从这个网页截图中,可以获取到以下关于漏洞的关键信息: 1. 漏洞编号:RHSA-2024:9960 2. 发布日期:2024年11月19日 3. 更新日期:2024年11月19日 4. 类型/严重性:安全公告,重要 5. 受影响的产品: - OpenShift API for Data Protection 1 for RHEL 9 x86_64 - OpenShift API for Data Protection for ARM 64 1 for RHEL 9 aarch64 - OpenShift API for Data Protection for IBM Power, little endian 1 for RHEL 9 ppc64le - OpenShift API for Data Protection for IBM Z and LinuxONE 1 for RHEL 9 s390x 6. 修复的漏洞: - BZ-2274767:golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) - BZ-2295310:net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) - BZ-2310527:go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155) - BZ-2310528:encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) - BZ-2310529:go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158) 7. CVE编号: - CVE-2023-27349 - CVE-2023-37920 - CVE-2023-44431 - CVE-2023-45866 - CVE-2023-50229 - CVE-2023-50230 - CVE-2023-51580 - CVE-2023-51589 - CVE-2023-51592 - CVE-2023-51594 - CVE-2023-51596 - CVE-2024-2236 - CVE-2024-2511 - CVE-2024-3596 - CVE-2024-3727 - CVE-2024-4603 - CVE-2024-4741 - CVE-2024-5535 - CVE-2024-6232 - CVE-2024-6239 - CVE-2024-6501 - CVE-2024-6655 - CVE-2024-24791 - CVE-2024-29510 - CVE-2024-33869 - CVE-2024-33870 - CVE-2024-34155 - CVE-2024-34156 - CVE-2024-34158 - CVE-2024-34397 - CVE-2024-40866 - CVE-2024-42472 - CVE-2024-44185 - CVE-2024-44187 - CVE-2024-44244 - CVE-2024-44296 - CVE-2024-47175 - CVE-2024-50602 - CVE-2024-52530 - CVE-2024-52532 这些信息可以帮助用户了解漏洞的详细情况、受影响的产品和修复的漏洞,以便采取相应的安全措施。