Количество 32
Количество 32

BDU:2023-07013
Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

ROS-20250822-12
Уязвимость stolon

ROS-20250619-04
Множественные уязвимости kubernetes

ROS-20240329-10
Множественные уязвимости cri-o

ROS-20240826-01
Множественные уязвимости packer

CVE-2023-39325
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...

CVE-2023-39325
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...

CVE-2023-39325
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see

CVE-2023-39325
CVE-2023-39325
A malicious HTTP/2 client which rapidly creates requests and immediate ...
GHSA-4374-p667-p6c8
HTTP/2 rapid reset can cause excessive work in net/http

SUSE-SU-2023:4069-1
Security update for go1.21

SUSE-SU-2023:4068-1
Security update for go1.20

RLSA-2023:6077
Moderate: toolbox security update

RLSA-2023:5863
Moderate: grafana security update
ELSA-2023-5867
ELSA-2023-5867: grafana security update (MODERATE)
ELSA-2023-5863
ELSA-2023-5863: grafana security update (MODERATE)
ELSA-2023-5721
ELSA-2023-5721: go-toolset:ol8 security update (IMPORTANT)
ELSA-2023-13054
ELSA-2023-13054: conmon security update (IMPORTANT)
ELSA-2023-13053
ELSA-2023-13053: conmon security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2023-07013 Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | около 2 лет назад |
![]() | ROS-20250822-12 Уязвимость stolon | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад |
![]() | ROS-20250619-04 Множественные уязвимости kubernetes | CVSS3: 7.5 | 4 месяца назад | |
![]() | ROS-20240329-10 Множественные уязвимости cri-o | CVSS3: 9.8 | больше 1 года назад | |
![]() | ROS-20240826-01 Множественные уязвимости packer | CVSS3: 7.5 | около 1 года назад | |
![]() | CVE-2023-39325 A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s... | CVSS3: 7.5 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-39325 A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s... | CVSS3: 7.5 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-39325 A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see | CVSS3: 7.5 | 0% Низкий | около 2 лет назад |
![]() | CVSS3: 7.5 | 0% Низкий | 9 месяцев назад | |
CVE-2023-39325 A malicious HTTP/2 client which rapidly creates requests and immediate ... | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
GHSA-4374-p667-p6c8 HTTP/2 rapid reset can cause excessive work in net/http | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:4069-1 Security update for go1.21 | около 2 лет назад | ||
![]() | SUSE-SU-2023:4068-1 Security update for go1.20 | около 2 лет назад | ||
![]() | RLSA-2023:6077 Moderate: toolbox security update | почти 2 года назад | ||
![]() | RLSA-2023:5863 Moderate: grafana security update | почти 2 года назад | ||
ELSA-2023-5867 ELSA-2023-5867: grafana security update (MODERATE) | около 2 лет назад | |||
ELSA-2023-5863 ELSA-2023-5863: grafana security update (MODERATE) | около 2 лет назад | |||
ELSA-2023-5721 ELSA-2023-5721: go-toolset:ol8 security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-13054 ELSA-2023-13054: conmon security update (IMPORTANT) | почти 2 года назад | |||
ELSA-2023-13053 ELSA-2023-13053: conmon security update (IMPORTANT) | почти 2 года назад |
Уязвимостей на страницу