Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25122: CWE-400: Uncontrolled Resource Consumption in chainguard-dev apko

0
Medium
VulnerabilityCVE-2026-25122cvecve-2026-25122cwe-400
Published: Wed Feb 04 2026 (02/04/2026, 19:02:15 UTC)
Source: CVE Database V5
Vendor/Project: chainguard-dev
Product: apko

Description

apko allows users to build and publish OCI container images built from apk packages. From version 0.14.8 to before 1.1.0, expandapk.Split drains the first gzip stream of an APK archive via io.Copy(io.Discard, gzi) without explicit bounds. With an attacker-controlled input stream, this can force large gzip inflation work and lead to resource exhaustion (availability impact). The Split function reads the first tar header, then drains the remainder of the gzip stream by reading from the gzip reader directly without any maximum uncompressed byte limit or inflate-ratio cap. A caller that parses attacker-controlled APK streams may be forced to spend excessive CPU time inflating gzip data, leading to timeouts or process slowdown. This issue has been patched in version 1.1.0.

AI-Powered Analysis

AILast updated: 02/04/2026, 19:30:04 UTC

Technical Analysis

CVE-2026-25122 is a resource exhaustion vulnerability classified under CWE-400 found in the chainguard-dev apko tool, which is used to build and publish OCI container images from apk packages. The vulnerability exists in versions 0.14.8 through before 1.1.0 within the expandapk.Split function. This function processes APK archives by reading the first tar header and then draining the remainder of the gzip stream using io.Copy(io.Discard, gzi) without imposing explicit limits on the amount of data decompressed. Because the gzip stream is attacker-controlled, an adversary can craft an APK archive with a highly compressed payload that inflates to a very large size when decompressed. The lack of bounds or inflate-ratio caps causes the function to consume excessive CPU resources during decompression, potentially leading to timeouts or process slowdowns. This results in a denial of service condition impacting availability. The vulnerability requires local or limited access to supply the malicious APK stream and some user interaction to trigger the decompression. There is no impact on confidentiality or integrity. The issue was addressed in apko version 1.1.0 by adding appropriate limits to the decompression process to prevent resource exhaustion. No known exploits are reported in the wild as of the publication date.

Potential Impact

For European organizations, the primary impact of CVE-2026-25122 is on the availability of container build pipelines that utilize vulnerable versions of apko. Organizations relying on apko to build OCI container images from apk packages may experience denial of service conditions if an attacker supplies crafted APK archives, causing excessive CPU consumption and process slowdowns or timeouts. This can delay or halt container image creation, impacting continuous integration/continuous deployment (CI/CD) workflows and potentially delaying software releases or updates. While the vulnerability does not compromise confidentiality or integrity, the disruption to availability can affect operational efficiency and service delivery. Organizations with automated build environments exposed to untrusted inputs or third-party APK packages are at higher risk. The absence of known exploits reduces immediate risk, but the medium severity rating and ease of triggering via crafted input warrant prompt remediation to avoid service interruptions.

Mitigation Recommendations

To mitigate CVE-2026-25122, European organizations should upgrade all instances of apko to version 1.1.0 or later, where the vulnerability has been patched by introducing limits on gzip decompression to prevent resource exhaustion. Until upgrades can be applied, organizations should implement strict input validation and sanitization to ensure that only trusted APK archives are processed by apko. Restricting access to the apko tool and its input sources to authorized personnel and systems reduces the risk of malicious input. Monitoring CPU usage and process performance during container builds can help detect anomalous resource consumption indicative of exploitation attempts. Additionally, integrating resource limits at the operating system or container runtime level (e.g., cgroups or container resource quotas) can prevent a single process from exhausting system resources. Finally, reviewing and hardening CI/CD pipeline security to prevent injection of malicious artifacts is recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T14:03:42.539Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69839abdf9fa50a62fa5f773

Added to database: 2/4/2026, 7:15:09 PM

Last enriched: 2/4/2026, 7:30:04 PM

Last updated: 2/4/2026, 8:20:35 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats