Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: istioctl

Found 3 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-41413
5.0 MEDIUM
  • CVSS version (CVSS): 3.1
  • Attack Vector (AV): Network (N)
  • Attack Complexity (AC): Low (L)
  • Privileges Required (PR): Low (L)
  • User Interaction (UI): None (N)
  • Scope (S): Changed (C)
  • Confidentiality (C): Low (L)
  • Integrity (I): None (N)
  • Availability (A): None (N)
  • Modified Attack Vector (MAV): Network (N)
  • Modified Attack Complexity (MAC): Low (L)
  • Modified Privileges Required (MPR): Low (L)
  • Modified User Interaction (MUI): None (N)
  • Modified Confidentiality (MC): Low (L)
  • Modified Scope (MS): Changed (C)
  • Modified Integrity (MI): None (N)
  • Modified Availability (MA): None (N)
updated 2 days, 3 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Istio Vulnerable to SSRF via RequestAuthentication jwksUri

Istio is an open platform to connect, manage, and secure microservices. Prior to versions 1.28.6 and 1.29.2, when a RequestAuthentication resource is created with a jwksUri pointing to an internal service, istiod makes an unauthenticated HTTP GET request to that URL without filtering out localhost or link local ips. This can result in sensitive data being distributed to Envoy proxies via xDS configuration. This issue has been patched in versions 1.28.6 and 1.29.2.

Affected products

istio
  • ==< 1.28.6
  • ==>= 1.29.0-alpha.0, < 1.29.2

Matching in nixpkgs

pkgs.istioctl

Istio configuration command line utility for service operators to debug and diagnose their Istio mesh

Package maintainers

updated 1 month, 4 weeks ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Istio HTTP debug endpoints on port 15014 to enforce namespace-based authorization, preventing cross-namespace proxy data access.

Istio is an open platform to connect, manage, and secure microservices. Prior to 1.29.1, 1.28.5, and 1.27.8, a vulnerability in Envoy RBAC header matching could allow authorization policy bypass when policies rely on HTTP headers that may contain multiple values. An attacker could craft requests with multiple header values in a way that causes Envoy to evaluate the header differently than intended, potentially bypassing authorization checks. This may allow unauthorized requests to reach protected services when policies depend on such header-based matching conditions. This vulnerability is fixed in 1.29.1, 1.28.5, and 1.27.8.

Affected products

istio
  • ==< 1.27.8
  • ==>= 1.29.0-alpha.0, < 1.29.1
  • ==>= 1.28.0-alpha.0, < 1.28.5

Matching in nixpkgs

pkgs.istioctl

Istio configuration command line utility for service operators to debug and diagnose their Istio mesh

Package maintainers

https://github.com/istio/istio/security/advisories/GHSA-974c-2wxh-g4ww
updated 1 month, 4 weeks ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Istio JWKS resolver to prevent private key material from being exposed when JWKS fetch fails.

Istio is an open platform to connect, manage, and secure microservices. Prior to 1.29.1, 1.28.5, and 1.27.8, a user of Istio is impacted if the JWKS resolver becomes unavailable or the fetch fails, exposing hardcoded defaults regardless of use of the RequestAuthentication resource. This vulnerability is fixed in 1.29.1, 1.28.5, and 1.27.8.

Affected products

istio
  • ==< 1.27.8
  • ==>= 1.29.0-alpha.0, < 1.29.1
  • ==>= 1.28.0-alpha.0, < 1.28.5

Matching in nixpkgs

pkgs.istioctl

Istio configuration command line utility for service operators to debug and diagnose their Istio mesh

Package maintainers

https://github.com/istio/istio/security/advisories/GHSA-v75c-crr9-733c