VuXML ID | Description |
61bce714-ca0c-11ec-9cfc-10c37b4ac2ea | go -- multiple vulnerabilities
The Go project reports:
encoding/pem: fix stack overflow in Decode.
A large (more than 5 MB) PEM input can cause a stack
overflow in Decode, leading the program to crash.
crypto/elliptic: tolerate all oversized scalars in generic
P-256.
A crafted scalar input longer than 32 bytes can
cause P256().ScalarMult or P256().ScalarBaseMult to panic.
Indirect uses through crypto/ecdsa and crypto/tls are
unaffected. amd64, arm64, ppc64le, and s390x are
unaffected.
crypto/x509: non-compliant certificates can cause a panic
in Verify on macOS in Go 1.18.
Verifying certificate chains containing certificates
which are not compliant with RFC 5280 causes
Certificate.Verify to panic on macOS. These chains can be
delivered through TLS and can cause a crypto/tls or
net/http client to crash.
Discovery 2022-04-12 Entry 2022-05-02 go
< 1.18.1,1
go117
< 1.17.9
CVE-2022-24675
https://github.com/golang/go/issues/51853
CVE-2022-28327
https://github.com/golang/go/issues/52075
CVE-2022-27536
https://github.com/golang/go/issues/51759
|
720505fe-593f-11ec-9ba8-002324b2fba8 | go -- multiple vulnerabilities
The Go project reports:
net/http: limit growth of header canonicalization cache. An
attacker can cause unbounded memory growth in a Go server accepting
HTTP/2 requests.
syscall: donâÂÂt close fd 0 on ForkExec error. When a Go program
running on a Unix system is out of file descriptors and calls
syscall.ForkExec (including indirectly by using the os/exec
package), syscall.ForkExec can close file descriptor 0 as it fails.
If this happens (or can be provoked) repeatedly, it can result in
misdirected I/O such as writing network traffic intended for one
connection to a different connection, or content intended for one
file to a different one.
Discovery 2021-12-08 Entry 2021-12-09 go
< 1.17.5,1
CVE-2021-44716
https://github.com/golang/go/issues/50058
CVE-2021-44717
https://github.com/golang/go/issues/50057
|
e2af876f-a7c8-11ec-9a2a-002324b2fba8 | go -- multiple vulnerabilities
The Go project reports:
regexp: stack exhaustion compiling deeply nested expressions
On 64-bit platforms, an extremely deeply nested expression can
cause regexp.Compile to cause goroutine stack exhaustion, forcing
the program to exit. Note this applies to very large expressions, on
the order of 2MB.
Discovery 2022-02-09 Entry 2022-03-19 go
< 1.17.8,1
CVE-2022-24921
https://github.com/golang/go/issues/51112
|
a1360138-d446-11ec-8ea1-10c37b4ac2ea | go -- syscall.Faccessat checks wrong group on Linux
The Go project reports:
When called with a non-zero flags parameter, the
syscall.Faccessat function could incorrectly report that a
file is accessible. This bug only occurs on Linux systems.
Discovery 2022-04-12 Entry 2022-05-15 go
< 1.18.2,1
go117
< 1.17.10
CVE-2022-29526
https://github.com/golang/go/issues/52313
https://groups.google.com/g/golang-dev/c/CPU3TB6d4oY
|
4fce9635-28c0-11ec-9ba8-002324b2fba8 | go -- misc/wasm, cmd/link: do not let command line arguments overwrite global data
The Go project reports:
When invoking functions from WASM modules, built using GOARCH=wasm
GOOS=js, passing very large arguments can cause portions of the module
to be overwritten with data from the arguments.
If using wasm_exec.js to execute WASM modules, users will need to
replace their copy after rebuilding any modules.
Discovery 2021-10-06 Entry 2021-10-09 go
< 1.17.2,1
CVE-2021-38297
https://github.com/golang/go/issues/48797
|
930def19-3e05-11ec-9ba8-002324b2fba8 | go -- multiple vulnerabilities
The Go project reports:
debug/macho fails out when loading a file that contains a dynamic
symbol table command that indicates a larger number of symbols than
exist in the loaded symbol table.
Previously, opening a zip with (*Reader).Open could result in a
panic if the zip contained a file whose name was exclusively made up
of slash characters or ".." path elements. Open could also panic if
passed the empty string directly as an argument.
Discovery 2021-11-04 Entry 2021-11-05 go
< 1.17.3,1
CVE-2021-41771
https://github.com/golang/go/issues/48990
CVE-2021-41772
https://github.com/golang/go/issues/48085
|
096ab080-907c-11ec-bb14-002324b2fba8 | go -- multiple vulnerabilities
The Go project reports:
crypto/elliptic: fix IsOnCurve for big.Int values that are not
valid coordinates
Some big.Int values that are not valid field elements (negative or
overflowing) might cause Curve.IsOnCurve to incorrectly return true.
Operating on those values may cause a panic or an invalid curve
operation. Note that Unmarshal will never return such values.
math/big: prevent large memory consumption in Rat.SetString
An attacker can cause unbounded memory growth in a program using
(*Rat).SetString due to an unhandled overflow.
cmd/go: prevent branches from materializing into versions
A branch whose name resembles a version tag (such as "v1.0.0" or
"subdir/v2.0.0-dev") can be considered a valid version by the go
command. Materializing versions from branches might be unexpected
and bypass ACLs that limit the creation of tags but not branches.
Discovery 2022-02-10 Entry 2022-02-18 go
< 1.17.7,1
CVE-2022-23806
https://github.com/golang/go/issues/50974
CVE-2022-23772
https://github.com/golang/go/issues/50699
CVE-2022-23773
https://github.com/golang/go/issues/35671
|