VYPR

rpm package

suse/kubernetes1.26&distro=SUSE Linux Enterprise Module for Containers 15 SP6

pkg:rpm/suse/kubernetes1.26&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP6

Vulnerabilities (9)

  • CVE-2025-22872MedApr 16, 2025
    affected < 1.26.15-150400.9.22.1fixed 1.26.15-150400.9.22.1

    The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can resul

  • CVE-2024-0793HigNov 17, 2024
    affected < 1.26.14-150400.9.6.1fixed 1.26.14-150400.9.6.1

    A flaw was found in kube-controller-manager. This issue occurs when the initial application of a HPA config YAML lacking a .spec.behavior.scaleUp block causes a denial of service due to KCM pods going into restart churn.

  • CVE-2024-34158HigSep 6, 2024
    affected < 1.26.15-150400.9.16.1fixed 1.26.15-150400.9.16.1

    Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.

  • CVE-2024-34156HigSep 6, 2024
    affected < 1.26.15-150400.9.16.1fixed 1.26.15-150400.9.16.1

    Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

  • CVE-2024-34155MedSep 6, 2024
    affected < 1.26.15-150400.9.16.1fixed 1.26.15-150400.9.16.1

    Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.

  • CVE-2023-45288HigApr 4, 2024
    affected < 1.26.15-150400.9.14.1fixed 1.26.15-150400.9.14.1

    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma

  • CVE-2024-24786HigMar 5, 2024
    affected < 1.26.15-150400.9.11.1fixed 1.26.15-150400.9.11.1

    The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.

  • CVE-2023-39325Oct 11, 2023
    affected < 1.26.15-150400.9.11.1fixed 1.26.15-150400.9.11.1

    A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attack

  • CVE-2023-44487HigKEVOct 10, 2023
    affected < 1.26.15-150400.9.11.1fixed 1.26.15-150400.9.11.1

    The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.