Количество 61
Количество 61
CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
CVE-2023-45287
Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel
CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...
CVE-2022-30631
Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.
CVE-2022-30631
Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.
CVE-2022-30631
Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.
CVE-2022-30631
Stack exhaustion when reading certain archives in compress/gzip
CVE-2022-30631
Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17. ...
GHSA-33qr-2xwr-95pw
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
ELSA-2024-2239
ELSA-2024-2239: skopeo security update (MODERATE)
GHSA-r654-8j96-crqx
Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.
BDU:2022-05522
Уязвимость пакета compress/gzip языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2024-2272
ELSA-2024-2272: containernetworking-plugins security update (MODERATE)
ELSA-2024-2245
ELSA-2024-2245: buildah security update (MODERATE)
ELSA-2024-2193
ELSA-2024-2193: podman security update (MODERATE)
ELSA-2024-0748
ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)
RLSA-2024:0748
Important: container-tools:4.0 security update
RLSA-2024:2988
Moderate: container-tools:rhel8 security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-45287 Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-45287 Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-45287 Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-45287 Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel | CVSS3: 7.5 | 0% Низкий | 3 месяца назад | |
CVE-2023-45287 Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ... | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
CVE-2022-30631 Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
CVE-2022-30631 Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
CVE-2022-30631 Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
CVE-2022-30631 Stack exhaustion when reading certain archives in compress/gzip | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
CVE-2022-30631 Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17. ... | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-33qr-2xwr-95pw Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
ELSA-2024-2239 ELSA-2024-2239: skopeo security update (MODERATE) | больше 1 года назад | |||
GHSA-r654-8j96-crqx Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
BDU:2022-05522 Уязвимость пакета compress/gzip языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
ELSA-2024-2272 ELSA-2024-2272: containernetworking-plugins security update (MODERATE) | больше 1 года назад | |||
ELSA-2024-2245 ELSA-2024-2245: buildah security update (MODERATE) | больше 1 года назад | |||
ELSA-2024-2193 ELSA-2024-2193: podman security update (MODERATE) | больше 1 года назад | |||
ELSA-2024-0748 ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT) | почти 2 года назад | |||
RLSA-2024:0748 Important: container-tools:4.0 security update | 7 месяцев назад | |||
RLSA-2024:2988 Moderate: container-tools:rhel8 security update | 7 месяцев назад |
Уязвимостей на страницу