diff options
author | Ashish SHUKLA <ashish@FreeBSD.org> | 2024-04-15 07:55:09 +0000 |
---|---|---|
committer | Ashish SHUKLA <ashish@FreeBSD.org> | 2024-04-15 08:20:02 +0000 |
commit | 5d3ca8689dec53ee7ced0bcaf2ed2715f25c957b (patch) | |
tree | 5dfcdcc36d6e84af35b6440ea94758dfd0cf7f0f | |
parent | 3ce9043269aa2447d728995e00a331f6efeeef31 (diff) | |
download | ports-5d3ca8689dec53ee7ced0bcaf2ed2715f25c957b.tar.gz ports-5d3ca8689dec53ee7ced0bcaf2ed2715f25c957b.zip |
security/vuxml: Document go language vulnerabilities
-rw-r--r-- | security/vuxml/vuln/2024.xml | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index fce127179d44..3998dd2adcff 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,43 @@ + <vuln vid="cdb5e0e3-fafc-11ee-9c21-901b0e9408dc"> + <topic>go -- http2: close connections when receiving too many headers</topic> + <affects> + <package> + <name>go122</name> + <range><lt>1.22.2</lt></range> + </package> + <package> + <name>go121</name> + <range><lt>1.21.9</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Go project reports:</p> + <blockquote cite="https://go.dev/issue/65051"> + <p>http2: close connections when receiving too many headers</p> + <p>Maintaining HPACK state requires that we parse and + process all HEADERS and CONTINUATION frames on a + connection. When a request's headers exceed MaxHeaderBytes, + we don't allocate memory to store the excess headers but we + do parse them. This permits an attacker to cause an HTTP/2 + endpoint to read arbitrary amounts of header data, all + associated with a request which is going to be + rejected. These headers can include Huffman-encoded data + which is significantly more expensive for the receiver to + decode than for an attacker to send.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2023-45288</cvename> + <url>https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M/m/khALNYGdAAAJ</url> + </references> + <dates> + <discovery>2024-04-03</discovery> + <entry>2024-04-15</entry> + </dates> + </vuln> + <vuln vid="7314942b-0889-46f0-b02b-2c60aabe4a82"> <topic>chromium -- multiple security fixes</topic> <affects> |