Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-1963

Опубликовано: 23 апр. 2024
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2024-1963: golang security update (IMPORTANT)

[1.20.12-4]

  • Rebuild for z-stream
  • Related: RHEL-28939

[1.20.12-3]

  • Fix CVE-2023-45288
  • Resolves: RHEL-28939
  • Temporarily disable FIPS tests (RHELBLD-14822)

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

go-toolset

1.20.12-4.el9_3

golang

1.20.12-4.el9_3

golang-bin

1.20.12-4.el9_3

golang-docs

1.20.12-4.el9_3

golang-misc

1.20.12-4.el9_3

golang-src

1.20.12-4.el9_3

golang-tests

1.20.12-4.el9_3

Oracle Linux x86_64

go-toolset

1.20.12-4.el9_3

golang

1.20.12-4.el9_3

golang-bin

1.20.12-4.el9_3

golang-docs

1.20.12-4.el9_3

golang-misc

1.20.12-4.el9_3

golang-src

1.20.12-4.el9_3

golang-tests

1.20.12-4.el9_3

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
nvd
около 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
около 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of ...

suse-cvrf
4 месяца назад

Security update for buildah