Количество 108
Количество 108
ROS-20240826-01
Множественные уязвимости packer
SUSE-SU-2024:3343-1
Security update for kubernetes1.24
SUSE-SU-2024:3341-1
Security update for kubernetes1.23
SUSE-SU-2023:4469-1
Security update for go1.21-openssl
CVE-2023-39325
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...
CVE-2023-39325
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...
CVE-2023-39325
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see
CVE-2023-39325
CVE-2023-39325
A malicious HTTP/2 client which rapidly creates requests and immediate ...
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-44487
MITRE: CVE-2023-44487 HTTP/2 Rapid Reset Attack
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consum ...
GHSA-4374-p667-p6c8
HTTP/2 rapid reset can cause excessive work in net/http
BDU:2023-07013
Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2023:4624-1
Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container
SUSE-SU-2023:4492-1
Security update for nghttp2
SUSE-SU-2023:4295-1
Security update for nodejs10
SUSE-SU-2023:4200-1
Security update for nghttp2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ROS-20240826-01 Множественные уязвимости packer | CVSS3: 7.5 | больше 1 года назад | ||
SUSE-SU-2024:3343-1 Security update for kubernetes1.24 | больше 1 года назад | |||
SUSE-SU-2024:3341-1 Security update for kubernetes1.23 | больше 1 года назад | |||
SUSE-SU-2023:4469-1 Security update for go1.21-openssl | около 2 лет назад | |||
CVE-2023-39325 A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s... | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
CVE-2023-39325 A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s... | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
CVE-2023-39325 A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
CVSS3: 7.5 | 0% Низкий | около 1 года назад | ||
CVE-2023-39325 A malicious HTTP/2 client which rapidly creates requests and immediate ... | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. | CVSS3: 7.5 | 94% Критический | больше 2 лет назад | |
CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. | CVSS3: 7.5 | 94% Критический | больше 2 лет назад | |
CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. | CVSS3: 7.5 | 94% Критический | больше 2 лет назад | |
CVE-2023-44487 MITRE: CVE-2023-44487 HTTP/2 Rapid Reset Attack | 94% Критический | больше 2 лет назад | ||
CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consum ... | CVSS3: 7.5 | 94% Критический | больше 2 лет назад | |
GHSA-4374-p667-p6c8 HTTP/2 rapid reset can cause excessive work in net/http | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
BDU:2023-07013 Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
SUSE-SU-2023:4624-1 Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container | 94% Критический | около 2 лет назад | ||
SUSE-SU-2023:4492-1 Security update for nghttp2 | 94% Критический | около 2 лет назад | ||
SUSE-SU-2023:4295-1 Security update for nodejs10 | 94% Критический | больше 2 лет назад | ||
SUSE-SU-2023:4200-1 Security update for nghttp2 | 94% Критический | больше 2 лет назад |
Уязвимостей на страницу