CVE-2023-49559 Affecting external-dns-fips package, versions <0.14.2-r4


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-EXTERNALDNSFIPS-7251723
  • published13 Jun 2024
  • disclosed12 Jun 2024

Introduced: 12 Jun 2024

CVE-2023-49559  (opens in a new tab)

How to fix?

Upgrade Chainguard external-dns-fips to version 0.14.2-r4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream external-dns-fips package and not the external-dns-fips package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

An issue in vektah gqlparser open-source-library v.2.5.10 allows a remote attacker to cause a denial of service via a crafted script to the parserDirectives function.