VYPR

rpm package

suse/kubernetes1.25&distro=SUSE Linux Enterprise Server 15 SP4-LTSS

pkg:rpm/suse/kubernetes1.25&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS

Vulnerabilities (7)

  • CVE-2024-34158HigSep 6, 2024
    affected < 1.25.16-150400.9.18.1fixed 1.25.16-150400.9.18.1

    Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.

  • CVE-2024-34156HigSep 6, 2024
    affected < 1.25.16-150400.9.18.1fixed 1.25.16-150400.9.18.1

    Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

  • CVE-2024-34155MedSep 6, 2024
    affected < 1.25.16-150400.9.18.1fixed 1.25.16-150400.9.18.1

    Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.

  • CVE-2023-45288HigApr 4, 2024
    affected < 1.25.16-150400.9.16.1fixed 1.25.16-150400.9.16.1

    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma

  • CVE-2024-24786HigMar 5, 2024
    affected < 1.25.16-150400.9.16.1fixed 1.25.16-150400.9.16.1

    The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.

  • CVE-2023-39325Oct 11, 2023
    affected < 1.25.16-150400.9.16.1fixed 1.25.16-150400.9.16.1

    A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attack

  • CVE-2023-44487HigKEVOct 10, 2023
    affected < 1.25.16-150400.9.16.1fixed 1.25.16-150400.9.16.1

    The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.