Vulnerabilities (CVE)

Filtered by vendor Cncf Subscribe
Filtered by product Envoy
Total 3 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-8659 3 Cncf, Debian, Redhat 3 Envoy, Debian Linux, Openshift Service Mesh 2023-12-10 5.0 MEDIUM 7.5 HIGH
CNCF Envoy through 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks.
CVE-2020-8664 1 Cncf 1 Envoy 2023-12-10 5.0 MEDIUM 5.3 MEDIUM
CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the validation context to be not applied, even though it was visible in the active config dump.
CVE-2020-8661 2 Cncf, Redhat 2 Envoy, Openshift Service Mesh 2023-12-10 5.0 MEDIUM 7.5 HIGH
CNCF Envoy through 1.13.0 may consume excessive amounts of memory when responding internally to pipelined requests.