Количество 20
Количество 20
ELSA-2023-12781
ELSA-2023-12781: istio security update (IMPORTANT)
ELSA-2023-12780
ELSA-2023-12780: istio security update (IMPORTANT)
ELSA-2023-12772
ELSA-2023-12772: olcne security update (IMPORTANT)
ELSA-2023-12771
ELSA-2023-12771: istio security update (IMPORTANT)

CVE-2023-35942
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, gRPC access loggers using listener's global scope can cause a `use-after-free` crash when the listener is drained. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, disable gRPC access log or stop listener update.

CVE-2023-35942
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, gRPC access loggers using listener's global scope can cause a `use-after-free` crash when the listener is drained. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, disable gRPC access log or stop listener update.
CVE-2023-35942
Envoy is an open source edge and service proxy designed for cloud-nati ...

BDU:2023-04198
Уязвимость прокси-сервера Envoy, связанная с ошибкой использования после освобождения, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)

CVE-2023-35941
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter's check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host's domain configuration.

CVE-2023-35941
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter's check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host's domain configuration.
CVE-2023-35941
Envoy is an open source edge and service proxy designed for cloud-nati ...

BDU:2023-04199
Уязвимость прокси-сервера Envoy, связанная с недостатком механизма кодирования или экранирования выходных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVE-2023-35944
Envoy is an open source edge and service proxy designed for cloud-native applications. Envoy allows mixed-case schemes in HTTP/2, however, some internal scheme checks are case-sensitive. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, this can lead to the rejection of requests with mixed-case schemes such as `htTp` or `htTps`, or the bypassing of some requests such as `https` in unencrypted connections. With a fix in versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, Envoy will now lowercase scheme values by default, and change the internal scheme checks that were case-sensitive to be case-insensitive. There are no known workarounds for this issue.

CVE-2023-35944
Envoy is an open source edge and service proxy designed for cloud-native applications. Envoy allows mixed-case schemes in HTTP/2, however, some internal scheme checks are case-sensitive. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, this can lead to the rejection of requests with mixed-case schemes such as `htTp` or `htTps`, or the bypassing of some requests such as `https` in unencrypted connections. With a fix in versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, Envoy will now lowercase scheme values by default, and change the internal scheme checks that were case-sensitive to be case-insensitive. There are no known workarounds for this issue.
CVE-2023-35944
Envoy is an open source edge and service proxy designed for cloud-nati ...

CVE-2023-35943
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, the CORS filter will segfault and crash Envoy when the `origin` header is removed and deleted between `decodeHeaders`and `encodeHeaders`. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, do not remove the `origin` header in the Envoy configuration.

CVE-2023-35943
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, the CORS filter will segfault and crash Envoy when the `origin` header is removed and deleted between `decodeHeaders`and `encodeHeaders`. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, do not remove the `origin` header in the Envoy configuration.
CVE-2023-35943
Envoy is an open source edge and service proxy designed for cloud-nati ...

BDU:2023-04197
Уязвимость фильтра HTTP CORS прокси-сервера Envoy, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)

BDU:2023-04196
Уязвимость прокси-сервера Envoy, связанная c ошибками в обработке схем смешанного регистра (mixed-case) в HTTP/2, позволяющая нарушителю получить доступ к защищаемым данным
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2023-12781 ELSA-2023-12781: istio security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-12780 ELSA-2023-12780: istio security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-12772 ELSA-2023-12772: olcne security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-12771 ELSA-2023-12771: istio security update (IMPORTANT) | около 2 лет назад | |||
![]() | CVE-2023-35942 Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, gRPC access loggers using listener's global scope can cause a `use-after-free` crash when the listener is drained. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, disable gRPC access log or stop listener update. | CVSS3: 6.5 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-35942 Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, gRPC access loggers using listener's global scope can cause a `use-after-free` crash when the listener is drained. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, disable gRPC access log or stop listener update. | CVSS3: 6.5 | 0% Низкий | около 2 лет назад |
CVE-2023-35942 Envoy is an open source edge and service proxy designed for cloud-nati ... | CVSS3: 6.5 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-04198 Уязвимость прокси-сервера Envoy, связанная с ошибкой использования после освобождения, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS) | CVSS3: 6.5 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-35941 Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter's check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host's domain configuration. | CVSS3: 8.6 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-35941 Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter's check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host's domain configuration. | CVSS3: 8.6 | 0% Низкий | около 2 лет назад |
CVE-2023-35941 Envoy is an open source edge and service proxy designed for cloud-nati ... | CVSS3: 8.6 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-04199 Уязвимость прокси-сервера Envoy, связанная с недостатком механизма кодирования или экранирования выходных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 8.6 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-35944 Envoy is an open source edge and service proxy designed for cloud-native applications. Envoy allows mixed-case schemes in HTTP/2, however, some internal scheme checks are case-sensitive. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, this can lead to the rejection of requests with mixed-case schemes such as `htTp` or `htTps`, or the bypassing of some requests such as `https` in unencrypted connections. With a fix in versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, Envoy will now lowercase scheme values by default, and change the internal scheme checks that were case-sensitive to be case-insensitive. There are no known workarounds for this issue. | CVSS3: 8.2 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-35944 Envoy is an open source edge and service proxy designed for cloud-native applications. Envoy allows mixed-case schemes in HTTP/2, however, some internal scheme checks are case-sensitive. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, this can lead to the rejection of requests with mixed-case schemes such as `htTp` or `htTps`, or the bypassing of some requests such as `https` in unencrypted connections. With a fix in versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, Envoy will now lowercase scheme values by default, and change the internal scheme checks that were case-sensitive to be case-insensitive. There are no known workarounds for this issue. | CVSS3: 8.2 | 0% Низкий | около 2 лет назад |
CVE-2023-35944 Envoy is an open source edge and service proxy designed for cloud-nati ... | CVSS3: 8.2 | 0% Низкий | около 2 лет назад | |
![]() | CVE-2023-35943 Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, the CORS filter will segfault and crash Envoy when the `origin` header is removed and deleted between `decodeHeaders`and `encodeHeaders`. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, do not remove the `origin` header in the Envoy configuration. | CVSS3: 7.5 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-35943 Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, the CORS filter will segfault and crash Envoy when the `origin` header is removed and deleted between `decodeHeaders`and `encodeHeaders`. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, do not remove the `origin` header in the Envoy configuration. | CVSS3: 6.3 | 0% Низкий | около 2 лет назад |
CVE-2023-35943 Envoy is an open source edge and service proxy designed for cloud-nati ... | CVSS3: 6.3 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-04197 Уязвимость фильтра HTTP CORS прокси-сервера Envoy, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS) | CVSS3: 6.3 | 0% Низкий | около 2 лет назад |
![]() | BDU:2023-04196 Уязвимость прокси-сервера Envoy, связанная c ошибками в обработке схем смешанного регистра (mixed-case) в HTTP/2, позволяющая нарушителю получить доступ к защищаемым данным | CVSS3: 8.2 | 0% Низкий | около 2 лет назад |
Уязвимостей на страницу