Количество 91
Количество 91

SUSE-SU-2025:01991-1
Security update for grafana

SUSE-SU-2025:01989-1
Security update for Multi-Linux Manager Client Tools

SUSE-SU-2025:01987-1
Security update for Multi-Linux Manager Client Tools

SUSE-SU-2025:0775-1
Security update for podman

SUSE-SU-2024:3343-1
Security update for kubernetes1.24

SUSE-SU-2024:3341-1
Security update for kubernetes1.23

CVE-2024-24783
Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.

CVE-2024-24783
Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.

CVE-2024-24783
Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.
CVE-2024-24783
Verifying a certificate chain which contains a certificate with an unk ...

CVE-2023-45290
When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.

CVE-2023-45290
When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.
CVE-2023-45290
When parsing a multipart form (either explicitly with Request.ParseMul ...
GHSA-3q2c-pvp5-3cqp
Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.
ELSA-2024-6195
ELSA-2024-6195: skopeo security update (MODERATE)
ELSA-2024-6189
ELSA-2024-6189: buildah security update (MODERATE)
ELSA-2024-6188
ELSA-2024-6188: runc security update (MODERATE)
ELSA-2024-6187
ELSA-2024-6187: gvisor-tap-vsock security update (MODERATE)
ELSA-2024-6186
ELSA-2024-6186: containernetworking-plugins security update (MODERATE)

BDU:2024-02048
Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю вызвать отказ в обслуживании (DoS)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2025:01991-1 Security update for grafana | 2 дня назад | ||
![]() | SUSE-SU-2025:01989-1 Security update for Multi-Linux Manager Client Tools | 2 дня назад | ||
![]() | SUSE-SU-2025:01987-1 Security update for Multi-Linux Manager Client Tools | 2 дня назад | ||
![]() | SUSE-SU-2025:0775-1 Security update for podman | 4 месяца назад | ||
![]() | SUSE-SU-2024:3343-1 Security update for kubernetes1.24 | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3341-1 Security update for kubernetes1.23 | 9 месяцев назад | ||
![]() | CVE-2024-24783 Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-24783 Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-24783 Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад |
CVE-2024-24783 Verifying a certificate chain which contains a certificate with an unk ... | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2023-45290 When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines. | CVSS3: 6.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-45290 When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines. | CVSS3: 6.5 | 0% Низкий | больше 1 года назад |
CVE-2023-45290 When parsing a multipart form (either explicitly with Request.ParseMul ... | CVSS3: 6.5 | 0% Низкий | больше 1 года назад | |
GHSA-3q2c-pvp5-3cqp Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
ELSA-2024-6195 ELSA-2024-6195: skopeo security update (MODERATE) | 10 месяцев назад | |||
ELSA-2024-6189 ELSA-2024-6189: buildah security update (MODERATE) | 10 месяцев назад | |||
ELSA-2024-6188 ELSA-2024-6188: runc security update (MODERATE) | 10 месяцев назад | |||
ELSA-2024-6187 ELSA-2024-6187: gvisor-tap-vsock security update (MODERATE) | 10 месяцев назад | |||
ELSA-2024-6186 ELSA-2024-6186: containernetworking-plugins security update (MODERATE) | 10 месяцев назад | |||
![]() | BDU:2024-02048 Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю вызвать отказ в обслуживании (DoS) | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу