Логотип exploitDog
bind:"GHSA-4374-p667-p6c8" OR bind:"CVE-2023-39325"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-4374-p667-p6c8" OR bind:"CVE-2023-39325"

Количество 32

Количество 32

github логотип

GHSA-4374-p667-p6c8

около 2 лет назад

HTTP/2 rapid reset can cause excessive work in net/http

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-39325

около 2 лет назад

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-39325

около 2 лет назад

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-39325

около 2 лет назад

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-39325

9 месяцев назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-39325

около 2 лет назад

A malicious HTTP/2 client which rapidly creates requests and immediate ...

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-07013

около 2 лет назад

Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4069-1

около 2 лет назад

Security update for go1.21

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4068-1

около 2 лет назад

Security update for go1.20

EPSS: Низкий
redos логотип

ROS-20250822-12

около 2 месяцев назад

Уязвимость stolon

CVSS3: 7.5
EPSS: Низкий
rocky логотип

RLSA-2023:6077

почти 2 года назад

Moderate: toolbox security update

EPSS: Низкий
rocky логотип

RLSA-2023:5863

почти 2 года назад

Moderate: grafana security update

EPSS: Низкий
oracle-oval логотип

ELSA-2023-5867

около 2 лет назад

ELSA-2023-5867: grafana security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-5863

около 2 лет назад

ELSA-2023-5863: grafana security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-5721

около 2 лет назад

ELSA-2023-5721: go-toolset:ol8 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-13054

почти 2 года назад

ELSA-2023-13054: conmon security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-13053

почти 2 года назад

ELSA-2023-13053: conmon security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-13029

почти 2 года назад

ELSA-2023-13029: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-13028

почти 2 года назад

ELSA-2023-13028: olcne security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3094-1

около 1 года назад

Security update for kubernetes1.26

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-4374-p667-p6c8

HTTP/2 rapid reset can cause excessive work in net/http

CVSS3: 7.5
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-39325

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...

CVSS3: 7.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-39325

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...

CVSS3: 7.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-39325

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see

CVSS3: 7.5
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 7.5
0%
Низкий
9 месяцев назад
debian логотип
CVE-2023-39325

A malicious HTTP/2 client which rapidly creates requests and immediate ...

CVSS3: 7.5
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-07013

Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4069-1

Security update for go1.21

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4068-1

Security update for go1.20

около 2 лет назад
redos логотип
ROS-20250822-12

Уязвимость stolon

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
rocky логотип
RLSA-2023:6077

Moderate: toolbox security update

почти 2 года назад
rocky логотип
RLSA-2023:5863

Moderate: grafana security update

почти 2 года назад
oracle-oval логотип
ELSA-2023-5867

ELSA-2023-5867: grafana security update (MODERATE)

около 2 лет назад
oracle-oval логотип
ELSA-2023-5863

ELSA-2023-5863: grafana security update (MODERATE)

около 2 лет назад
oracle-oval логотип
ELSA-2023-5721

ELSA-2023-5721: go-toolset:ol8 security update (IMPORTANT)

около 2 лет назад
oracle-oval логотип
ELSA-2023-13054

ELSA-2023-13054: conmon security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2023-13053

ELSA-2023-13053: conmon security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2023-13029

ELSA-2023-13029: olcne security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2023-13028

ELSA-2023-13028: olcne security update (IMPORTANT)

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2024:3094-1

Security update for kubernetes1.26

около 1 года назад

Уязвимостей на страницу