rpm package
opensuse/ignition&distro=openSUSE Leap 15.6
pkg:rpm/opensuse/ignition&distro=openSUSE%20Leap%2015.6
Vulnerabilities (5)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-33186 | Cri | 9.1 | < 2.14.0-150400.9.15.1 | 2.14.0-150400.9.15.1 | Mar 20, 2026 | gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omi | |
| CVE-2025-22870 | Med | 4.4 | < 2.14.0-150400.9.9.1 | 2.14.0-150400.9.9.1 | Mar 12, 2025 | Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied. | |
| CVE-2025-22868 | — | < 2.14.0-150400.9.9.1 | 2.14.0-150400.9.9.1 | Feb 26, 2025 | An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing. | ||
| CVE-2023-45288 | Hig | 7.5 | < 2.14.0-150400.9.6.1 | 2.14.0-150400.9.6.1 | Apr 4, 2024 | An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma | |
| CVE-2022-28948 | — | < 2.14.0-150400.9.12.1 | 2.14.0-150400.9.12.1 | May 19, 2022 | An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input. |
- affected < 2.14.0-150400.9.15.1fixed 2.14.0-150400.9.15.1
gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omi
- affected < 2.14.0-150400.9.9.1fixed 2.14.0-150400.9.9.1
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
- CVE-2025-22868Feb 26, 2025affected < 2.14.0-150400.9.9.1fixed 2.14.0-150400.9.9.1
An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.
- affected < 2.14.0-150400.9.6.1fixed 2.14.0-150400.9.6.1
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma
- CVE-2022-28948May 19, 2022affected < 2.14.0-150400.9.12.1fixed 2.14.0-150400.9.12.1
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.