CVE-2023-4785 Affecting kube-fluentd-operator package, versions <1.18.2-r1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment

    Threat Intelligence

    EPSS
    0.08% (36th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-WOLFILATEST-KUBEFLUENTDOPERATOR-6346493
  • published 29 Feb 2024
  • disclosed 13 Sep 2023

How to fix?

Upgrade Wolfi kube-fluentd-operator to version 1.18.2-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kube-fluentd-operator package and not the kube-fluentd-operator package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.

CVSS Scores

version 3.1
Expand this section

NVD

Recommended
7.5 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    None
  • Integrity (I)
    None
  • Availability (A)
    High
Expand this section

SUSE

7.5 high
Expand this section

Red Hat

7.5 high