Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/servicemesh@2.0.9-3?arch=el8
purl pkg:rpm/redhat/servicemesh@2.0.9-3?arch=el8
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-63v8-dt23-9ue7
Aliases:
CVE-2021-29923
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. There are no reported fixed by versions.
VCID-ad5y-3exv-y7bq
Aliases:
CVE-2022-24726
istio: Unauthenticated control plane denial of service attack due to stack exhaustion There are no reported fixed by versions.
VCID-esea-tj2b-h7ey
Aliases:
CVE-2021-29482
GHSA-25xm-hr59-7c27
github.com/ulikunitz/xz fixes readUvarint Denial of Service (DoS) ### Impact xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. ### Patches The problem has been fixed in release v0.5.8. ### Workarounds Limit the size of the compressed file input to a reasonable size for your use case. ### References The standard library had recently the same issue and got the [CVE-2020-16845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845) allocated. ### For more information If you have any questions or comments about this advisory: * Open an issue in [xz](https://github.com/ulikunitz/xz/issues). There are no reported fixed by versions.
VCID-hvfd-h9rm-jkbw
Aliases:
CVE-2020-28852
golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag There are no reported fixed by versions.
VCID-qn4v-xah4-fya7
Aliases:
CVE-2021-36221
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. There are no reported fixed by versions.
VCID-r52s-2crw-tfbx
Aliases:
CVE-2020-28851
golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension There are no reported fixed by versions.
VCID-xref-9byg-nkdw
Aliases:
CVE-2022-23635
GHSA-856q-xv3c-7f2f
Unauthenticated control plane denial of service attack in Istio ### Impact The Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [multicluster](https://istio.io/latest/docs/setup/install/multicluster/primary-remote/) topologies, this port is exposed over the public internet. ### Patches - Istio 1.13.1 and above - Istio 1.12.4 and above - Istio 1.11.7 and above ### Workarounds There are no effective workarounds, beyond upgrading. Limiting network access to Istiod to the minimal set of clients can help lessen the scope of the vulnerability to some extent. ### References More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2022-003) ### For more information If you have any questions or comments about this advisory, please email us at [istio-security-vulnerability-reports@googlegroups.com](mailto:istio-security-vulnerability-reports@googlegroups.com) There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:04:59.172741+00:00 RedHat Importer Affected by VCID-esea-tj2b-h7ey https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29482.json 38.0.0
2026-04-01T14:03:35.630575+00:00 RedHat Importer Affected by VCID-hvfd-h9rm-jkbw https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28852.json 38.0.0
2026-04-01T14:03:35.556457+00:00 RedHat Importer Affected by VCID-r52s-2crw-tfbx https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28851.json 38.0.0
2026-04-01T14:02:46.560848+00:00 RedHat Importer Affected by VCID-63v8-dt23-9ue7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29923.json 38.0.0
2026-04-01T14:01:42.177884+00:00 RedHat Importer Affected by VCID-qn4v-xah4-fya7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36221.json 38.0.0
2026-04-01T13:59:31.519573+00:00 RedHat Importer Affected by VCID-xref-9byg-nkdw https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23635.json 38.0.0
2026-04-01T13:59:25.709569+00:00 RedHat Importer Affected by VCID-ad5y-3exv-y7bq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24726.json 38.0.0