CVE-2026-42575
HIGH
7,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: high
Availability: none
Description
AI Translation Available
apko allows users to build and publish OCI container images built from apk packages. Prior to version 1.2.7, apko verifies the signature on APKINDEX.tar.gz but never compares individually downloaded .apk packages against the checksum recorded in the signed index. The checksum is parsed and available via ChecksumString(), and the downloaded package control hash is computed, but the two values are never compared in getPackageImpl(). Mismatched packages are silently accepted. An attacker who can substitute download responses (compromised mirror, HTTP repository, poisoned CDN cache) can install arbitrary packages into built images. This issue has been patched in version 1.2.7.
345
Insufficient Verification of Data Authenticity
DraftCommon Consequences
Security Scopes Affected:
Integrity
Other
Potential Impacts:
Varies By Context
Unexpected State
Applicable Platforms
Technologies:
ICS/OT
494
Download of Code Without Integrity Check
DraftCommon Consequences
Security Scopes Affected:
Integrity
Availability
Confidentiality
Other
Potential Impacts:
Execute Unauthorized Code Or Commands
Alter Execution Logic
Other
Applicable Platforms
All platforms may be affected
https://github.com/chainguard-dev/apko/commit/a118c3d604107532b5525bd4bee2fb369…
https://github.com/chainguard-dev/apko/releases/tag/v1.2.7
https://github.com/chainguard-dev/apko/security/advisories/GHSA-hcwr-pq9g-rq3m