rpm package
suse/ignition&distro=SUSE Linux Enterprise Module for HPC 15 SP6
pkg:rpm/suse/ignition&distro=SUSE%20Linux%20Enterprise%20Module%20for%20HPC%2015%20SP6
Vulnerabilities (4)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-22870 | Med | 4.4 | < 2.14.0-150400.9.9.1 | 2.14.0-150400.9.9.1 | Mar 12, 2025 | Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied. | |
| CVE-2025-22868 | — | < 2.14.0-150400.9.9.1 | 2.14.0-150400.9.9.1 | Feb 26, 2025 | An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing. | ||
| CVE-2023-45288 | Hig | 7.5 | < 2.14.0-150400.9.6.1 | 2.14.0-150400.9.6.1 | Apr 4, 2024 | An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma | |
| CVE-2022-28948 | — | < 2.14.0-150400.9.12.1 | 2.14.0-150400.9.12.1 | May 19, 2022 | An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input. |
- affected < 2.14.0-150400.9.9.1fixed 2.14.0-150400.9.9.1
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
- CVE-2025-22868Feb 26, 2025affected < 2.14.0-150400.9.9.1fixed 2.14.0-150400.9.9.1
An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.
- affected < 2.14.0-150400.9.6.1fixed 2.14.0-150400.9.6.1
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma
- CVE-2022-28948May 19, 2022affected < 2.14.0-150400.9.12.1fixed 2.14.0-150400.9.12.1
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.