CNCF Envoy 1.13.0

CPE Details

CNCF Envoy 1.13.0
1.13.0
2020-03-05
13h41 +00:00
2020-03-05
13h41 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:cncf:envoy:1.13.0:*:*:*:*:*:*:*

Informations

Vendor

cncf

Product

envoy

Version

1.13.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-8664 2020-03-04 19h53 +00:00 CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the validation context to be not applied, even though it was visible in the active config dump.
5.3
Moyen
CVE-2020-8661 2020-03-04 19h48 +00:00 CNCF Envoy through 1.13.0 may consume excessive amounts of memory when responding internally to pipelined requests.
7.5
Haute
CVE-2020-8659 2020-03-04 19h43 +00:00 CNCF Envoy through 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks.
7.5
Haute