Vulnerability Change Records for CVE-2024-40632
Change History
New CVE Received by NIST 7/15/2024 6:15:03 PM
Action |
Type |
Old Value |
New Value |
Added |
CVSS V3.1 |
|
GitHub, Inc. AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
|
Added |
CWE |
|
GitHub, Inc. CWE-918
|
Added |
Description |
|
Linkerd is an open source, ultralight, security-first service mesh for Kubernetes. In affected versions when the application being run by linkerd is susceptible to SSRF, an attacker could potentially trigger a denial-of-service (DoS) attack by making requests to localhost:4191/shutdown. Linkerd could introduce an optional environment variable to control a token that must be passed as a header. Linkerd should reject shutdown requests that do not include this header. This issue has been addressed in release version edge-24.6.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
|
Added |
Reference |
|
GitHub, Inc. https://github.com/linkerd/linkerd2-proxy/blob/46957de49f25fd4661af7b7c52659148f4d6dd27/linkerd/app/admin/src/server.rs [No types assigned]
|
Added |
Reference |
|
GitHub, Inc. https://github.com/linkerd/linkerd2/commit/35fb2d6d11ef6520ae516dd717790529f85224fa [No types assigned]
|
Added |
Reference |
|
GitHub, Inc. https://github.com/linkerd/linkerd2/security/advisories/GHSA-6v94-gj6x-jqj7 [No types assigned]
|
|