Количество 54
Количество 54

BDU:2024-02688
Уязвимость библиотек net/http и net/http2 языка программирования Go, связана с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

ROS-20240923-06
Уязвимость consul

ROS-20240422-11
Уязвимость terraform

ROS-20241112-03
Множественные уязвимости packer

ROS-20240826-13
Множественные уязвимости etcd

ROS-20240826-20
Множественные уязвимости stolon

ROS-20240422-05
Множественные уязвимости golang

CVE-2023-45288
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVE-2023-45288
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVE-2023-45288
CVE-2023-45288
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of ...

SUSE-SU-2025:0581-1
Security update for buildah

SUSE-SU-2025:0299-1
Security update for ignition

SUSE-SU-2024:3155-1
Security update for kubernetes1.26

SUSE-SU-2024:2108-1
Security update for containerd

SUSE-SU-2024:1161-1
Security update for go1.21

SUSE-SU-2024:1160-1
Security update for go1.22

SUSE-SU-2024:1122-1
Security update for go1.21

SUSE-SU-2024:1121-1
Security update for go1.22

RLSA-2024:2699
Important: git-lfs security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-02688 Уязвимость библиотек net/http и net/http2 языка программирования Go, связана с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 65% Средний | около 1 года назад |
![]() | ROS-20240923-06 Уязвимость consul | CVSS3: 5.3 | 65% Средний | 9 месяцев назад |
![]() | ROS-20240422-11 Уязвимость terraform | CVSS3: 5.3 | 65% Средний | 11 месяцев назад |
![]() | ROS-20241112-03 Множественные уязвимости packer | CVSS3: 5.3 | 7 месяцев назад | |
![]() | ROS-20240826-13 Множественные уязвимости etcd | CVSS3: 7.5 | 10 месяцев назад | |
![]() | ROS-20240826-20 Множественные уязвимости stolon | CVSS3: 7.5 | 10 месяцев назад | |
![]() | ROS-20240422-05 Множественные уязвимости golang | CVSS3: 7.5 | около 1 года назад | |
![]() | CVE-2023-45288 An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection. | CVSS3: 7.5 | 65% Средний | около 1 года назад |
![]() | CVE-2023-45288 An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection. | CVSS3: 7.5 | 65% Средний | около 1 года назад |
![]() | CVSS3: 7.5 | 65% Средний | 9 месяцев назад | |
CVE-2023-45288 An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of ... | CVSS3: 7.5 | 65% Средний | около 1 года назад | |
![]() | SUSE-SU-2025:0581-1 Security update for buildah | 65% Средний | 4 месяца назад | |
![]() | SUSE-SU-2025:0299-1 Security update for ignition | 65% Средний | 5 месяцев назад | |
![]() | SUSE-SU-2024:3155-1 Security update for kubernetes1.26 | 65% Средний | 10 месяцев назад | |
![]() | SUSE-SU-2024:2108-1 Security update for containerd | 65% Средний | 12 месяцев назад | |
![]() | SUSE-SU-2024:1161-1 Security update for go1.21 | 65% Средний | около 1 года назад | |
![]() | SUSE-SU-2024:1160-1 Security update for go1.22 | 65% Средний | около 1 года назад | |
![]() | SUSE-SU-2024:1122-1 Security update for go1.21 | 65% Средний | около 1 года назад | |
![]() | SUSE-SU-2024:1121-1 Security update for go1.22 | 65% Средний | около 1 года назад | |
![]() | RLSA-2024:2699 Important: git-lfs security update | 65% Средний | около 1 года назад |
Уязвимостей на страницу