Логотип exploitDog
bind:"CVE-2022-30630" OR bind:"CVE-2022-30632" OR bind:"CVE-2023-45287" OR bind:"CVE-2022-30631"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-30630" OR bind:"CVE-2022-30632" OR bind:"CVE-2023-45287" OR bind:"CVE-2022-30631"

Количество 61

Количество 61

ubuntu логотип

CVE-2023-45287

около 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-45287

около 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-45287

около 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-45287

3 месяца назад

Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-45287

около 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-30631

больше 3 лет назад

Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2022-30631

больше 3 лет назад

Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-30631

больше 3 лет назад

Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2022-30631

больше 3 лет назад

Stack exhaustion when reading certain archives in compress/gzip

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-30631

больше 3 лет назад

Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17. ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-33qr-2xwr-95pw

около 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-2239

больше 1 года назад

ELSA-2024-2239: skopeo security update (MODERATE)

EPSS: Низкий
github логотип

GHSA-r654-8j96-crqx

больше 3 лет назад

Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2022-05522

больше 3 лет назад

Уязвимость пакета compress/gzip языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-2272

больше 1 года назад

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2245

больше 1 года назад

ELSA-2024-2245: buildah security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2193

больше 1 года назад

ELSA-2024-2193: podman security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-0748

почти 2 года назад

ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2024:0748

7 месяцев назад

Important: container-tools:4.0 security update

EPSS: Низкий
rocky логотип

RLSA-2024:2988

7 месяцев назад

Moderate: container-tools:rhel8 security update

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
msrc логотип
CVE-2023-45287

Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel

CVSS3: 7.5
0%
Низкий
3 месяца назад
debian логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...

CVSS3: 7.5
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2022-30631

Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2022-30631

Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-30631

Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
msrc логотип
CVE-2022-30631

Stack exhaustion when reading certain archives in compress/gzip

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-30631

Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17. ...

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-33qr-2xwr-95pw

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
oracle-oval логотип
ELSA-2024-2239

ELSA-2024-2239: skopeo security update (MODERATE)

больше 1 года назад
github логотип
GHSA-r654-8j96-crqx

Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-05522

Уязвимость пакета compress/gzip языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2024-2272

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2024-2245

ELSA-2024-2245: buildah security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2024-2193

ELSA-2024-2193: podman security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2024-0748

ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)

почти 2 года назад
rocky логотип
RLSA-2024:0748

Important: container-tools:4.0 security update

7 месяцев назад
rocky логотип
RLSA-2024:2988

Moderate: container-tools:rhel8 security update

7 месяцев назад

Уязвимостей на страницу