Количество 58
Количество 58
ELSA-2024-12190
ELSA-2024-12190: conmon security update (IMPORTANT)
ELSA-2024-12189
ELSA-2024-12189: conmon security update (IMPORTANT)
ELSA-2024-1149
ELSA-2024-1149: skopeo security update (MODERATE)
BDU:2024-00175
Уязвимость пакета net/http языка программирования Go, позволяющая нарушителю раскрыть защищаемую информацию
ELSA-2024-1131
ELSA-2024-1131: golang security update (MODERATE)
ELSA-2024-0887
ELSA-2024-0887: go-toolset:ol8 security update (MODERATE)
CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
CVE-2023-45287
Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel
CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...
CVE-2024-21626
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
CVE-2024-21626
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
CVE-2024-21626
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
CVE-2024-21626
GitHub: CVE-2024-21626 Container breakout through process.cwd trickery and leaked fds
CVE-2024-21626
runc is a CLI tool for spawning and running containers on Linux accord ...
SUSE-SU-2023:4931-1
Security update for go1.21-openssl
SUSE-SU-2023:4930-1
Security update for go1.20-openssl
SUSE-SU-2023:4709-1
Security update for go1.21
SUSE-SU-2023:4708-1
Security update for go1.20
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2024-12190 ELSA-2024-12190: conmon security update (IMPORTANT) | почти 2 года назад | |||
ELSA-2024-12189 ELSA-2024-12189: conmon security update (IMPORTANT) | почти 2 года назад | |||
ELSA-2024-1149 ELSA-2024-1149: skopeo security update (MODERATE) | почти 2 года назад | |||
BDU:2024-00175 Уязвимость пакета net/http языка программирования Go, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.3 | 0% Низкий | около 2 лет назад | |
ELSA-2024-1131 ELSA-2024-1131: golang security update (MODERATE) | почти 2 года назад | |||
ELSA-2024-0887 ELSA-2024-0887: go-toolset:ol8 security update (MODERATE) | почти 2 года назад | |||
CVE-2023-45287 Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-45287 Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-45287 Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-45287 Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel | CVSS3: 7.5 | 0% Низкий | 5 месяцев назад | |
CVE-2023-45287 Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ... | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
CVE-2024-21626 runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue. | CVSS3: 8.6 | 4% Низкий | около 2 лет назад | |
CVE-2024-21626 runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue. | CVSS3: 8.6 | 4% Низкий | около 2 лет назад | |
CVE-2024-21626 runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue. | CVSS3: 8.6 | 4% Низкий | около 2 лет назад | |
CVE-2024-21626 GitHub: CVE-2024-21626 Container breakout through process.cwd trickery and leaked fds | 4% Низкий | почти 2 года назад | ||
CVE-2024-21626 runc is a CLI tool for spawning and running containers on Linux accord ... | CVSS3: 8.6 | 4% Низкий | около 2 лет назад | |
SUSE-SU-2023:4931-1 Security update for go1.21-openssl | около 2 лет назад | |||
SUSE-SU-2023:4930-1 Security update for go1.20-openssl | около 2 лет назад | |||
SUSE-SU-2023:4709-1 Security update for go1.21 | около 2 лет назад | |||
SUSE-SU-2023:4708-1 Security update for go1.20 | около 2 лет назад |
Уязвимостей на страницу