Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-58186

Опубликовано: 29 окт. 2025
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Assisted Installer for Red Hat OpenShift Container Platform 2rhai/assisted-installer-agent-rhel9Under investigation
Assisted Installer for Red Hat OpenShift Container Platform 2rhai/assisted-installer-controller-rhel9Under investigation
Assisted Installer for Red Hat OpenShift Container Platform 2rhai/assisted-installer-rhel9Under investigation
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-controller-rhel9Under investigation
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-git-cloner-rhel9Under investigation
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-image-bundler-rhel9Under investigation
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-image-processing-rhel9Under investigation
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-rhel9-operatorUnder investigation
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-shared-resource-rhel9Under investigation
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-shared-resource-webhook-rhel9Under investigation

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=2407250golang.org/net/http: Lack of limit when parsing cookies can cause memory exhaustion in net/http

EPSS

Процентиль: 8%
0.00028
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
5 месяцев назад

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

CVSS3: 5.3
nvd
5 месяцев назад

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

msrc
4 месяца назад

Lack of limit when parsing cookies can cause memory exhaustion in net/http

CVSS3: 5.3
debian
5 месяцев назад

Despite HTTP headers having a default limit of 1MB, the number of cook ...

CVSS3: 5.3
github
5 месяцев назад

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

EPSS

Процентиль: 8%
0.00028
Низкий

5.3 Medium

CVSS3