Skip to content

Commit

Permalink
data/reports: add GO-2023-1571.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2022-41723

Updates #1571

Change-Id: Iec81cb886f5e67d37f5b484f59e257431bde4690
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/468900
Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Run-TryBot: Tatiana Bradley <tatianabradley@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
  • Loading branch information
tatianab committed Feb 16, 2023
1 parent ba36369 commit bbfff9b
Show file tree
Hide file tree
Showing 3 changed files with 263 additions and 0 deletions.
120 changes: 120 additions & 0 deletions data/cve/v5/GO-2023-1571.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,120 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41723"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http",
"versions": [
{
"version": "0",
"lessThan": "1.19.6",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0",
"lessThan": "1.20.1",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "golang.org/x/net",
"product": "golang.org/x/net/http2",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/net/http2",
"versions": [
{
"version": "0",
"lessThan": "0.7.0",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "golang.org/x/net",
"product": "golang.org/x/net/http2/hpack",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/net/http2/hpack",
"versions": [
{
"version": "0",
"lessThan": "0.7.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Decoder.parseFieldLiteral"
},
{
"name": "Decoder.readString"
},
{
"name": "Decoder.DecodeFull"
},
{
"name": "Decoder.Write"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/57855"
},
{
"url": "https://go.dev/cl/468135"
},
{
"url": "https://go.dev/cl/468295"
},
{
"url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1571"
}
],
"credits": [
{
"lang": "en",
"value": "Philippe Antoine (Catena cyber)"
}
]
}
}
}
108 changes: 108 additions & 0 deletions data/osv/GO-2023-1571.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,108 @@
{
"id": "GO-2023-1571",
"published": "0001-01-01T00:00:00Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-41723"
],
"details": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.19.6"
},
{
"introduced": "1.20.0"
},
{
"fixed": "1.20.1"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1571"
},
"ecosystem_specific": {
"imports": [
{
"path": "net/http"
}
]
}
},
{
"package": {
"name": "golang.org/x/net",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.7.0"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1571"
},
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/net/http2"
},
{
"path": "golang.org/x/net/http2/hpack",
"symbols": [
"Decoder.DecodeFull",
"Decoder.Write",
"Decoder.parseFieldLiteral",
"Decoder.readString"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/57855"
},
{
"type": "FIX",
"url": "https://go.dev/cl/468135"
},
{
"type": "FIX",
"url": "https://go.dev/cl/468295"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
}
],
"credits": [
{
"name": "Philippe Antoine (Catena cyber)"
}
],
"schema_version": "1.3.1"
}
35 changes: 35 additions & 0 deletions data/reports/GO-2023-1571.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
modules:
- module: std
versions:
- fixed: 1.19.6
- introduced: 1.20.0
fixed: 1.20.1
vulnerable_at: 1.20.0
packages:
- package: net/http
- module: golang.org/x/net
versions:
- fixed: 0.7.0
vulnerable_at: 0.6.1-0.20230213185550-547e7edf3873
packages:
- package: golang.org/x/net/http2
- package: golang.org/x/net/http2/hpack
symbols:
- Decoder.parseFieldLiteral
- Decoder.readString
derived_symbols:
- Decoder.DecodeFull
- Decoder.Write
description: |
A maliciously crafted HTTP/2 stream could cause excessive CPU consumption
in the HPACK decoder, sufficient to cause a denial of service from a small
number of small requests.
credit: Philippe Antoine (Catena cyber)
references:
- report: https://go.dev/issue/57855
- fix: https://go.dev/cl/468135
- fix: https://go.dev/cl/468295
- web: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
cve_metadata:
id: CVE-2022-41723
cwe: 'CWE 400: Uncontrolled Resource Consumption'

0 comments on commit bbfff9b

Please sign in to comment.