In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Chainguard
consul-k8s-fips-1.3
to version 1.3.9-r2 or higher.
Note: Versions mentioned in the description apply only to the upstream consul-k8s-fips-1.3
package and not the consul-k8s-fips-1.3
package as distributed by Chainguard
.
See How to fix?
for Chainguard
relevant fixed versions and status.
An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.