cvelist/2020/8xxx/CVE-2020-8664.json

72 lines
2.4 KiB
JSON
Raw Normal View History

2020-02-06 03:01:06 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-03-04 21:01:10 +00:00
"ID": "CVE-2020-8664",
"STATE": "PUBLIC"
2020-02-06 03:01:06 +00:00
},
2020-03-04 21:01:10 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-02-06 03:01:06 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-03-04 21:01:10 +00:00
"value": "CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the \u201cstatic\u201d part of the validation context to be not applied, even though it was visible in the active config dump."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history",
"url": "https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history"
},
{
"refsource": "MISC",
"name": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3x9m-pgmg-xpx8",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3x9m-pgmg-xpx8"
2020-03-11 12:01:25 +00:00
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0734",
"url": "https://access.redhat.com/errata/RHSA-2020:0734"
2020-02-06 03:01:06 +00:00
}
]
}
}