Количество 35
Количество 35
ELSA-2024-2272
ELSA-2024-2272: containernetworking-plugins security update (MODERATE)
ELSA-2024-2245
ELSA-2024-2245: buildah security update (MODERATE)
ELSA-2024-2193
ELSA-2024-2193: podman security update (MODERATE)

CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...
ELSA-2024-2988
ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.
CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver r ...
GHSA-33qr-2xwr-95pw
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
ELSA-2024-2239
ELSA-2024-2239: skopeo security update (MODERATE)
GHSA-9f76-wg39-x86h
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.
ELSA-2024-12264
ELSA-2024-12264: olcne security update (IMPORTANT)
ELSA-2024-12263
ELSA-2024-12263: olcne security update (IMPORTANT)
ELSA-2024-12262
ELSA-2024-12262: olcne security update (IMPORTANT)
ELSA-2024-12261
ELSA-2024-12261: olcne security update (IMPORTANT)
ELSA-2024-12226
ELSA-2024-12226: conmon security update (IMPORTANT)
ELSA-2024-12225
ELSA-2024-12225: conmon security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2024-2272 ELSA-2024-2272: containernetworking-plugins security update (MODERATE) | около 1 года назад | |||
ELSA-2024-2245 ELSA-2024-2245: buildah security update (MODERATE) | около 1 года назад | |||
ELSA-2024-2193 ELSA-2024-2193: podman security update (MODERATE) | около 1 года назад | |||
![]() | CVE-2023-45287 Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-45287 Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
CVE-2023-45287 Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ... | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
ELSA-2024-2988 ELSA-2024-2988: container-tools:ol8 security update (MODERATE) | около 1 года назад | |||
![]() | CVE-2023-39326 A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-39326 A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-39326 A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
CVE-2023-39326 A malicious HTTP sender can use chunk extensions to cause a receiver r ... | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
GHSA-33qr-2xwr-95pw Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
ELSA-2024-2239 ELSA-2024-2239: skopeo security update (MODERATE) | около 1 года назад | |||
GHSA-9f76-wg39-x86h A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
ELSA-2024-12264 ELSA-2024-12264: olcne security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-12263 ELSA-2024-12263: olcne security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-12262 ELSA-2024-12262: olcne security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-12261 ELSA-2024-12261: olcne security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-12226 ELSA-2024-12226: conmon security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-12225 ELSA-2024-12225: conmon security update (IMPORTANT) | больше 1 года назад |
Уязвимостей на страницу