7.5 CVE-2022-41723

Enriched by CISA Patch
 

A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
https://nvd.nist.gov/vuln/detail/CVE-2022-41723

Categories

CWE-NVD-Other

References

af854a3a-2127-422b-91ae-364da2661108 Patch

https://go.dev/cl/468135
Patch
https://go.dev/cl/468295
Patch
https://go.dev/issue/57855
Issue Tracking
https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
Mailing List Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
Third Party Advisory
https://pkg.go.dev/vuln/GO-2023-1571
Vendor Advisory
https://security.gentoo.org/glsa/202311-09
https://security.netapp.com/advisory/ntap-20230331-0010/
https://www.couchbase.com/alerts/

security@golang.org Patch

https://go.dev/cl/468135
Patch
https://go.dev/cl/468295
Patch
https://go.dev/issue/57855
Issue Tracking
https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
Mailing List Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
Third Party Advisory
https://pkg.go.dev/vuln/GO-2023-1571
Vendor Advisory
https://security.gentoo.org/glsa/202311-09
https://www.couchbase.com/alerts/


 

AFFECTED (from MITRE)


Vendor Product Versions
Go standard library net/http
  • < 1.19.6 [affected]
  • 1.20.0-0 < 1.20.1 [affected]
golang.org/x/net golang.org/x/net/http2
  • < 0.7.0 [affected]
golang.org/x/net golang.org/x/net/http2/hpack
  • < 0.7.0 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* < 1.19.6
cpe:2.3:a:golang:go:1.20.0:-:*:*:*:*:*:*
cpe:2.3:a:golang:hpack:*:*:*:*:*:go:*:* < 0.7.0
cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:* < 0.7.0


REMEDIATION


Patch

Url
https://go.dev/cl/468135
https://go.dev/cl/468295
https://go.dev/cl/468135
https://go.dev/cl/468295


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry