Количество 35
Количество 35

SUSE-SU-2025:1555-1
Security update for go1.22-openssl
ELSA-2025-7466
ELSA-2025-7466: delve and golang security update (MODERATE)

SUSE-SU-2025:01731-1
Security update for go1.23-openssl

SUSE-SU-2025:0281-1
Security update for go1.22

SUSE-SU-2025:0280-1
Security update for go1.23

ROS-20250212-16
Множественные уязвимости golang
ELSA-2025-3772
ELSA-2025-3772: go-toolset:ol8 security update (MODERATE)

SUSE-SU-2025:0429-1
Security update for govulncheck-vulndb

CVE-2025-22866
Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.

CVE-2025-22866
Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.

CVE-2025-22866
Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.
CVE-2025-22866
Due to the usage of a variable time instruction in the assembly implem ...

SUSE-SU-2025:0285-1
Security update for go1.24

SUSE-SU-2025:0393-1
Security update for go1.23

SUSE-SU-2025:0392-1
Security update for go1.22

ROS-20250226-17
Уязвимость golang
GHSA-3whm-j4xm-rv8x
Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.

BDU:2025-03456
Уязвимость компонента crypto-elliptic языка программирования Golang, позволяющая нарушителю получить доступ к конфиденциальной информации

SUSE-SU-2025:0431-1
Security update for go1.24

CVE-2024-45341
A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2025:1555-1 Security update for go1.22-openssl | 3 месяца назад | ||
ELSA-2025-7466 ELSA-2025-7466: delve and golang security update (MODERATE) | около 1 месяца назад | |||
![]() | SUSE-SU-2025:01731-1 Security update for go1.23-openssl | 2 месяца назад | ||
![]() | SUSE-SU-2025:0281-1 Security update for go1.22 | 6 месяцев назад | ||
![]() | SUSE-SU-2025:0280-1 Security update for go1.23 | 6 месяцев назад | ||
![]() | ROS-20250212-16 Множественные уязвимости golang | CVSS3: 6.1 | 6 месяцев назад | |
ELSA-2025-3772 ELSA-2025-3772: go-toolset:ol8 security update (MODERATE) | 4 месяца назад | |||
![]() | SUSE-SU-2025:0429-1 Security update for govulncheck-vulndb | 6 месяцев назад | ||
![]() | CVE-2025-22866 Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols. | CVSS3: 4 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2025-22866 Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols. | CVSS3: 5.3 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2025-22866 Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols. | CVSS3: 4 | 0% Низкий | 6 месяцев назад |
CVE-2025-22866 Due to the usage of a variable time instruction in the assembly implem ... | CVSS3: 4 | 0% Низкий | 6 месяцев назад | |
![]() | SUSE-SU-2025:0285-1 Security update for go1.24 | 6 месяцев назад | ||
![]() | SUSE-SU-2025:0393-1 Security update for go1.23 | 0% Низкий | 6 месяцев назад | |
![]() | SUSE-SU-2025:0392-1 Security update for go1.22 | 0% Низкий | 6 месяцев назад | |
![]() | ROS-20250226-17 Уязвимость golang | CVSS2: 2.1 | 0% Низкий | 5 месяцев назад |
GHSA-3whm-j4xm-rv8x Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols. | CVSS3: 8.4 | 0% Низкий | 6 месяцев назад | |
![]() | BDU:2025-03456 Уязвимость компонента crypto-elliptic языка программирования Golang, позволяющая нарушителю получить доступ к конфиденциальной информации | CVSS3: 4 | 0% Низкий | 6 месяцев назад |
![]() | SUSE-SU-2025:0431-1 Security update for go1.24 | 6 месяцев назад | ||
![]() | CVE-2024-45341 A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs. | CVSS3: 6.1 | 0% Низкий | 6 месяцев назад |
Уязвимостей на страницу