You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There are two critical vulnerabilities in latest argo cd image 2.13.3 as per aqua trivy scanner
The vulnerabilities are in github.com/go-git/go-git/v5 and golang.org/x/cypto
Checklist:
argocd version
.Summary
There are two critical vulnerabilities in latest argo cd image 2.13.3 as per aqua trivy scanner
The vulnerabilities are in github.com/go-git/go-git/v5 and golang.org/x/cypto
Details
Response from Aqua trivy vulnerability scanner
github.com/go-git/go-git/v5 │ GHSA-v725-9546-7q7m │ CRITICAL │ │ v5.12.0 │ 5.13.0 │ go-git: argument injection via the URL field | https://avd.aquasec.com/nvd/cve-2025-21613
golang.org/x/crypto │ GHSA-v778-237x-gjrc │ CRITICAL │ │ v0.27.0 │ 0.31.0 │ golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto | https://avd.aquasec.com/nvd/cve-2024-45337
To Reproduce
Expected behavior
Screenshots
Version
Paste the output from `argocd version` here.
Logs
The text was updated successfully, but these errors were encountered: