BDU:2024-02376

Vulnerability from fstec - Published: 06.12.2022
VLAI Severity ?
Title
Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость пакета http2 языка программирования Go связана c неограниченным распределением ресурсов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании
Vendor
Red Hat Inc., Novell Inc., Сообщество свободного программного обеспечения, Canonical Ltd., ООО «Ред Софт», Fedora Project, The Go Project
Software Name
Red Hat Enterprise Linux, OpenSUSE Leap, Debian GNU/Linux, Red Hat Ceph Storage, Red Hat Software Collections, openSUSE Tumbleweed, Red Hat Storage, Ubuntu, Red Hat Quay, Openshift Service Mesh, РЕД ОС (запись в едином реестре российских программ №3751), SUSE Linux Enterprise High Performance Computing, Suse Linux Enterprise Server, SUSE Linux Enterprise Server for SAP Applications, SUSE Manager Proxy, SUSE Manager Server, Suse Linux Enterprise Desktop, Red Hat Openshift Data Foundation, SUSE Linux Enterprise Module for Development Tools, Red Hat OpenShift GitOps, Red Hat OpenShift Container Platform, Red Hat Satellite, SUSE Manager Retail Branch Server, Red Hat OpenStack Platform, SUSE Enterprise Storage, Red Hat Web Terminal, Node Maintenance Operator, Application Interconnect, Fedora, SUSE Linux Enterprise Real Time, Red Hat OpenShift on AWS, Migration Toolkit for Virtualization, Red Hat OpenShift Virtualization, OpenShift Serverless, Red Hat Ansible Automation Platform, Go, Red Hat Developer Tools, OpenShift Developer Tools and Services for OCP, Red Hat Advanced Cluster Security, Red Hat OpenShift Dev Spaces, Self Node Remediation, Logging subsystem for Red Hat OpenShift, SUSE Liberty Linux, OpenShift API for Data Protection, OpenShift Secondary Scheduler Operator, Red Hat Advanced Cluster Management for Kubernetes, Migration Toolkit for Containers, Red Hat OpenShift distributed tracing, http2, Satellite Client
Software Version
7 (Red Hat Enterprise Linux), 15.5 (OpenSUSE Leap), 8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), 3 (Red Hat Ceph Storage), - (Red Hat Software Collections), - (openSUSE Tumbleweed), 3 (Red Hat Storage), 20.04 LTS (Ubuntu), 3 (Red Hat Quay), 16.04 ESM (Ubuntu), 15.3 (OpenSUSE Leap), 2 (Openshift Service Mesh), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (РЕД ОС), 15.4 (OpenSUSE Leap), 15 SP3 (SUSE Linux Enterprise High Performance Computing), 15 SP3 (Suse Linux Enterprise Server), 15 SP3 (SUSE Linux Enterprise Server for SAP Applications), 4.2 (SUSE Manager Proxy), 4.2 (SUSE Manager Server), 15 SP3 (Suse Linux Enterprise Desktop), 4 (Red Hat Openshift Data Foundation), 15 SP3 (SUSE Linux Enterprise Module for Development Tools), - (Red Hat OpenShift GitOps), 15 SP4 (Suse Linux Enterprise Server), 4 (Red Hat OpenShift Container Platform), 6 (Red Hat Satellite), 15 SP4 (Suse Linux Enterprise Desktop), 15 SP4 (SUSE Linux Enterprise Server for SAP Applications), 4.2 (SUSE Manager Retail Branch Server), 22.04 LTS (Ubuntu), 9 (Red Hat Enterprise Linux), 16.2 (Red Hat OpenStack Platform), 4.3 (SUSE Manager Retail Branch Server), 4.3 (SUSE Manager Proxy), 4.3 (SUSE Manager Server), 15 SP4 (SUSE Linux Enterprise High Performance Computing), 4.10 (Red Hat OpenShift Container Platform), 7.1 (SUSE Enterprise Storage), 15 SP4 (SUSE Linux Enterprise Module for Development Tools), - (Red Hat Web Terminal), - (Node Maintenance Operator), 1.0 (Application Interconnect), 37 (Fedora), 15 SP3-LTSS (Suse Linux Enterprise Server), 17.0 (Red Hat OpenStack Platform), 16.1 (Red Hat OpenStack Platform), 15 SP3-ESPOS (SUSE Linux Enterprise High Performance Computing), 15 SP3-LTSS (SUSE Linux Enterprise High Performance Computing), 15 SP3 (SUSE Linux Enterprise Real Time), 5 (Red Hat Ceph Storage), 38 (Fedora), 15 SP5 (SUSE Linux Enterprise Server for SAP Applications), 15 SP5 (Suse Linux Enterprise Server), 15 SP5 (Suse Linux Enterprise Desktop), - (Red Hat OpenShift on AWS), - (Migration Toolkit for Virtualization), 4 (Red Hat OpenShift Virtualization), - (OpenShift Serverless), 15 SP5 (SUSE Linux Enterprise High Performance Computing), 15 SP5 (SUSE Linux Enterprise Module for Development Tools), 2 (Red Hat Ansible Automation Platform), 18.04 ESM (Ubuntu), до 1.18.2 (Go), 4.13 (Red Hat OpenShift Container Platform), 4.11 (Red Hat OpenShift Container Platform), - (Red Hat Developer Tools), 4.12 (Red Hat OpenShift Container Platform), 4.11 (OpenShift Developer Tools and Services for OCP), 3 (Red Hat Advanced Cluster Security), - (Red Hat OpenShift Dev Spaces), - (Self Node Remediation), 2.1 (Openshift Service Mesh), 5.4 (Logging subsystem for Red Hat OpenShift), - (Logging subsystem for Red Hat OpenShift), 9 (SUSE Liberty Linux), 8 (SUSE Liberty Linux), 6.14 for RHEL 8 (Red Hat Satellite), от 1.19.0 до 1.19.3 (Go), 1.1 for RHEL 8 (OpenShift API for Data Protection), 1.0 for RHEL 8 (OpenShift API for Data Protection), 1 on RHEL 8 (OpenShift Serverless), 1.1 for RHEL 8 (OpenShift Secondary Scheduler Operator), 2.7 for RHEL 8 (Red Hat Advanced Cluster Management for Kubernetes), 1.7 (Migration Toolkit for Containers), 2 (Red Hat OpenShift distributed tracing), до 0.4.0 (http2), 4.9 (OpenShift Developer Tools and Services for OCP), 2.3 for RHEL 8 (Red Hat Ansible Automation Platform), 5.3 (Red Hat Ceph Storage), 2.3 for RHEL 8 (Openshift Service Mesh), 6 for RHEL 7 (Satellite Client), 6 for RHEL 8 (Satellite Client), 6 for RHEL 9 (Satellite Client)
Possible Mitigations
Использование рекомендаций: Для Go: https://go-review.googlesource.com/c/net/+/455635 https://go-review.googlesource.com/c/go/+/455717 https://github.com/golang/go/issues/56350 Для РедОС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/ Для Fedora: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQGNAXK3YBPMUP3J4TECIRDHFGW37522/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUM4DIVOLJCBK5ZDP4LJOL24GXT3YSIR/ Для Debian GNU/Linux: https://security-tracker.debian.org/tracker/CVE-2022-41717 Для программных продуктов Red Hat Inc.: https://access.redhat.com/security/cve/CVE-2022-41717 Для программных продуктов Novell Inc.: https://www.suse.com/security/cve/CVE-2022-41717.html Для Ubuntu: https://ubuntu.com/security/notices/USN-6038-2 https://ubuntu.com/security/notices/USN-6038-1
Reference
https://go-review.googlesource.com/c/net/+/455635 https://go-review.googlesource.com/c/go/+/455717 https://github.com/golang/go/issues/56350 http://repo.red-soft.ru/redos/7.3c/x86_64/updates/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQGNAXK3YBPMUP3J4TECIRDHFGW37522/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUM4DIVOLJCBK5ZDP4LJOL24GXT3YSIR/ https://security-tracker.debian.org/tracker/CVE-2022-41717 https://access.redhat.com/security/cve/CVE-2022-41717 https://www.suse.com/security/cve/CVE-2022-41717.html https://ubuntu.com/security/notices/USN-6038-2 https://ubuntu.com/security/notices/USN-6038-1 https://redos.red-soft.ru/support/secure/
CWE
CWE-770

{
  "CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  "CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., Novell Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Canonical Ltd., \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Fedora Project, The Go Project",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7 (Red Hat Enterprise Linux), 15.5 (OpenSUSE Leap), 8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), 3 (Red Hat Ceph Storage), - (Red Hat Software Collections), - (openSUSE Tumbleweed), 3 (Red Hat Storage), 20.04 LTS (Ubuntu), 3 (Red Hat Quay), 16.04 ESM (Ubuntu), 15.3 (OpenSUSE Leap), 2 (Openshift Service Mesh), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 15.4 (OpenSUSE Leap), 15 SP3 (SUSE Linux Enterprise High Performance Computing), 15 SP3 (Suse Linux Enterprise Server), 15 SP3 (SUSE Linux Enterprise Server for SAP Applications), 4.2 (SUSE Manager Proxy), 4.2 (SUSE Manager Server), 15 SP3 (Suse Linux Enterprise Desktop), 4 (Red Hat Openshift Data Foundation), 15 SP3 (SUSE Linux Enterprise Module for Development Tools), - (Red Hat OpenShift GitOps), 15 SP4 (Suse Linux Enterprise Server), 4 (Red Hat OpenShift Container Platform), 6 (Red Hat Satellite), 15 SP4 (Suse Linux Enterprise Desktop), 15 SP4 (SUSE Linux Enterprise Server for SAP Applications), 4.2 (SUSE Manager Retail Branch Server), 22.04 LTS (Ubuntu), 9 (Red Hat Enterprise Linux), 16.2 (Red Hat OpenStack Platform), 4.3 (SUSE Manager Retail Branch Server), 4.3 (SUSE Manager Proxy), 4.3 (SUSE Manager Server), 15 SP4 (SUSE Linux Enterprise High Performance Computing), 4.10 (Red Hat OpenShift Container Platform), 7.1 (SUSE Enterprise Storage), 15 SP4 (SUSE Linux Enterprise Module for Development Tools), - (Red Hat Web Terminal), - (Node Maintenance Operator), 1.0 (Application Interconnect), 37 (Fedora), 15 SP3-LTSS (Suse Linux Enterprise Server), 17.0 (Red Hat OpenStack Platform), 16.1 (Red Hat OpenStack Platform), 15 SP3-ESPOS (SUSE Linux Enterprise High Performance Computing), 15 SP3-LTSS (SUSE Linux Enterprise High Performance Computing), 15 SP3 (SUSE Linux Enterprise Real Time), 5 (Red Hat Ceph Storage), 38 (Fedora), 15 SP5 (SUSE Linux Enterprise Server for SAP Applications), 15 SP5 (Suse Linux Enterprise Server), 15 SP5 (Suse Linux Enterprise Desktop), - (Red Hat OpenShift on AWS), - (Migration Toolkit for Virtualization), 4 (Red Hat OpenShift Virtualization), - (OpenShift Serverless), 15 SP5 (SUSE Linux Enterprise High Performance Computing), 15 SP5 (SUSE Linux Enterprise Module for Development Tools), 2 (Red Hat Ansible Automation Platform), 18.04 ESM (Ubuntu), \u0434\u043e 1.18.2 (Go), 4.13 (Red Hat OpenShift Container Platform), 4.11 (Red Hat OpenShift Container Platform), - (Red Hat Developer Tools), 4.12 (Red Hat OpenShift Container Platform), 4.11 (OpenShift Developer Tools and Services for OCP), 3 (Red Hat Advanced Cluster Security), - (Red Hat OpenShift Dev Spaces), - (Self Node Remediation), 2.1 (Openshift Service Mesh), 5.4 (Logging subsystem for Red Hat OpenShift), - (Logging subsystem for Red Hat OpenShift), 9 (SUSE Liberty Linux), 8 (SUSE Liberty Linux), 6.14 for RHEL 8 (Red Hat Satellite), \u043e\u0442 1.19.0 \u0434\u043e 1.19.3 (Go), 1.1 for RHEL 8 (OpenShift API for Data Protection), 1.0 for RHEL 8 (OpenShift API for Data Protection), 1 on RHEL 8 (OpenShift Serverless), 1.1 for RHEL 8 (OpenShift Secondary Scheduler Operator), 2.7 for RHEL 8 (Red Hat Advanced Cluster Management for Kubernetes), 1.7 (Migration Toolkit for Containers), 2 (Red Hat OpenShift distributed tracing), \u0434\u043e 0.4.0 (http2), 4.9 (OpenShift Developer Tools and Services for OCP), 2.3 for RHEL 8 (Red Hat Ansible Automation Platform), 5.3 (Red Hat Ceph Storage), 2.3 for RHEL 8 (Openshift Service Mesh), 6 for RHEL 7 (Satellite Client), 6 for RHEL 8 (Satellite Client), 6 for RHEL 9 (Satellite Client)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Go:\nhttps://go-review.googlesource.com/c/net/+/455635\nhttps://go-review.googlesource.com/c/go/+/455717\nhttps://github.com/golang/go/issues/56350\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: \nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQGNAXK3YBPMUP3J4TECIRDHFGW37522/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUM4DIVOLJCBK5ZDP4LJOL24GXT3YSIR/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2022-41717\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2022-41717\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2022-41717.html\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/notices/USN-6038-2\nhttps://ubuntu.com/security/notices/USN-6038-1",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "06.12.2022",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.03.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "29.03.2024",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-02376",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-41717",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, OpenSUSE Leap, Debian GNU/Linux, Red Hat Ceph Storage, Red Hat Software Collections, openSUSE Tumbleweed, Red Hat Storage, Ubuntu, Red Hat Quay, Openshift Service Mesh, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), SUSE Linux Enterprise High Performance Computing, Suse Linux Enterprise Server, SUSE Linux Enterprise Server for SAP Applications, SUSE Manager Proxy, SUSE Manager Server, Suse Linux Enterprise Desktop, Red Hat Openshift Data Foundation, SUSE Linux Enterprise Module for Development Tools, Red Hat OpenShift GitOps, Red Hat OpenShift Container Platform, Red Hat Satellite, SUSE Manager Retail Branch Server, Red Hat OpenStack Platform, SUSE Enterprise Storage, Red Hat Web Terminal, Node Maintenance Operator, Application Interconnect, Fedora, SUSE Linux Enterprise Real Time, Red Hat OpenShift on AWS, Migration Toolkit for Virtualization, Red Hat OpenShift Virtualization, OpenShift Serverless, Red Hat Ansible Automation Platform, Go, Red Hat Developer Tools, OpenShift Developer Tools and Services for OCP, Red Hat Advanced Cluster Security, Red Hat OpenShift Dev Spaces, Self Node Remediation, Logging subsystem for Red Hat OpenShift, SUSE Liberty Linux, OpenShift API for Data Protection, OpenShift Secondary Scheduler Operator, Red Hat Advanced Cluster Management for Kubernetes, Migration Toolkit for Containers, Red Hat OpenShift distributed tracing, http2, Satellite Client",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3  (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751)",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u0430 http2 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Go, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0438\u043b\u0438 \u0434\u0440\u043e\u0441\u0441\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 (CWE-770)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u0430 http2 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Go \u0441\u0432\u044f\u0437\u0430\u043d\u0430 c \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://go-review.googlesource.com/c/net/+/455635\nhttps://go-review.googlesource.com/c/go/+/455717\nhttps://github.com/golang/go/issues/56350\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQGNAXK3YBPMUP3J4TECIRDHFGW37522/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUM4DIVOLJCBK5ZDP4LJOL24GXT3YSIR/\nhttps://security-tracker.debian.org/tracker/CVE-2022-41717\nhttps://access.redhat.com/security/cve/CVE-2022-41717\nhttps://www.suse.com/security/cve/CVE-2022-41717.html\nhttps://ubuntu.com/security/notices/USN-6038-2\nhttps://ubuntu.com/security/notices/USN-6038-1\nhttps://redos.red-soft.ru/support/secure/",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-770",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,3)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…