Search for packages
| purl | pkg:rpm/redhat/servicemesh-proxy@2.0.9-3?arch=el8 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-63v8-dt23-9ue7
Aliases: CVE-2021-29923 |
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. | There are no reported fixed by versions. |
|
VCID-6hnh-zz14-5ffe
Aliases: CVE-2022-21654 |
envoy: Incorrect configuration handling allows mTLS session re-use without re-validation | There are no reported fixed by versions. |
|
VCID-ak44-eq74-2qd6
Aliases: CVE-2021-43826 |
envoy: Use-after-free when tunneling TCP over HTTP | There are no reported fixed by versions. |
|
VCID-anns-t5ra-w3fg
Aliases: CVE-2021-43824 |
envoy: Null pointer dereference when using JWT filter safe_regex match | There are no reported fixed by versions. |
|
VCID-g5eb-hnn7-8uf9
Aliases: CVE-2022-23606 |
envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service | There are no reported fixed by versions. |
|
VCID-jy4x-pwt3-6fa5
Aliases: CVE-2022-21655 |
envoy: Incorrect handling of internal redirects to routes with a direct response entry | There are no reported fixed by versions. |
|
VCID-ntx6-gh6x-9qck
Aliases: CVE-2021-43825 |
envoy: Use-after-free when response filters increase response data | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||