Количество 34
Количество 34

ROS-20240327-01
Множественные уязвимости skopeo
ELSA-2023-2367
ELSA-2023-2367: containernetworking-plugins security and bug fix update (MODERATE)
ELSA-2023-2283
ELSA-2023-2283: skopeo security and bug fix update (MODERATE)
ELSA-2023-2282
ELSA-2023-2282: podman security and bug fix update (MODERATE)
ELSA-2023-2253
ELSA-2023-2253: buildah security and bug fix update (MODERATE)
ELSA-2023-2758
ELSA-2023-2758: container-tools:ol8 security, bug fix, and enhancement update (MODERATE)

CVE-2022-30629
Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption.

CVE-2022-30629
Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption.

CVE-2022-30629
Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption.

CVE-2022-30629
CVE-2022-30629
Non-random values for ticket_age_add in session tickets in crypto/tls ...

CVE-2022-41717
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVE-2022-41717
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVE-2022-41717
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVE-2022-41717
CVE-2022-41717
An attacker can cause excessive memory growth in a Go server accepting ...

SUSE-SU-2023:2312-1
Security update for go1.18-openssl
GHSA-j55j-52j7-vq87
Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption.

BDU:2024-02373
Уязвимость функции ticket_age_add языка программирования Go, позволяющая нарушителю получить несанкционированный доступ к идентификаторам сеанса
GHSA-xrjj-mj9h-534m
golang.org/x/net/http2 vulnerable to possible excessive memory growth
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | ROS-20240327-01 Множественные уязвимости skopeo | CVSS3: 5.3 | около 1 года назад | |
ELSA-2023-2367 ELSA-2023-2367: containernetworking-plugins security and bug fix update (MODERATE) | около 2 лет назад | |||
ELSA-2023-2283 ELSA-2023-2283: skopeo security and bug fix update (MODERATE) | около 2 лет назад | |||
ELSA-2023-2282 ELSA-2023-2282: podman security and bug fix update (MODERATE) | около 2 лет назад | |||
ELSA-2023-2253 ELSA-2023-2253: buildah security and bug fix update (MODERATE) | около 2 лет назад | |||
ELSA-2023-2758 ELSA-2023-2758: container-tools:ol8 security, bug fix, and enhancement update (MODERATE) | около 2 лет назад | |||
![]() | CVE-2022-30629 Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption. | CVSS3: 3.1 | 0% Низкий | почти 3 года назад |
![]() | CVE-2022-30629 Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption. | CVSS3: 3.1 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-30629 Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption. | CVSS3: 3.1 | 0% Низкий | почти 3 года назад |
![]() | CVSS3: 3.1 | 0% Низкий | почти 3 года назад | |
CVE-2022-30629 Non-random values for ticket_age_add in session tickets in crypto/tls ... | CVSS3: 3.1 | 0% Низкий | почти 3 года назад | |
![]() | CVE-2022-41717 An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-41717 An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-41717 An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад | |
CVE-2022-41717 An attacker can cause excessive memory growth in a Go server accepting ... | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:2312-1 Security update for go1.18-openssl | около 2 лет назад | ||
GHSA-j55j-52j7-vq87 Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption. | CVSS3: 7.5 | 0% Низкий | почти 3 года назад | |
![]() | BDU:2024-02373 Уязвимость функции ticket_age_add языка программирования Go, позволяющая нарушителю получить несанкционированный доступ к идентификаторам сеанса | CVSS3: 3.1 | 0% Низкий | около 3 лет назад |
GHSA-xrjj-mj9h-534m golang.org/x/net/http2 vulnerable to possible excessive memory growth | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад |
Уязвимостей на страницу