Revision 9b72a5cf9c68e7b99230a45843583901812d2a08 authored by Daniel Borkmann on 03 May 2024, 13:39:42 UTC, committed by Daniel Borkmann on 03 May 2024, 13:56:45 UTC
Turn it off until we have a new v1.15 stable release with #32337 included. Without the PR the IPSec downgrade test on v1.15 reported small blips of connectivity interruption. We can revert this commit once v1.15.5 is out. Reported-by: Julian Wiedmann <jwi@isovalent.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
1 parent 8552def
.openvex.json
{
"@context": "https://openvex.dev/ns/v0.2.0",
"@id": "https://openvex.dev/docs/public/vex-2c888588017ab89446d4dae0e77dfb63836b4e868bc19aaf47e3777ece4cd6fd",
"author": "Cilium Security Team",
"timestamp": "2024-02-13T11:33:19.469022Z",
"version": 1,
"statements": [
{
"vulnerability": {
"name": "CVE-2022-3715"
},
"products": [
{
"@id": "pkg:oci/cilium",
"subcomponents": [
{
"@id": "pkg:deb/ubuntu/bash@5.1-6ubuntu1"
}
]
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path"
},
{
"vulnerability": {
"name": "CVE-2016-2781"
},
"products": [
{
"@id": "pkg:oci/cilium",
"subcomponents": [
{
"@id": "pkg:deb/ubuntu/coreutils@8.32-4.1ubuntu1"
}
]
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path"
},
{
"vulnerability": {
"name": "CVE-2022-27943"
},
"products": [
{
"@id": "pkg:oci/cilium",
"subcomponents": [
{
"@id": "pkg:deb/ubuntu/gcc-12-base@12.3.0-1ubuntu1~22.04"
}
]
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path"
},
{
"vulnerability": {
"name": "CVE-2022-3219"
},
"products": [
{
"@id": "pkg:oci/cilium",
"subcomponents": [
{
"@id": "pkg:deb/ubuntu/gpgv@2.2.27-3ubuntu2.1"
}
]
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path"
},
{
"vulnerability": {
"name": "CVE-2016-20013"
},
"products": [
{
"@id": "pkg:oci/cilium",
"subcomponents": [
{
"@id": "pkg:deb/ubuntu/libc-bin@2.35-0ubuntu3.5"
},
{
"@id": "pkg:deb/ubuntu/libc6@2.35-0ubuntu3.5"
}
]
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path"
},
{
"vulnerability": {
"name": "CVE-2022-27943"
},
"products": [
{
"@id": "pkg:oci/cilium",
"subcomponents": [
{
"@id": "pkg:deb/ubuntu/libgcc-s1@12.3.0-1ubuntu1~22.04"
}
]
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path"
},
{
"vulnerability": {
"name": "CVE-2020-22916"
},
"products": [
{
"@id": "pkg:oci/cilium",
"subcomponents": [
{
"@id": "pkg:deb/ubuntu/liblzma5@5.2.5-2ubuntu1"
}
]
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path"
},
{
"vulnerability": {
"name": "CVE-2017-11164"
},
"products": [
{
"@id": "pkg:oci/cilium",
"subcomponents": [
{
"@id": "pkg:deb/ubuntu/libpcre3@2:8.39-13ubuntu0.22.04.1"
}
]
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path"
},
{
"vulnerability": {
"name": "CVE-2022-27943"
},
"products": [
{
"@id": "pkg:oci/cilium",
"subcomponents": [
{
"@id": "pkg:deb/ubuntu/libstdc++6@12.3.0-1ubuntu1~22.04"
}
]
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path"
},
{
"vulnerability": {
"name": "CVE-2023-29383"
},
"products": [
{
"@id": "pkg:oci/cilium",
"subcomponents": [
{
"@id": "pkg:deb/ubuntu/login@1:4.8.1-2ubuntu2.1"
}
]
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path"
},
{
"vulnerability": {
"name": "CVE-2023-29383"
},
"products": [
{
"@id": "pkg:oci/cilium",
"subcomponents": [
{
"@id": "pkg:deb/ubuntu/passwd@1:4.8.1-2ubuntu2.1"
}
]
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path"
}
]
}
Computing file changes ...