You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
mend-bolt-for-githubbot
changed the title
CVE-2022-41723 (High) detected in golang.org/x/net-v0.5.0
CVE-2022-41723 (High) detected in golang.org/x/net-v0.5.0 - autoclosed
Feb 20, 2023
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2022-41723 - High Severity Vulnerability
Vulnerable Library - golang.org/x/net-v0.5.0
Library home page: https://proxy.golang.org/golang.org/x/net/@v/v0.5.0.zip
Dependency Hierarchy:
Found in HEAD commit: 5a4bf3b8689bb9de6d428b0e8fb87ee4e14eba50
Found in base branch: main
Vulnerability Details
A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
Publish Date: 2022-09-29
URL: CVE-2022-41723
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://osv.dev/vulnerability/GO-2023-1568
Release Date: 2022-09-29
Fix Resolution: v0.7.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: