Search for packages
| purl | pkg:rpm/redhat/servicemesh@2.0.9-3?arch=el8 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-63v8-dt23-9ue7
Aliases: CVE-2021-29923 |
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. | There are no reported fixed by versions. |
|
VCID-ad5y-3exv-y7bq
Aliases: CVE-2022-24726 |
istio: Unauthenticated control plane denial of service attack due to stack exhaustion | There are no reported fixed by versions. |
|
VCID-esea-tj2b-h7ey
Aliases: CVE-2021-29482 GHSA-25xm-hr59-7c27 |
github.com/ulikunitz/xz fixes readUvarint Denial of Service (DoS) ### Impact xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. ### Patches The problem has been fixed in release v0.5.8. ### Workarounds Limit the size of the compressed file input to a reasonable size for your use case. ### References The standard library had recently the same issue and got the [CVE-2020-16845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845) allocated. ### For more information If you have any questions or comments about this advisory: * Open an issue in [xz](https://github.com/ulikunitz/xz/issues). | There are no reported fixed by versions. |
|
VCID-hvfd-h9rm-jkbw
Aliases: CVE-2020-28852 |
golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag | There are no reported fixed by versions. |
|
VCID-qn4v-xah4-fya7
Aliases: CVE-2021-36221 |
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. | There are no reported fixed by versions. |
|
VCID-r52s-2crw-tfbx
Aliases: CVE-2020-28851 |
golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension | There are no reported fixed by versions. |
|
VCID-xref-9byg-nkdw
Aliases: CVE-2022-23635 GHSA-856q-xv3c-7f2f |
Unauthenticated control plane denial of service attack in Istio ### Impact The Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [multicluster](https://istio.io/latest/docs/setup/install/multicluster/primary-remote/) topologies, this port is exposed over the public internet. ### Patches - Istio 1.13.1 and above - Istio 1.12.4 and above - Istio 1.11.7 and above ### Workarounds There are no effective workarounds, beyond upgrading. Limiting network access to Istiod to the minimal set of clients can help lessen the scope of the vulnerability to some extent. ### References More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2022-003) ### For more information If you have any questions or comments about this advisory, please email us at [istio-security-vulnerability-reports@googlegroups.com](mailto:istio-security-vulnerability-reports@googlegroups.com) | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||