/
DirectorySecurity AdvisoriesPricing
Sign in
Security Advisories

CGA-6mq9-rgv8-wgmp

Published

Last updated

https://images.chainguard.dev/security/CGA-6mq9-rgv8-wgmp
Package

reports-server

Repository

Chainguard

Latest Update
Not affected
Aliases
  • CVE-2024-48921
  • GHSA-qjvc-p88j-j9rm

Severity

Unknown

References

  • https://nvd.nist.gov/vuln/detail/CVE-2024-48921

Updates

Status

Not affected

Justification

Vulnerable code not in execute path

Impact

This vulnerability is not applicable to the reports-server package because the binary does not process, evaluate, or enforce Kyverno policies and does not consume or apply PolicyException resources. The reports-server package only imports and uses Kyverno report API types and the generated typed client to list and inspect PolicyReport and ClusterPolicyReport resources. The Kyverno client usage is limited to the ReportsV1 API group only. All runtime interactions with the Kyverno client are restricted to operations on policy reports performed via kyvernoClient.ReportsV1() in the server configuration code. Verified by static analysis of the reports-server source confirming that kyverno imports are limited to reports API and client packages. The Kyverno client is imported in a single file, all the kyverno client usage in that file is limited to calling the ReportsV1 method on it. Can be checked with: grep -RIn "github.com/kyverno/kyverno" pkg/
| grep -v "github.com/kyverno/kyverno/api/reports/v1"
| grep -v "github.com/kyverno/kyverno/api/policyreport"
| grep -v "github.com/kyverno/kyverno/pkg/clients/kyverno" For the client usage confirmation: grep -RIn "kyverno" pkg/server/config.go Govulncheck found no affected symbols in the scanned Go binaries.

Status

Under investigation


The trusted source for open source

Talk to an expert
© 2025 Chainguard. All Rights Reserved.
PrivacyTerms

Product

Chainguard ContainersChainguard LibrariesChainguard VMsIntegrationsPricing