aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAshish SHUKLA <ashish@FreeBSD.org>2024-04-15 07:55:09 +0000
committerAshish SHUKLA <ashish@FreeBSD.org>2024-04-15 08:20:02 +0000
commit5d3ca8689dec53ee7ced0bcaf2ed2715f25c957b (patch)
tree5dfcdcc36d6e84af35b6440ea94758dfd0cf7f0f
parent3ce9043269aa2447d728995e00a331f6efeeef31 (diff)
downloadports-5d3ca8689dec53ee7ced0bcaf2ed2715f25c957b.tar.gz
ports-5d3ca8689dec53ee7ced0bcaf2ed2715f25c957b.zip
security/vuxml: Document go language vulnerabilities
-rw-r--r--security/vuxml/vuln/2024.xml40
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index fce127179d44..3998dd2adcff 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -1,3 +1,43 @@
+ <vuln vid="cdb5e0e3-fafc-11ee-9c21-901b0e9408dc">
+ <topic>go -- http2: close connections when receiving too many headers</topic>
+ <affects>
+ <package>
+ <name>go122</name>
+ <range><lt>1.22.2</lt></range>
+ </package>
+ <package>
+ <name>go121</name>
+ <range><lt>1.21.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Go project reports:</p>
+ <blockquote cite="https://go.dev/issue/65051">
+ <p>http2: close connections when receiving too many headers</p>
+ <p>Maintaining HPACK state requires that we parse and
+ process all HEADERS and CONTINUATION frames on a
+ connection. When a request's headers exceed MaxHeaderBytes,
+ we don't allocate memory to store the excess headers but we
+ do parse them. This permits an attacker to cause an HTTP/2
+ endpoint to read arbitrary amounts of header data, all
+ associated with a request which is going to be
+ rejected. These headers can include Huffman-encoded data
+ which is significantly more expensive for the receiver to
+ decode than for an attacker to send.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2023-45288</cvename>
+ <url>https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M/m/khALNYGdAAAJ</url>
+ </references>
+ <dates>
+ <discovery>2024-04-03</discovery>
+ <entry>2024-04-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7314942b-0889-46f0-b02b-2c60aabe4a82">
<topic>chromium -- multiple security fixes</topic>
<affects>