Количество 115
Количество 115
ELSA-2023-5738
ELSA-2023-5738: go-toolset and golang security and bug fix update (IMPORTANT)

SUSE-SU-2023:4069-1
Security update for go1.21

SUSE-SU-2023:4068-1
Security update for go1.20

RLSA-2023:6077
Moderate: toolbox security update

RLSA-2023:5863
Moderate: grafana security update
ELSA-2023-5867
ELSA-2023-5867: grafana security update (MODERATE)
ELSA-2023-5863
ELSA-2023-5863: grafana security update (MODERATE)
ELSA-2023-5721
ELSA-2023-5721: go-toolset:ol8 security update (IMPORTANT)
ELSA-2023-13054
ELSA-2023-13054: conmon security update (IMPORTANT)
ELSA-2023-13053
ELSA-2023-13053: conmon security update (IMPORTANT)
ELSA-2023-13029
ELSA-2023-13029: olcne security update (IMPORTANT)
ELSA-2023-13028
ELSA-2023-13028: olcne security update (IMPORTANT)

SUSE-SU-2024:3094-1
Security update for kubernetes1.26

SUSE-SU-2024:3344-1
Security update for kubernetes1.25

SUSE-SU-2024:3342-1
Security update for kubernetes1.24

SUSE-SU-2024:3098-1
Security update for kubernetes1.27

SUSE-SU-2024:3097-1
Security update for kubernetes1.28

SUSE-SU-2023:4472-1
Security update for go1.20-openssl

ROS-20240826-01
Множественные уязвимости packer

CVE-2023-39325
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2023-5738 ELSA-2023-5738: go-toolset and golang security and bug fix update (IMPORTANT) | больше 1 года назад | |||
![]() | SUSE-SU-2023:4069-1 Security update for go1.21 | больше 1 года назад | ||
![]() | SUSE-SU-2023:4068-1 Security update for go1.20 | больше 1 года назад | ||
![]() | RLSA-2023:6077 Moderate: toolbox security update | больше 1 года назад | ||
![]() | RLSA-2023:5863 Moderate: grafana security update | больше 1 года назад | ||
ELSA-2023-5867 ELSA-2023-5867: grafana security update (MODERATE) | больше 1 года назад | |||
ELSA-2023-5863 ELSA-2023-5863: grafana security update (MODERATE) | больше 1 года назад | |||
ELSA-2023-5721 ELSA-2023-5721: go-toolset:ol8 security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-13054 ELSA-2023-13054: conmon security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-13053 ELSA-2023-13053: conmon security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-13029 ELSA-2023-13029: olcne security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-13028 ELSA-2023-13028: olcne security update (IMPORTANT) | больше 1 года назад | |||
![]() | SUSE-SU-2024:3094-1 Security update for kubernetes1.26 | 10 месяцев назад | ||
![]() | SUSE-SU-2024:3344-1 Security update for kubernetes1.25 | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3342-1 Security update for kubernetes1.24 | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3098-1 Security update for kubernetes1.27 | 10 месяцев назад | ||
![]() | SUSE-SU-2024:3097-1 Security update for kubernetes1.28 | 10 месяцев назад | ||
![]() | SUSE-SU-2023:4472-1 Security update for go1.20-openssl | больше 1 года назад | ||
![]() | ROS-20240826-01 Множественные уязвимости packer | CVSS3: 7.5 | 10 месяцев назад | |
![]() | CVE-2023-39325 A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s... | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу