vulndb/data/osv/GO-2022-0536.json

109 строки
2.7 KiB
JSON

{
"id": "GO-2022-0536",
"published": "2022-08-01T22:20:53Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2019-9512",
"CVE-2019-9514"
],
"details": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially\nleading to a denial of service.\n\nServers that accept direct connections from untrusted clients could be\nremotely made to allocate an unlimited amount of memory, until the program\ncrashes. The attacker opens a number of streams and sends an invalid request\nover each stream that should solicit a stream of RST_STREAM frames from the\npeer. Depending on how the peer queues the RST_STREAM frames, this can\nconsume excess memory, CPU, or both.\n",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.11.13"
},
{
"introduced": "1.12.0"
},
{
"fixed": "1.12.8"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0536"
},
"ecosystem_specific": {
"imports": [
{
"path": "net/http",
"symbols": [
"http2serverConn.scheduleFrameWrite",
"http2serverConn.serve",
"http2serverConn.writeFrame"
]
}
]
}
},
{
"package": {
"name": "golang.org/x/net",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20190813141303-74dc4d7220e7"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0536"
},
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/net/http",
"symbols": [
"serverConn.scheduleFrameWrite",
"serverConn.serve",
"serverConn.writeFrame"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/190137"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/33606"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ"
}
],
"credits": [
{
"name": "Jonathan Looney of Netflix"
}
]
}