[FREEBSD:CDB5E0E3-FAFC-11EE-9C21-901B0E9408DC] go -- http2: close connections when receiving too many headers

Severity High
Affected Packages 2
CVEs 1

The Go project reports:

  http2: close connections when receiving too many headers
  Maintaining HPACK state requires that we parse and
  process all HEADERS and CONTINUATION frames on a
  connection. When a request's headers exceed MaxHeaderBytes,
  we don't allocate memory to store the excess headers but we
  do parse them. This permits an attacker to cause an HTTP/2
  endpoint to read arbitrary amounts of header data, all
  associated with a request which is going to be
  rejected. These headers can include Huffman-encoded data
  which is significantly more expensive for the receiver to
  decode than for an attacker to send.
Package Affected Version
pkg:freebsd/go122 < 1.22.2
pkg:freebsd/go121 < 1.21.9
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:freebsd/go122 go122 < 1.22.2
Affected pkg:freebsd/go121 go121 < 1.21.9
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...