Search for packages
Package details: pkg:alpm/archlinux/istio@1.9.2-1
purl pkg:alpm/archlinux/istio@1.9.2-1
Next non-vulnerable version 1.10.0-1
Latest non-vulnerable version 1.11.1-1
Risk 4.5
Vulnerabilities affecting this package (6)
Vulnerability Summary Fixed by
VCID-dp7a-3quf-aaac
Aliases:
CVE-2021-28683
An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.
1.10.0-1
Affected by 0 other vulnerabilities.
VCID-fhr4-2cw2-aaaj
Aliases:
CVE-2021-31921
Istio before 1.8.6 and 1.9.x before 1.9.5 contains a remotely exploitable vulnerability where an external client can access unexpected services in the cluster, bypassing authorization checks, when a gateway is configured with AUTO_PASSTHROUGH routing configuration.
1.10.0-1
Affected by 0 other vulnerabilities.
VCID-n735-w925-aaaf
Aliases:
CVE-2021-31920
GHSA-6q5m-22mq-q2xv
Istio before 1.8.6 and 1.9.x before 1.9.5 has a remotely exploitable vulnerability where an HTTP request path with multiple slashes or escaped slash characters (%2F or %5C) could potentially bypass an Istio authorization policy when path based authorization rules are used.
1.10.0-1
Affected by 0 other vulnerabilities.
VCID-pbmp-naqq-aaam
Aliases:
CVE-2021-29258
An issue was discovered in Envoy 1.14.0. There is a remotely exploitable crash for HTTP2 Metadata, because an empty METADATA map triggers a Reachable Assertion.
1.10.0-1
Affected by 0 other vulnerabilities.
VCID-qyex-hm2q-aaaa
Aliases:
CVE-2021-28682
An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable integer overflow in which a very large grpc-timeout value leads to unexpected timeout calculations.
1.10.0-1
Affected by 0 other vulnerabilities.
VCID-u5y5-tcfd-aaan
Aliases:
CVE-2021-29492
Envoy is a cloud-native edge/middle/service proxy. Envoy does not decode escaped slash sequences `%2F` and `%5C` in HTTP URL paths in versions 1.18.2 and before. A remote attacker may craft a path with escaped slashes, e.g. `/something%2F..%2Fadmin`, to bypass access control, e.g. a block on `/admin`. A backend server could then decode slash sequences and normalize path and provide an attacker access beyond the scope provided for by the access control policy. ### Impact Escalation of Privileges when using RBAC or JWT filters with enforcement based on URL path. Users with back end servers that interpret `%2F` and `/` and `%5C` and `\` interchangeably are impacted. ### Attack Vector URL paths containing escaped slash characters delivered by untrusted client. Patches in versions 1.18.3, 1.17.3, 1.16.4, 1.15.5 contain new path normalization option to decode escaped slash characters. As a workaround, if back end servers treat `%2F` and `/` and `%5C` and `\` interchangeably and a URL path based access control is configured, one may reconfigure the back end server to not treat `%2F` and `/` and `%5C` and `\` interchangeably.
1.10.0-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T07:44:07.121259+00:00 Arch Linux Importer Affected by VCID-qyex-hm2q-aaaa https://security.archlinux.org/AVG-1947 36.0.0
2025-03-28T07:44:07.093312+00:00 Arch Linux Importer Affected by VCID-dp7a-3quf-aaac https://security.archlinux.org/AVG-1947 36.0.0
2025-03-28T07:44:07.063963+00:00 Arch Linux Importer Affected by VCID-pbmp-naqq-aaam https://security.archlinux.org/AVG-1947 36.0.0
2025-03-28T07:44:07.036609+00:00 Arch Linux Importer Affected by VCID-u5y5-tcfd-aaan https://security.archlinux.org/AVG-1947 36.0.0
2025-03-28T07:44:07.005371+00:00 Arch Linux Importer Affected by VCID-n735-w925-aaaf https://security.archlinux.org/AVG-1947 36.0.0
2025-03-28T07:44:06.986581+00:00 Arch Linux Importer Affected by VCID-fhr4-2cw2-aaaj https://security.archlinux.org/AVG-1947 36.0.0
2024-09-18T01:59:14.644757+00:00 Arch Linux Importer Affected by VCID-qyex-hm2q-aaaa https://security.archlinux.org/AVG-1947 34.0.1
2024-09-18T01:59:14.623617+00:00 Arch Linux Importer Affected by VCID-dp7a-3quf-aaac https://security.archlinux.org/AVG-1947 34.0.1
2024-09-18T01:59:14.597578+00:00 Arch Linux Importer Affected by VCID-pbmp-naqq-aaam https://security.archlinux.org/AVG-1947 34.0.1
2024-09-18T01:59:14.571041+00:00 Arch Linux Importer Affected by VCID-u5y5-tcfd-aaan https://security.archlinux.org/AVG-1947 34.0.1
2024-09-18T01:59:14.544391+00:00 Arch Linux Importer Affected by VCID-n735-w925-aaaf https://security.archlinux.org/AVG-1947 34.0.1
2024-09-18T01:59:14.519190+00:00 Arch Linux Importer Affected by VCID-fhr4-2cw2-aaaj https://security.archlinux.org/AVG-1947 34.0.1
2024-01-03T22:25:32.284788+00:00 Arch Linux Importer Affected by VCID-qyex-hm2q-aaaa https://security.archlinux.org/AVG-1947 34.0.0rc1
2024-01-03T22:25:32.261288+00:00 Arch Linux Importer Affected by VCID-dp7a-3quf-aaac https://security.archlinux.org/AVG-1947 34.0.0rc1
2024-01-03T22:25:32.237430+00:00 Arch Linux Importer Affected by VCID-pbmp-naqq-aaam https://security.archlinux.org/AVG-1947 34.0.0rc1
2024-01-03T22:25:32.215887+00:00 Arch Linux Importer Affected by VCID-u5y5-tcfd-aaan https://security.archlinux.org/AVG-1947 34.0.0rc1
2024-01-03T22:25:32.191852+00:00 Arch Linux Importer Affected by VCID-n735-w925-aaaf https://security.archlinux.org/AVG-1947 34.0.0rc1
2024-01-03T22:25:32.168149+00:00 Arch Linux Importer Affected by VCID-fhr4-2cw2-aaaj https://security.archlinux.org/AVG-1947 34.0.0rc1