Логотип exploitDog
bind:"BDU:2023-06242" OR bind:"CVE-2023-29409"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-06242" OR bind:"CVE-2023-29409"

Количество 22

Количество 22

fstec логотип

BDU:2023-06242

почти 2 года назад

Уязвимость пакета crypto/tls языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2023-29409

почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-29409

почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-29409

почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-29409

почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/serv ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3888-1

больше 1 года назад

Security update for Golang Prometheus

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3886-1

больше 1 года назад

Security update for grafana

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3263-1

почти 2 года назад

Security update for go1.19

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3181-1

почти 2 года назад

Security update for go1.20

EPSS: Низкий
github логотип

GHSA-xc82-5m89-g4jv

почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3841-1

больше 1 года назад

Security update for go1.19-openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3840-1

больше 1 года назад

Security update for go1.20-openssl

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7763

больше 1 года назад

ELSA-2023-7763: runc security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-5738

больше 1 года назад

ELSA-2023-5738: go-toolset and golang security and bug fix update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3868-1

больше 1 года назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3867-1

больше 1 года назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7766

больше 1 года назад

ELSA-2023-7766: containernetworking-plugins security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7765

больше 1 года назад

ELSA-2023-7765: podman security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7764

больше 1 года назад

ELSA-2023-7764: buildah security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7762

больше 1 года назад

ELSA-2023-7762: skopeo security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-06242

Уязвимость пакета crypto/tls языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/serv ...

CVSS3: 5.3
0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3888-1

Security update for Golang Prometheus

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3886-1

Security update for grafana

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3263-1

Security update for go1.19

0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3181-1

Security update for go1.20

0%
Низкий
почти 2 года назад
github логотип
GHSA-xc82-5m89-g4jv

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3841-1

Security update for go1.19-openssl

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3840-1

Security update for go1.20-openssl

больше 1 года назад
oracle-oval логотип
ELSA-2023-7763

ELSA-2023-7763: runc security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2023-5738

ELSA-2023-5738: go-toolset and golang security and bug fix update (IMPORTANT)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3868-1

Security update for SUSE Manager Client Tools

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3867-1

Security update for SUSE Manager Client Tools

больше 1 года назад
oracle-oval логотип
ELSA-2023-7766

ELSA-2023-7766: containernetworking-plugins security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2023-7765

ELSA-2023-7765: podman security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2023-7764

ELSA-2023-7764: buildah security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2023-7762

ELSA-2023-7762: skopeo security update (MODERATE)

больше 1 года назад

Уязвимостей на страницу