[FEDORA-2024-d652859efb] Fedora 38: golang-gvisor
Severity
Critical
Affected Packages
1
CVEs
7
Update golang-gvisor to 20240408.0
Package | Affected Version |
---|---|
pkg:rpm/fedora/golang-gvisor?distro=fedora-38 | < 20240408.0.1.20240418git9e5a99b.fc38 |
- ID
- FEDORA-2024-d652859efb
- Severity
- critical
- Severity from
- CVE-2022-1996
- URL
- https://bodhi.fedoraproject.org/updates/FEDORA-2024-d652859efb
- Published
-
2024-04-28T03:29:21
(4 months ago) - Modified
-
2024-04-28T03:29:21
(4 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1635
- ALAS-2023-1825
- ALAS-2023-1871
- ALAS-2024-1920
- ALAS2-2022-1807
- ALAS2-2022-1830
- ALAS2-2022-1846
- ALAS2-2022-1847
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALAS2-2023-2238
- ALAS2-2023-2313
- ALAS2-2023-2324
- ALAS2-2023-2325
- ALAS2-2023-2326
- ALAS2-2023-2339
- ALAS2-2024-2424
- ALAS2-2024-2458
- ALPINE:CVE-2022-1996
- ALPINE:CVE-2022-24675
- ALPINE:CVE-2022-27191
- ALPINE:CVE-2022-28327
- ALPINE:CVE-2022-29526
- ALPINE:CVE-2022-30629
- ALPINE:CVE-2023-39325
- ALSA-2022:7469
- ALSA-2022:7954
- ALSA-2022:8008
- ALSA-2023:2253
- ALSA-2023:2282
- ALSA-2023:2283
- ALSA-2023:2367
- ALSA-2023:2758
- ALSA-2023:5721
- ALSA-2023:5738
- ALSA-2023:5863
- ALSA-2023:5867
- ALSA-2023:6077
- ELSA-2022-14844
- ELSA-2022-17956
- ELSA-2022-5337
- ELSA-2022-7457
- ELSA-2022-7469
- ELSA-2022-7954
- ELSA-2022-8008
- ELSA-2023-13028
- ELSA-2023-13029
- ELSA-2023-13053
- ELSA-2023-13054
- ELSA-2023-2253
- ELSA-2023-2282
- ELSA-2023-2283
- ELSA-2023-2367
- ELSA-2023-2758
- ELSA-2023-5721
- ELSA-2023-5738
- ELSA-2023-5863
- ELSA-2023-5867
- FEDORA-2022-08ae2dd481
- FEDORA-2022-13ad572b5a
- FEDORA-2022-14712f9699
- FEDORA-2022-185697ef56
- FEDORA-2022-30c5ed5625
- FEDORA-2022-3969b64d4b
- FEDORA-2022-3a63897745
- FEDORA-2022-3e1ade35db
- FEDORA-2022-4a48180f3f
- FEDORA-2022-4b5537c44c
- FEDORA-2022-5038c3236c
- FEDORA-2022-53e0f427dd
- FEDORA-2022-53f0c619c5
- FEDORA-2022-589a0ad690
- FEDORA-2022-5cbd6de569
- FEDORA-2022-5e637f6cc6
- FEDORA-2022-5ef0bd9a27
- FEDORA-2022-6716cd0da2
- FEDORA-2022-739c7a0058
- FEDORA-2022-741325e9a0
- FEDORA-2022-8bf5635efc
- FEDORA-2022-9986fbb3d7
- FEDORA-2022-9a9a638d09
- FEDORA-2022-a49babed75
- FEDORA-2022-a4c9009f3e
- FEDORA-2022-b0bd0219ff
- FEDORA-2022-ba365d3703
- FEDORA-2022-c0f780ecf1
- FEDORA-2022-c87047f163
- FEDORA-2022-d37fb34309
- FEDORA-2022-e46e6e8317
- FEDORA-2022-e674d52438
- FEDORA-2022-ea8f4e232d
- FEDORA-2022-fae3ecee19
- FEDORA-2022-ffe7dba2cb
- FEDORA-2023-0d46257314
- FEDORA-2023-257f33c602
- FEDORA-2023-327346caa5
- FEDORA-2023-3a895ff65c
- FEDORA-2023-4bf641255e
- FEDORA-2023-4e2068ba5d
- FEDORA-2023-5029b92850
- FEDORA-2023-548163deb1
- FEDORA-2023-6550d9323b
- FEDORA-2023-66966ae3d0
- FEDORA-2023-6f4c5b6331
- FEDORA-2023-822aab0a5a
- FEDORA-2023-a5a5542890
- FEDORA-2023-b43faebc9f
- FEDORA-2023-b60ff8c9ec
- FEDORA-2023-b75ee820ce
- FEDORA-2023-c858d2c53b
- FEDORA-2023-c9b2182a4e
- FEDORA-2023-d58c8eeb7c
- FEDORA-2023-e359fd31d2
- FEDORA-2023-e3e4e3f51a
- FEDORA-2023-e8c27ba884
- FEDORA-2023-fa2d7b25d9
- FEDORA-2023-fa2ec3d3e0
- FEDORA-2023-fe53e13b5b
- FEDORA-2024-07c811c7a5
- FEDORA-2024-0ac454dafc
- FEDORA-2024-0d4d9925a2
- FEDORA-2024-35c28f59d1
- FEDORA-2024-5d8e87ec66
- FEDORA-2024-80e062d21a
- FEDORA-2024-9cc0e0c63e
- FEDORA-2024-ae653fb07b
- FEDORA-2024-b85b97c0e9
- FEDORA-2024-c3e32c5635
- FEDORA-2024-cafa04a149
- FEDORA-2024-f99ecead66
- FEDORA-2024-fb32950d11
- FEDORA-2024-fd3545a844
- FREEBSD:15888C7E-E659-11EC-B7FE-10C37B4AC2EA
- FREEBSD:61BCE714-CA0C-11EC-9CFC-10C37B4AC2EA
- FREEBSD:7A1B2624-6A89-11EE-AF06-5404A68AD561
- FREEBSD:A1360138-D446-11EC-8EA1-10C37B4AC2EA
- GLSA-202208-02
- GLSA-202311-09
- GO-2021-0356
- GO-2022-0433
- GO-2022-0435
- GO-2022-0493
- GO-2022-0531
- GO-2022-0619
- GO-2023-2102
- MS:CVE-2022-24675
- MS:CVE-2022-28327
- MS:CVE-2022-29526
- MS:CVE-2022-30629
- openSUSE-SU-2023:0360-1
- RHSA-2022:5337
- RHSA-2022:5775
- RHSA-2022:5799
- RHSA-2022:7457
- RHSA-2022:7469
- RHSA-2022:7954
- RHSA-2022:8008
- RHSA-2023:2253
- RHSA-2023:2282
- RHSA-2023:2283
- RHSA-2023:2367
- RHSA-2023:2758
- RHSA-2023:5721
- RHSA-2023:5738
- RHSA-2023:5835
- RHSA-2023:5863
- RHSA-2023:5867
- RHSA-2023:6077
- RLSA-2022:5337
- RLSA-2022:7457
- RLSA-2022:7469
- RLSA-2023:5863
- RLSA-2023:6077
- SUSE-SU-2022:1410-1
- SUSE-SU-2022:1411-1
- SUSE-SU-2022:1507-1
- SUSE-SU-2022:1689-1
- SUSE-SU-2022:1829-1
- SUSE-SU-2022:1862-1
- SUSE-SU-2022:2004-1
- SUSE-SU-2022:2005-1
- SUSE-SU-2022:2834-1
- SUSE-SU-2022:2839-1
- SUSE-SU-2022:2839-2
- SUSE-SU-2022:3321-1
- SUSE-SU-2022:3333-1
- SUSE-SU-2022:3334-1
- SUSE-SU-2022:3335-1
- SUSE-SU-2022:3666-1
- SUSE-SU-2022:4409-1
- SUSE-SU-2022:4463-1
- SUSE-SU-2022:4606-1
- SUSE-SU-2023:2183-1
- SUSE-SU-2023:2185-1
- SUSE-SU-2023:2187-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2023:4068-1
- SUSE-SU-2023:4069-1
- SUSE-SU-2023:4469-1
- SUSE-SU-2023:4472-1
- SUSE-SU-2023:4727-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0799-1
- SUSE-SU-2024:3094-1
- SUSE-SU-2024:3097-1
- SUSE-SU-2024:3098-1
- SUSE-SU-2024:3221-1
- USN-6038-1
- USN-6038-2
- USN-6574-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2248209 | Bug #2248209 - golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-39325) | https://bugzilla.redhat.com/show_bug.cgi?id=2248209 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/fedora/golang-gvisor?distro=fedora-38 | fedora | golang-gvisor | < 20240408.0.1.20240418git9e5a99b.fc38 | fedora-38 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |