Логотип exploitDog
bind:"CVE-2023-39321" OR bind:"CVE-2023-29409" OR bind:"CVE-2023-39322"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-39321" OR bind:"CVE-2023-29409" OR bind:"CVE-2023-39322"

Количество 41

Количество 41

redhat логотип

CVE-2023-39322

больше 2 лет назад

QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-39322

больше 2 лет назад

QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-39322

больше 2 лет назад

QUIC connections do not set an upper bound on the amount of data buffe ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-29409

больше 2 лет назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-29409

больше 2 лет назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-29409

больше 2 лет назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2023-29409

5 месяцев назад

Large RSA keys can cause high CPU usage in crypto/tls

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-29409

больше 2 лет назад

Extremely large RSA keys in certificate chains can cause a client/serv ...

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20241001-02

больше 1 года назад

Множественные уязвимости golang

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-892h-r6cr-53g4

больше 2 лет назад

QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3888-1

больше 2 лет назад

Security update for Golang Prometheus

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3886-1

больше 2 лет назад

Security update for grafana

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3263-1

больше 2 лет назад

Security update for go1.19

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3181-1

больше 2 лет назад

Security update for go1.20

EPSS: Низкий
github логотип

GHSA-xc82-5m89-g4jv

больше 2 лет назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-06242

больше 2 лет назад

Уязвимость пакета crypto/tls языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3841-1

больше 2 лет назад

Security update for go1.19-openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3840-1

больше 2 лет назад

Security update for go1.20-openssl

EPSS: Низкий
oracle-oval логотип

ELSA-2023-5738

больше 2 лет назад

ELSA-2023-5738: go-toolset and golang security and bug fix update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3868-1

больше 2 лет назад

Security update for SUSE Manager Client Tools

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-39322

QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-39322

QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-39322

QUIC connections do not set an upper bound on the amount of data buffe ...

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
msrc логотип
CVE-2023-29409

Large RSA keys can cause high CPU usage in crypto/tls

CVSS3: 5.3
0%
Низкий
5 месяцев назад
debian логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/serv ...

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
redos логотип
ROS-20241001-02

Множественные уязвимости golang

CVSS3: 8.8
больше 1 года назад
github логотип
GHSA-892h-r6cr-53g4

QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3888-1

Security update for Golang Prometheus

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3886-1

Security update for grafana

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3263-1

Security update for go1.19

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3181-1

Security update for go1.20

0%
Низкий
больше 2 лет назад
github логотип
GHSA-xc82-5m89-g4jv

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-06242

Уязвимость пакета crypto/tls языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3841-1

Security update for go1.19-openssl

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3840-1

Security update for go1.20-openssl

больше 2 лет назад
oracle-oval логотип
ELSA-2023-5738

ELSA-2023-5738: go-toolset and golang security and bug fix update (IMPORTANT)

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3868-1

Security update for SUSE Manager Client Tools

больше 2 лет назад

Уязвимостей на страницу