Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:1962

Опубликовано: 06 мая 2024
Источник: rocky
Оценка: Important

Описание

Important: go-toolset:rhel8 security update

Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Security Fix(es):

  • golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
delvex86_641.module+el8.9.0+1392+c9f6376adelve-1.20.2-1.module+el8.9.0+1392+c9f6376a.x86_64.rpm
golangx86_648.module+el8.9.0+1787+5672f315golang-1.20.12-8.module+el8.9.0+1787+5672f315.x86_64.rpm
golang-binx86_648.module+el8.9.0+1787+5672f315golang-bin-1.20.12-8.module+el8.9.0+1787+5672f315.x86_64.rpm
golang-docsnoarch8.module+el8.9.0+1787+5672f315golang-docs-1.20.12-8.module+el8.9.0+1787+5672f315.noarch.rpm
golang-docsnoarch8.module+el8.9.0+1787+5672f315golang-docs-1.20.12-8.module+el8.9.0+1787+5672f315.noarch.rpm
golang-miscnoarch8.module+el8.9.0+1787+5672f315golang-misc-1.20.12-8.module+el8.9.0+1787+5672f315.noarch.rpm
golang-miscnoarch8.module+el8.9.0+1787+5672f315golang-misc-1.20.12-8.module+el8.9.0+1787+5672f315.noarch.rpm
golang-srcnoarch8.module+el8.9.0+1787+5672f315golang-src-1.20.12-8.module+el8.9.0+1787+5672f315.noarch.rpm
golang-srcnoarch8.module+el8.9.0+1787+5672f315golang-src-1.20.12-8.module+el8.9.0+1787+5672f315.noarch.rpm
golang-testsnoarch8.module+el8.9.0+1787+5672f315golang-tests-1.20.12-8.module+el8.9.0+1787+5672f315.noarch.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 2 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
redhat
почти 2 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
nvd
почти 2 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 7.5
debian
почти 2 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of ...