VYPR

rpm package

opensuse/flannel&distro=openSUSE Tumbleweed

pkg:rpm/opensuse/flannel&distro=openSUSE%20Tumbleweed

Vulnerabilities (7)

  • CVE-2026-33413Mar 26, 2026
    affected < 0.28.4-1.1fixed 0.28.4-1.1

    etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call certain etcd functions in clusters that expose the gRPC API to untrusted or parti

  • CVE-2025-30204HigMar 21, 2025
    affected < 0.26.6-1.1fixed 0.26.6-1.1

    golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a maliciou

  • CVE-2023-45288HigApr 4, 2024
    affected < 0.26.4-1.1fixed 0.26.4-1.1

    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma

  • CVE-2019-14697Aug 6, 2019
    affected < 0.14.0-1.2fixed 0.14.0-1.2

    musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.

  • CVE-2018-16875Dec 14, 2018
    affected < 0.14.0-1.2fixed 0.14.0-1.2

    The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates

  • CVE-2018-16874Dec 14, 2018
    affected < 0.14.0-1.2fixed 0.14.0-1.2

    In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but

  • CVE-2018-16873Dec 14, 2018
    affected < 0.14.0-1.2fixed 0.14.0-1.2

    In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPA