从这个网页截图中,可以获取到以下关于漏洞的关键信息: 1. 漏洞编号:RHSA-2024:8044 2. 发布日期:2024-10-14 3. 类型/严重性:安全公告,重要 4. 受影响的产品: - Red Hat Enterprise Linux for x86_64 9 x86_64 - Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 - Red Hat Enterprise Linux Server - AUS 9.4 x86_64 - Red Hat Enterprise Linux for IBM z Systems 9 s390x - Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x - Red Hat Enterprise Linux for Power, little endian 9 ppc64le - Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le - Red Hat Enterprise Linux for ARM 64 9 aarch64 - Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 - Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le - Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 - Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64 - Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x 5. 安全修复: - go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155) - encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) - go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158) - Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (CVE-2024-9341) 6. 解决方案:请参阅 https://access.redhat.com/articles/11258。 7. 参考链接: - https://access.redhat.com/security/updates/classification/#important 这些信息可以帮助用户了解漏洞的详细情况、受影响的产品范围以及如何应用修复措施。