Redhat

Openshift Service Mesh

22 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.57%
  • Published 04.03.2020 21:15:11
  • Last modified 21.11.2024 05:39:13

CNCF Envoy through 1.13.0 may consume excessive amounts of memory when responding internally to pipelined requests.

  • EPSS 1.02%
  • Published 04.03.2020 21:15:11
  • Last modified 21.11.2024 05:39:12

CNCF Envoy through 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks.

  • EPSS 0.11%
  • Published 17.02.2020 17:15:14
  • Last modified 21.11.2024 05:11:12

An insecure modification vulnerability in the /etc/passwd file was found in all versions of OpenShift ServiceMesh (maistra) before 1.0.8 in the openshift/istio-kialia-rhel7-operator-container. An attacker with access to the container could use this f...

  • EPSS 0.84%
  • Published 12.02.2020 15:15:14
  • Last modified 21.11.2024 05:39:05

Istio versions 1.2.10 (End of Life) and prior, 1.3 through 1.3.7, and 1.4 through 1.4.3 allows authentication bypass. The Authentication Policy exact-path matching logic can allow unauthorized access to HTTP paths even if they are configured to be on...

  • EPSS 3.67%
  • Published 13.08.2019 21:15:13
  • Last modified 14.01.2025 19:29:55

Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONT...

  • EPSS 4.56%
  • Published 13.08.2019 21:15:12
  • Last modified 14.01.2025 19:29:55

Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so...

  • EPSS 2.29%
  • Published 13.08.2019 21:15:12
  • Last modified 14.01.2025 19:29:55

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater h...

  • EPSS 4.51%
  • Published 13.08.2019 21:15:12
  • Last modified 14.01.2025 19:29:55

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS f...

  • EPSS 9.48%
  • Published 13.08.2019 21:15:12
  • Last modified 14.01.2025 19:29:55

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the p...

  • EPSS 4.36%
  • Published 13.08.2019 21:15:12
  • Last modified 14.01.2025 19:29:55

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the...