-
Notifications
You must be signed in to change notification settings - Fork 64
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Aliases: CVE-2022-41717 Updates #1144 Change-Id: I7ac8c7020a91486cea5dbf5895f7566b6cd94919 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/456057 Reviewed-by: Tatiana Bradley <tatiana@golang.org> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Damien Neil <dneil@google.com> Run-TryBot: Tatiana Bradley <tatiana@golang.org>
- Loading branch information
Showing
3 changed files
with
294 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,131 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.0", | ||
"cveMetadata": { | ||
"cveId": "CVE-2022-41717" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc" | ||
}, | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection." | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "Go standard library", | ||
"product": "net/http", | ||
"collectionURL": "https://pkg.go.dev", | ||
"packageName": "net/http", | ||
"versions": [ | ||
{ | ||
"version": "0", | ||
"lessThan": "1.18.9", | ||
"status": "affected", | ||
"versionType": "semver" | ||
}, | ||
{ | ||
"version": "1.19.0", | ||
"lessThan": "1.19.4", | ||
"status": "affected", | ||
"versionType": "semver" | ||
} | ||
], | ||
"programRoutines": [ | ||
{ | ||
"name": "http2serverConn.canonicalHeader" | ||
}, | ||
{ | ||
"name": "ListenAndServe" | ||
}, | ||
{ | ||
"name": "ListenAndServeTLS" | ||
}, | ||
{ | ||
"name": "Serve" | ||
}, | ||
{ | ||
"name": "ServeTLS" | ||
}, | ||
{ | ||
"name": "Server.ListenAndServe" | ||
}, | ||
{ | ||
"name": "Server.ListenAndServeTLS" | ||
}, | ||
{ | ||
"name": "Server.Serve" | ||
}, | ||
{ | ||
"name": "Server.ServeTLS" | ||
}, | ||
{ | ||
"name": "http2Server.ServeConn" | ||
} | ||
], | ||
"defaultStatus": "unaffected" | ||
}, | ||
{ | ||
"vendor": "golang.org/x/net", | ||
"product": "golang.org/x/net/http2", | ||
"collectionURL": "https://pkg.go.dev", | ||
"packageName": "golang.org/x/net/http2", | ||
"versions": [ | ||
{ | ||
"version": "0", | ||
"lessThan": "0.4.0", | ||
"status": "affected", | ||
"versionType": "semver" | ||
} | ||
], | ||
"programRoutines": [ | ||
{ | ||
"name": "serverConn.canonicalHeader" | ||
}, | ||
{ | ||
"name": "Server.ServeConn" | ||
} | ||
], | ||
"defaultStatus": "unaffected" | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"description": "CWE 400: Uncontrolled Resource Consumption" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://go.dev/issue/56350" | ||
}, | ||
{ | ||
"url": "https://go.dev/cl/455717" | ||
}, | ||
{ | ||
"url": "https://go.dev/cl/455635" | ||
}, | ||
{ | ||
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ" | ||
}, | ||
{ | ||
"url": "https://pkg.go.dev/vuln/GO-2022-1144" | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"value": "Josselin Costanzi" | ||
} | ||
] | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,115 @@ | ||
{ | ||
"schema_version": "1.3.1", | ||
"id": "GO-2022-1144", | ||
"published": "0001-01-01T00:00:00Z", | ||
"modified": "0001-01-01T00:00:00Z", | ||
"aliases": [ | ||
"CVE-2022-41717" | ||
], | ||
"details": "An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests.\n\nHTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", | ||
"affected": [ | ||
{ | ||
"package": { | ||
"name": "stdlib", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"fixed": "1.18.9" | ||
}, | ||
{ | ||
"introduced": "1.19.0" | ||
}, | ||
{ | ||
"fixed": "1.19.4" | ||
} | ||
] | ||
} | ||
], | ||
"database_specific": { | ||
"url": "https://pkg.go.dev/vuln/GO-2022-1144" | ||
}, | ||
"ecosystem_specific": { | ||
"imports": [ | ||
{ | ||
"path": "net/http", | ||
"symbols": [ | ||
"ListenAndServe", | ||
"ListenAndServeTLS", | ||
"Serve", | ||
"ServeTLS", | ||
"Server.ListenAndServe", | ||
"Server.ListenAndServeTLS", | ||
"Server.Serve", | ||
"Server.ServeTLS", | ||
"http2Server.ServeConn", | ||
"http2serverConn.canonicalHeader" | ||
] | ||
} | ||
] | ||
} | ||
}, | ||
{ | ||
"package": { | ||
"name": "golang.org/x/net", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"fixed": "0.4.0" | ||
} | ||
] | ||
} | ||
], | ||
"database_specific": { | ||
"url": "https://pkg.go.dev/vuln/GO-2022-1144" | ||
}, | ||
"ecosystem_specific": { | ||
"imports": [ | ||
{ | ||
"path": "golang.org/x/net/http2", | ||
"symbols": [ | ||
"Server.ServeConn", | ||
"serverConn.canonicalHeader" | ||
] | ||
} | ||
] | ||
} | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "REPORT", | ||
"url": "https://go.dev/issue/56350" | ||
}, | ||
{ | ||
"type": "FIX", | ||
"url": "https://go.dev/cl/455717" | ||
}, | ||
{ | ||
"type": "FIX", | ||
"url": "https://go.dev/cl/455635" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ" | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"name": "Josselin Costanzi" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
modules: | ||
- module: std | ||
versions: | ||
- fixed: 1.18.9 | ||
- introduced: 1.19.0 | ||
fixed: 1.19.4 | ||
vulnerable_at: 1.19.3 | ||
packages: | ||
- package: net/http | ||
symbols: | ||
- http2serverConn.canonicalHeader | ||
derived_symbols: | ||
- ListenAndServe | ||
- ListenAndServeTLS | ||
- Serve | ||
- ServeTLS | ||
- Server.ListenAndServe | ||
- Server.ListenAndServeTLS | ||
- Server.Serve | ||
- Server.ServeTLS | ||
- http2Server.ServeConn | ||
- module: golang.org/x/net | ||
versions: | ||
- fixed: 0.4.0 | ||
vulnerable_at: 0.3.0 | ||
packages: | ||
- package: golang.org/x/net/http2 | ||
symbols: | ||
- serverConn.canonicalHeader | ||
derived_symbols: | ||
- Server.ServeConn | ||
description: | | ||
An attacker can cause excessive memory growth in a Go server accepting | ||
HTTP/2 requests. | ||
HTTP/2 server connections contain a cache of HTTP header keys sent by the | ||
client. While the total number of entries in this cache is capped, an | ||
attacker sending very large keys can cause the server to allocate | ||
approximately 64 MiB per open connection. | ||
credit: Josselin Costanzi | ||
references: | ||
- report: https://go.dev/issue/56350 | ||
- fix: https://go.dev/cl/455717 | ||
- fix: https://go.dev/cl/455635 | ||
- web: https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ | ||
cve_metadata: | ||
id: CVE-2022-41717 | ||
cwe: 'CWE 400: Uncontrolled Resource Consumption' |