VYPR

apk package

chainguard/cluster-autoscaler-fips-1.29-compat

pkg:apk/chainguard/cluster-autoscaler-fips-1.29-compat

Vulnerabilities (26)

  • CVE-2024-24791HigJul 2, 2024
    affected < 1.29.3-r2fixed 1.29.3-r2

    The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the co

  • CVE-2024-24789Jun 5, 2024
    affected < 1.29.3-r1fixed 1.29.3-r1

    The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip pac

  • CVE-2024-24790Jun 5, 2024
    affected < 1.29.3-r1fixed 1.29.3-r1

    The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.

  • CVE-2024-3177LowApr 22, 2024
    affected < 1.29.2-r2fixed 1.29.2-r2

    A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. T

  • CVE-2023-45288HigApr 4, 2024
    affected < 1.29.0-r3fixed 1.29.0-r3

    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma

  • CVE-2020-8559Jul 22, 2020
    affected < 1.29.5-r8fixed 1.29.5-r8

    The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.

Page 2 of 2