users via builtin.MaxDepth, allowing applications with legitimate deep structures to raise the limit in a controlled manner. Users are strongly encouraged to upgrade to the patched release, which includes both the recursion guard and comprehensive test coverage to prevent regressions. For users who cannot immediately upgrade, some mitigations are recommended. Ensure that evaluation environments cannot contain cyclic references, validate or sanitize externally supplied data structures before passing them to Expr, and/or wrap expression evaluation with panic recovery to prevent a full process crash (as a last-resort defensive measure). These workarounds reduce risk but do not fully eliminate the issue without the patch.

CVE-2025-66293

Resolved

  • ucp-interlock-config

  • ucp-interlock-proxy

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng’s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng’s internal state management. Upgrade to libpng 1.6.52 or later.

CVE-2025-66199

Resolved

  • ucp-cloud-controller-manager

  • ucp-etcd

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit.

CVE-2025-64720

Resolved

  • ucp-interlock-config

  • ucp-interlock-proxy

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.

CVE-2025-64506

Resolved

  • ucp-interlock-config

  • ucp-interlock-proxy

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng’s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.

CVE-2025-64505

Resolved

  • ucp-interlock-config

  • ucp-interlock-proxy

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng’s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.

CVE-2025-61729

Resolved

  • ucp-blackbox-exporter

  • ucp-calico-node

  • ucp-compose

  • ucp-dsinfo

  • ucp-etcd

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-kube-ingress-controller

  • ucp-node-feature-discovery

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVE-2025-61727

Resolved

  • ucp-blackbox-exporter

  • ucp-calico-node

  • ucp-compose

  • ucp-dsinfo

  • ucp-etcd

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-kube-ingress-controller

  • ucp-node-feature-discovery

An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.

CVE-2025-61726

Resolved

  • ucp-blackbox-exporter

  • ucp-calico-node

  • ucp-cloud-controller-manager

  • ucp-compose

  • ucp-coredns

  • ucp-dsinfo

  • ucp-etcd

  • ucp-gatekeeper

  • ucp-interlock

  • ucp-kube-ingress-controller

  • ucp-kube-state-metrics

  • ucp-node-feature-discovery

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.

CVE-2025-61725

Resolved

  • ucp-blackbox-exporter

  • ucp-compose

  • ucp-dsinfo

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-kube-ingress-controller

  • ucp-node-local-dns

The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.

CVE-2025-61724

Resolved

  • ucp-blackbox-exporter

  • ucp-compose

  • ucp-dsinfo

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-kube-ingress-controller

  • ucp-node-local-dns

The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.

CVE-2025-61723

Resolved

  • ucp-blackbox-exporter

  • ucp-compose

  • ucp-dsinfo

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-kube-ingress-controller

  • ucp-node-local-dns

The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.

CVE-2025-59530

Resolved

  • ucp-node-local-dns

quic-go is an implementation of the QUIC protocol in Go. In versions prior to 0.49.0, 0.54.1, and 0.55.0, a misbehaving or malicious server can cause a denial-of-service (DoS) attack on the quic-go client by triggering an assertion failure, leading to a process crash. This requires no authentication and can be exploited during the handshake phase. This was observed in the wild with certain server implementations. quic-go needs to be able to handle misbehaving server implementations, including those that prematurely send a HANDSHAKE_DONE frame. Versions 0.49.0, 0.54.1, and 0.55.0 discard Initial keys when receiving a HANDSHAKE_DONE frame, thereby correctly handling premature HANDSHAKE_DONE frames.

CVE-2025-58190

Resolved

  • ucp-compose

  • ucp-dsinfo

  • ucp-etcd

  • ucp-interlock

The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

CVE-2025-58188

Resolved

  • ucp-blackbox-exporter

  • ucp-compose

  • ucp-dsinfo

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-kube-ingress-controller

  • ucp-node-local-dns

Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.

CVE-2025-58187

Resolved

  • ucp-blackbox-exporter

  • ucp-compose

  • ucp-dsinfo

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-kube-ingress-controller

Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.

CVE-2025-58186

Resolved

  • ucp-blackbox-exporter

  • ucp-compose

  • ucp-dsinfo

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-kube-ingress-controller

  • ucp-node-local-dns

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as “a=;”, an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

CVE-2025-58185

Resolved

  • ucp-blackbox-exporter

  • ucp-compose

  • ucp-dsinfo

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-kube-ingress-controller

  • ucp-node-local-dns

Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.

CVE-2025-58183

Resolved

  • ucp-blackbox-exporter

  • ucp-compose

  • ucp-dsinfo

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-kube-ingress-controller

  • ucp-node-local-dns

tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.

CVE-2025-58181

Resolved

  • ucp-blackbox-exporter

  • ucp-calico-node

  • ucp-etcd

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-node-feature-discovery

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

CVE-2025-58063

Resolved

  • ucp-node-local-dns

CoreDNS is a DNS server that chains plugins. Starting in version 1.2.0 and prior to version 1.12.4, the CoreDNS etcd plugin contains a TTL confusion vulnerability where lease IDs are incorrectly used as TTL values, enabling DNS cache pinning attacks. This effectively creates a DoS condition for DNS resolution of affected services. The TTL() function in plugin/etcd/etcd.go incorrectly casts etcd lease IDs (64-bit integers) to uint32 and uses them as TTL values. Large lease IDs become very large TTLs when cast to uint32. This enables cache pinning attacks. Version 1.12.4 contains a fix for the issue.

CVE-2025-52881

Resolved

  • ucp-hyperkube

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.

CVE-2025-52565

Resolved

  • ucp-hyperkube

runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting /dev/pts/$n to /dev/console inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of /dev/pts/$n to /dev/console as configured for all containers that allocate a console). This happens after pivot_root(2), so this cannot be used to write to host files directly – however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of /proc/sysrq-trigger or /proc/sys/kernel/core_pattern (respectively). This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

CVE-2025-4802

Resolved

  • ucp-node-local-dns

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

CVE-2025-47914

Resolved

  • ucp-blackbox-exporter

  • ucp-calico-node

  • ucp-etcd

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-node-feature-discovery

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

CVE-2025-47913

Resolved

  • ucp-blackbox-exporter

  • ucp-etcd

  • ucp-gatekeeper

  • ucp-hyperkube

  • ucp-node-feature-discovery

  • ucp-node-local-dns

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.

CVE-2025-47911

Resolved

  • ucp-compose

  • ucp-dsinfo

  • ucp-etcd

  • ucp-interlock

The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

CVE-2025-47906

Resolved

  • ucp-blackbox-exporter

  • ucp-compose

  • ucp-dsinfo

  • ucp-node-local-dns

If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (“”, “.”, and “..”), can result in the binaries listed in the PATH being unexpectedly returned.

CVE-2025-4673

Resolved

  • ucp-compose

  • ucp-dsinfo

  • ucp-node-local-dns

Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information.

CVE-2025-31133

Resolved

  • ucp-hyperkube

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container’s /dev/null) was actually a real /dev/null inode when using the container’s /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

CVE-2025-15468

Resolved

  • ucp-cloud-controller-manager

  • ucp-etcd

  • ucp-interlock

  • ucp-interlock-config

  • ucp-interlock-proxy

If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs.