Количество 132
Количество 132
ROS-20260209-73-0044
Уязвимость golang
CVE-2025-61729
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
CVE-2025-61729
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
CVE-2025-61729
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
CVE-2025-61729
Excessive resource consumption when printing error string for host certificate validation in crypto/x509
CVE-2025-61729
Within HostnameError.Error(), when constructing an error string, there ...
CVE-2025-68121
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
CVE-2025-68121
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
CVE-2025-68121
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
CVE-2025-68121
Unexpected session resumption in crypto/tls
CVE-2025-68121
During session resumption in crypto/tls, if the underlying Config has ...
RLSA-2026:2323
Important: git-lfs security update
RLSA-2026:1908
Important: opentelemetry-collector security update
RLSA-2026:1715
Important: golang-github-openprinting-ipp-usb security update
RLSA-2026:1518
Important: grafana-pcp security update
RLSA-2026:1344
Important: grafana security update
RLSA-2026:0923
Important: golang security update
RLSA-2026:0922
Important: golang security update
RLSA-2026:0921
Important: go-toolset:rhel8 security update
GHSA-7c64-f9jr-v9h2
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ROS-20260209-73-0044 Уязвимость golang | CVSS3: 6.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61729 Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption. | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
CVE-2025-61729 Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption. | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
CVE-2025-61729 Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption. | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
CVE-2025-61729 Excessive resource consumption when printing error string for host certificate validation in crypto/x509 | 0% Низкий | 4 месяца назад | ||
CVE-2025-61729 Within HostnameError.Error(), when constructing an error string, there ... | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
CVE-2025-68121 During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake. | CVSS3: 10 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-68121 During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake. | CVSS3: 7.4 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-68121 During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake. | CVSS3: 10 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-68121 Unexpected session resumption in crypto/tls | 0% Низкий | 21 день назад | ||
CVE-2025-68121 During session resumption in crypto/tls, if the underlying Config has ... | CVSS3: 10 | 0% Низкий | около 2 месяцев назад | |
RLSA-2026:2323 Important: git-lfs security update | 0% Низкий | около 1 месяца назад | ||
RLSA-2026:1908 Important: opentelemetry-collector security update | 0% Низкий | около 2 месяцев назад | ||
RLSA-2026:1715 Important: golang-github-openprinting-ipp-usb security update | 0% Низкий | около 2 месяцев назад | ||
RLSA-2026:1518 Important: grafana-pcp security update | 0% Низкий | около 2 месяцев назад | ||
RLSA-2026:1344 Important: grafana security update | 0% Низкий | около 2 месяцев назад | ||
RLSA-2026:0923 Important: golang security update | 0% Низкий | 2 месяца назад | ||
RLSA-2026:0922 Important: golang security update | 0% Низкий | 2 месяца назад | ||
RLSA-2026:0921 Important: go-toolset:rhel8 security update | 0% Низкий | 2 месяца назад | ||
GHSA-7c64-f9jr-v9h2 Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption. | CVSS3: 7.5 | 0% Низкий | 4 месяца назад |
Уязвимостей на страницу