Логотип exploitDog
bind:"CVE-2023-39321" OR bind:"CVE-2023-29409" OR bind:"CVE-2023-39322"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-39321" OR bind:"CVE-2023-29409" OR bind:"CVE-2023-39322"

Количество 37

Количество 37

redos логотип

ROS-20241001-02

9 месяцев назад

Множественные уязвимости golang

CVSS3: 8.8
EPSS: Низкий
ubuntu логотип

CVE-2023-29409

почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-29409

почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-29409

почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-29409

почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/serv ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-892h-r6cr-53g4

почти 2 года назад

QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3888-1

больше 1 года назад

Security update for Golang Prometheus

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3886-1

больше 1 года назад

Security update for grafana

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3263-1

почти 2 года назад

Security update for go1.19

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3181-1

почти 2 года назад

Security update for go1.20

EPSS: Низкий
github логотип

GHSA-xc82-5m89-g4jv

почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-06242

почти 2 года назад

Уязвимость пакета crypto/tls языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3841-1

больше 1 года назад

Security update for go1.19-openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3840-1

больше 1 года назад

Security update for go1.20-openssl

EPSS: Низкий
oracle-oval логотип

ELSA-2023-5738

больше 1 года назад

ELSA-2023-5738: go-toolset and golang security and bug fix update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3868-1

больше 1 года назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3867-1

больше 1 года назад

Security update for SUSE Manager Client Tools

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redos логотип
ROS-20241001-02

Множественные уязвимости golang

CVSS3: 8.8
9 месяцев назад
ubuntu логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/serv ...

CVSS3: 5.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-892h-r6cr-53g4

QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3888-1

Security update for Golang Prometheus

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3886-1

Security update for grafana

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3263-1

Security update for go1.19

0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3181-1

Security update for go1.20

0%
Низкий
почти 2 года назад
github логотип
GHSA-xc82-5m89-g4jv

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-06242

Уязвимость пакета crypto/tls языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3841-1

Security update for go1.19-openssl

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3840-1

Security update for go1.20-openssl

больше 1 года назад
oracle-oval логотип
ELSA-2023-5738

ELSA-2023-5738: go-toolset and golang security and bug fix update (IMPORTANT)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3868-1

Security update for SUSE Manager Client Tools

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3867-1

Security update for SUSE Manager Client Tools

больше 1 года назад

Уязвимостей на страницу