Skip to content

x/vulndb: potential Go vuln in std: CVE-2019-9512, CVE-2019-9514 #536

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
tatianab opened this issue Jul 29, 2022 · 2 comments
Closed

x/vulndb: potential Go vuln in std: CVE-2019-9512, CVE-2019-9514 #536

tatianab opened this issue Jul 29, 2022 · 2 comments

Comments

@tatianab
Copy link
Contributor

Description

net/http: Denial of Service vulnerabilities in the HTTP/2 implementation

net/http and golang.org/x/net/http2 servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. Servers will now close connections if the send queue accumulates too many control messages.

Affected Modules, Packages, Versions and Symbols

Module: std
Package: net/http
Versions:
  - Fixed: 1.11.13
  - Introduced: 1.12.0
  - Fixed: 1.12.8

Module: golang.org/x/net/http2
Versions:
  - Fixed: v0.0.0-20190813141303-74dc4d7220e7

Does this vulnerability already have an associated CVE ID?

Yes

CVE ID

CVE-2019-9512, CVE-2019-9514

Credit

Jonathan Looney from Netflix

CWE ID

No response

Pull Request

https://go-review.googlesource.com/c/go/+/190137

Commit

https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5

References

Additional information

No response

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/420656 mentions this issue: x/vulndb: add reports/GO-2022-0536.yaml for CVE-2019-9512, CVE-2019-9514

@tatianab
Copy link
Contributor Author

Review for appropriate use of alias vs related

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants