CVE-2023-4785 Affecting kube-fluentd-operator package, versions <1.18.2-r1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.1% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-WOLFILATEST-KUBEFLUENTDOPERATOR-6346493
  • published29 Feb 2024
  • disclosed13 Sept 2023

Introduced: 13 Sep 2023

CVE-2023-4785  (opens in a new tab)

How to fix?

Upgrade Wolfi kube-fluentd-operator to version 1.18.2-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kube-fluentd-operator package and not the kube-fluentd-operator package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.

CVSS Scores

version 3.1