Search for packages
| purl | pkg:rpm/redhat/git-lfs@3.4.1-2?arch=el8_10 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4psv-cefc-7kad
Aliases: CVE-2024-24783 |
Multiple vulnerabilities have been discovered in Go, the worst of which could lead to information leakage or a denial of service. | There are no reported fixed by versions. |
|
VCID-aj2b-56uj-gkar
Aliases: CVE-2023-45288 GHSA-4v7x-pqxf-cx7m |
net/http, x/net/http2: close connections when receiving too many headers An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection. | There are no reported fixed by versions. |
|
VCID-djny-bnab-ykaw
Aliases: CVE-2023-45289 |
Multiple vulnerabilities have been discovered in Go, the worst of which could lead to information leakage or a denial of service. | There are no reported fixed by versions. |
|
VCID-wq29-hzz2-5beh
Aliases: CVE-2023-45290 |
Multiple vulnerabilities have been discovered in Go, the worst of which could lead to information leakage or a denial of service. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:49:19.393909+00:00 | RedHat Importer | Affected by | VCID-4psv-cefc-7kad | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24783.json | 38.0.0 |
| 2026-04-01T13:49:18.895078+00:00 | RedHat Importer | Affected by | VCID-djny-bnab-ykaw | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45289.json | 38.0.0 |
| 2026-04-01T13:49:18.673239+00:00 | RedHat Importer | Affected by | VCID-wq29-hzz2-5beh | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45290.json | 38.0.0 |
| 2026-04-01T13:48:30.216615+00:00 | RedHat Importer | Affected by | VCID-aj2b-56uj-gkar | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45288.json | 38.0.0 |