VYPR

apk package

chainguard/kubernetes-csi-node-driver-registrar-fips-2.8

pkg:apk/chainguard/kubernetes-csi-node-driver-registrar-fips-2.8

Vulnerabilities (26)

  • CVE-2023-45285Dec 6, 2023
    affected < 2.8.0-r4fixed 2.8.0-r4

    Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not

  • CVE-2023-39326Dec 6, 2023
    affected < 2.8.0-r4fixed 2.8.0-r4

    A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of d

  • CVE-2023-39325Oct 11, 2023
    affected < 2.8.0-r3fixed 2.8.0-r3

    A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attack

  • CVE-2023-44487HigKEVOct 10, 2023
    affected < 2.8.0-r5fixed 2.8.0-r5

    The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • CVE-2023-3978Aug 2, 2023
    affected < 2.8.0-r3fixed 2.8.0-r3

    Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.

  • CVE-2020-8559Jul 22, 2020
    affected < 2.8.0-r22fixed 2.8.0-r22

    The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.

Page 2 of 2