File tree 1 file changed +40
-0
lines changed
1 file changed +40
-0
lines changed Original file line number Diff line number Diff line change
1
+ packages :
2
+ - module : std
3
+ package : net/http
4
+ symbols :
5
+ - http2serverConn.serve
6
+ - http2serverConn.writeFrame
7
+ - http2serverConn.scheduleFrameWrite
8
+ versions :
9
+ - fixed : 1.11.13
10
+ - introduced : 1.12.0
11
+ fixed : 1.12.8
12
+ vulnerable_at : 1.12.7
13
+ - module : golang.org/x/net
14
+ package : golang.org/x/net/http
15
+ symbols :
16
+ - serverConn.serve
17
+ - serverConn.writeFrame
18
+ - serverConn.scheduleFrameWrite
19
+ versions :
20
+ - fixed : 0.0.0-20190813141303-74dc4d7220e7
21
+ description : |
22
+ Some HTTP/2 implementations are vulnerable to a reset flood, potentially
23
+ leading to a denial of service.
24
+
25
+ Servers that accept direct connections from untrusted clients could be
26
+ remotely made to allocate an unlimited amount of memory, until the program
27
+ crashes. The attacker opens a number of streams and sends an invalid request
28
+ over each stream that should solicit a stream of RST_STREAM frames from the
29
+ peer. Depending on how the peer queues the RST_STREAM frames, this can
30
+ consume excess memory, CPU, or both.
31
+ cves :
32
+ - CVE-2019-9512
33
+ - CVE-2019-9514
34
+ credit : Jonathan Looney of Netflix
35
+ links :
36
+ pr : https://go.dev/cl/190137
37
+ commit : https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
38
+ context :
39
+ - https://go.dev/issue/33606
40
+ - https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
You can’t perform that action at this time.
0 commit comments