Description

apko allows users to build and publish OCI container images built from apk packages. From version 0.14.8 to before 1.1.0, expandapk.Split drains the first gzip stream of an APK archive via io.Copy(io.Discard, gzi) without explicit bounds. With an attacker-controlled input stream, this can force large gzip inflation work and lead to resource exhaustion (availability impact). The Split function reads the first tar header, then drains the remainder of the gzip stream by reading from the gzip reader directly without any maximum uncompressed byte limit or inflate-ratio cap. A caller that parses attacker-controlled APK streams may be forced to spend excessive CPU time inflating gzip data, leading to timeouts or process slowdown. This issue has been patched in version 1.1.0.

INFO

Published Date :

2026-02-04T19:02:15.838Z

Last Modified :

2026-02-04T19:19:35.546Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-25122 vulnerability.

Vendors Products
Chainguard
  • Apko
Chainguard-dev
  • Apko
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25122.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact