Количество 20
Количество 20

BDU:2024-03152
Уязвимость пакета crypto/tls языка программирования Golang, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2022-41724
Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).

CVE-2022-41724
Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).

CVE-2022-41724
Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).
CVE-2022-41724
Large handshake records may cause panics in crypto/tls. Both clients a ...
GHSA-89mw-w342-mqrr
Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).
ELSA-2023-3083
ELSA-2023-3083: go-toolset:ol8 security and bug fix update (MODERATE)

SUSE-SU-2023:0869-1
Security update for go1.18

SUSE-SU-2023:0871-1
Security update for container-suseconnect

SUSE-SU-2023:0735-1
Security update for go1.20

SUSE-SU-2023:0733-1
Security update for go1.19
ELSA-2023-6380
ELSA-2023-6380: runc security update (MODERATE)
ELSA-2023-6402
ELSA-2023-6402: containernetworking-plugins security and bug fix update (MODERATE)
ELSA-2023-6473
ELSA-2023-6473: buildah security update (MODERATE)
ELSA-2023-6363
ELSA-2023-6363: skopeo security update (MODERATE)
ELSA-2023-6474
ELSA-2023-6474: podman security, bug fix, and enhancement update (MODERATE)
ELSA-2023-6938
ELSA-2023-6938: container-tools:4.0 security and bug fix update (MODERATE)

ROS-20240418-06
Множественные уязвимости buildah
ELSA-2023-6939
ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE)

SUSE-SU-2023:2312-1
Security update for go1.18-openssl
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-03152 Уязвимость пакета crypto/tls языка программирования Golang, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-41724 Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert). | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-41724 Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert). | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-41724 Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert). | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад |
CVE-2022-41724 Large handshake records may cause panics in crypto/tls. Both clients a ... | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
GHSA-89mw-w342-mqrr Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert). | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
ELSA-2023-3083 ELSA-2023-3083: go-toolset:ol8 security and bug fix update (MODERATE) | около 2 лет назад | |||
![]() | SUSE-SU-2023:0869-1 Security update for go1.18 | около 2 лет назад | ||
![]() | SUSE-SU-2023:0871-1 Security update for container-suseconnect | около 2 лет назад | ||
![]() | SUSE-SU-2023:0735-1 Security update for go1.20 | больше 2 лет назад | ||
![]() | SUSE-SU-2023:0733-1 Security update for go1.19 | больше 2 лет назад | ||
ELSA-2023-6380 ELSA-2023-6380: runc security update (MODERATE) | больше 1 года назад | |||
ELSA-2023-6402 ELSA-2023-6402: containernetworking-plugins security and bug fix update (MODERATE) | больше 1 года назад | |||
ELSA-2023-6473 ELSA-2023-6473: buildah security update (MODERATE) | больше 1 года назад | |||
ELSA-2023-6363 ELSA-2023-6363: skopeo security update (MODERATE) | больше 1 года назад | |||
ELSA-2023-6474 ELSA-2023-6474: podman security, bug fix, and enhancement update (MODERATE) | больше 1 года назад | |||
ELSA-2023-6938 ELSA-2023-6938: container-tools:4.0 security and bug fix update (MODERATE) | больше 1 года назад | |||
![]() | ROS-20240418-06 Множественные уязвимости buildah | CVSS3: 9.8 | около 1 года назад | |
ELSA-2023-6939 ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE) | больше 1 года назад | |||
![]() | SUSE-SU-2023:2312-1 Security update for go1.18-openssl | около 2 лет назад |
Уязвимостей на страницу