Описание
GNU Gatekeeper before 3.1 does not limit the number of connections to the status port, which allows remote attackers to cause a denial of service (connection and thread consumption) via a large number of connections.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 2:3.0.2-2 |
| bionic | not-affected | 2:3.0.2-2 |
| devel | DNE | |
| esm-apps/bionic | not-affected | 2:3.0.2-2 |
| esm-apps/xenial | not-affected | 2:3.0.2-2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [2:3.0.2-2]] |
| hardy | ignored | end of life |
| lucid | ignored | end of life |
| natty | ignored | end of life |
| oneiric | ignored | end of life |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
Связанные уязвимости
GNU Gatekeeper before 3.1 does not limit the number of connections to the status port, which allows remote attackers to cause a denial of service (connection and thread consumption) via a large number of connections.
GNU Gatekeeper before 3.1 does not limit the number of connections to ...
GNU Gatekeeper before 3.1 does not limit the number of connections to the status port, which allows remote attackers to cause a denial of service (connection and thread consumption) via a large number of connections.
EPSS
5 Medium
CVSS2