VYPR

rpm package

opensuse/kubernetes1.28&distro=openSUSE Leap 15.5

pkg:rpm/opensuse/kubernetes1.28&distro=openSUSE%20Leap%2015.5

Vulnerabilities (7)

  • CVE-2024-34158HigSep 6, 2024
    affected < 1.28.13-150400.9.10.1fixed 1.28.13-150400.9.10.1

    Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.

  • CVE-2024-34156HigSep 6, 2024
    affected < 1.28.13-150400.9.10.1fixed 1.28.13-150400.9.10.1

    Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

  • CVE-2024-34155MedSep 6, 2024
    affected < 1.28.13-150400.9.10.1fixed 1.28.13-150400.9.10.1

    Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.

  • CVE-2023-45288HigApr 4, 2024
    affected < 1.28.13-150400.9.8.1fixed 1.28.13-150400.9.8.1

    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma

  • CVE-2024-24786HigMar 5, 2024
    affected < 1.28.13-150400.9.8.1fixed 1.28.13-150400.9.8.1

    The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.

  • CVE-2023-39325Oct 11, 2023
    affected < 1.28.13-150400.9.8.1fixed 1.28.13-150400.9.8.1

    A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attack

  • CVE-2023-44487HigKEVOct 10, 2023
    affected < 1.28.13-150400.9.8.1fixed 1.28.13-150400.9.8.1

    The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.