Vulnerability Report: GO-2022-0536
standard library- CVE-2019-9512, CVE-2019-9514, and 2 more
- Affects: net/http, golang.org/x/net
- Published: Aug 01, 2022
- Modified: May 20, 2024
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Affected Packages
-
PathGo VersionsSymbols
-
before go1.11.13, from go1.12.0-0 before go1.12.8
3 unexported affected symbols
- http2serverConn.scheduleFrameWrite
- http2serverConn.serve
- http2serverConn.writeFrame
-
before v0.0.0-20190813141303-74dc4d7220e7
Aliases
References
- https://go.dev/cl/190137
- https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
- https://go.dev/issue/33606
- https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
- https://vuln.go.dev/ID/GO-2022-0536.json
Credits
- Jonathan Looney of Netflix
Feedback
See anything missing or incorrect?
Suggest an edit to this report.