CVE-2026-42576

Published: Mag 09, 2026 Last Modified: Mag 09, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high

Description

AI Translation Available

apko allows users to build and publish OCI container images built from apk packages. Prior to version 1.2.7, DiscoverKeys in pkg/apk/apk/implementation.go unconditionally type-asserts JWKS keys as *rsa.PublicKey without checking the key type. If a repository JWKS endpoint returns a non-RSA key (e.g. EC), the unchecked assertion panics and crashes apko. This affects any workflow that initializes the APK database and fetches repository keys. This issue has been patched in version 1.2.7.

704

Incorrect Type Conversion or Cast

Incomplete
Common Consequences
Security Scopes Affected:
Other
Potential Impacts:
Other
Applicable Platforms
Languages: C, C++, Memory-Unsafe, Not Language-Specific
View CWE Details
https://github.com/chainguard-dev/apko/commit/6604826b19e36e9bc6e196592800fad93…
https://github.com/chainguard-dev/apko/releases/tag/v1.2.7
https://github.com/chainguard-dev/apko/security/advisories/GHSA-m7hm-vm4x-28jf