Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-45288

Summary
Assigner-Go
Assigner Org ID-1bb62c36-49e3-4200-9d77-64a1400537cc
Published At-04 Apr, 2024 | 20:37
Updated At-04 Nov, 2025 | 18:17
Rejected At-
Credits

HTTP/2 CONTINUATION flood in net/http

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Go
Assigner Org ID:1bb62c36-49e3-4200-9d77-64a1400537cc
Published At:04 Apr, 2024 | 20:37
Updated At:04 Nov, 2025 | 18:17
Rejected At:
â–¼CVE Numbering Authority (CNA)
HTTP/2 CONTINUATION flood in net/http

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

Affected Products
Vendor
Go standard library
Product
net/http
Collection URL
https://pkg.go.dev
Package Name
net/http
Program Routines
  • http2Framer.readMetaFrame
  • CanonicalHeaderKey
  • Client.CloseIdleConnections
  • Client.Do
  • Client.Get
  • Client.Head
  • Client.Post
  • Client.PostForm
  • Cookie.String
  • Cookie.Valid
  • Dir.Open
  • Error
  • Get
  • HandlerFunc.ServeHTTP
  • Head
  • Header.Add
  • Header.Del
  • Header.Get
  • Header.Set
  • Header.Values
  • Header.Write
  • Header.WriteSubset
  • ListenAndServe
  • ListenAndServeTLS
  • NewRequest
  • NewRequestWithContext
  • NotFound
  • ParseTime
  • Post
  • PostForm
  • ProxyFromEnvironment
  • ReadRequest
  • ReadResponse
  • Redirect
  • Request.AddCookie
  • Request.BasicAuth
  • Request.FormFile
  • Request.FormValue
  • Request.MultipartReader
  • Request.ParseForm
  • Request.ParseMultipartForm
  • Request.PostFormValue
  • Request.Referer
  • Request.SetBasicAuth
  • Request.UserAgent
  • Request.Write
  • Request.WriteProxy
  • Response.Cookies
  • Response.Location
  • Response.Write
  • ResponseController.EnableFullDuplex
  • ResponseController.Flush
  • ResponseController.Hijack
  • ResponseController.SetReadDeadline
  • ResponseController.SetWriteDeadline
  • Serve
  • ServeContent
  • ServeFile
  • ServeMux.ServeHTTP
  • ServeTLS
  • Server.Close
  • Server.ListenAndServe
  • Server.ListenAndServeTLS
  • Server.Serve
  • Server.ServeTLS
  • Server.SetKeepAlivesEnabled
  • Server.Shutdown
  • SetCookie
  • Transport.CancelRequest
  • Transport.Clone
  • Transport.CloseIdleConnections
  • Transport.RoundTrip
  • body.Close
  • body.Read
  • bodyEOFSignal.Close
  • bodyEOFSignal.Read
  • bodyLocked.Read
  • bufioFlushWriter.Write
  • cancelTimerBody.Close
  • cancelTimerBody.Read
  • checkConnErrorWriter.Write
  • chunkWriter.Write
  • connReader.Read
  • connectMethodKey.String
  • expectContinueReader.Close
  • expectContinueReader.Read
  • extraHeader.Write
  • fileHandler.ServeHTTP
  • fileTransport.RoundTrip
  • globalOptionsHandler.ServeHTTP
  • gzipReader.Close
  • gzipReader.Read
  • http2ClientConn.Close
  • http2ClientConn.Ping
  • http2ClientConn.RoundTrip
  • http2ClientConn.Shutdown
  • http2ConnectionError.Error
  • http2ErrCode.String
  • http2FrameHeader.String
  • http2FrameType.String
  • http2FrameWriteRequest.String
  • http2Framer.ReadFrame
  • http2Framer.WriteContinuation
  • http2Framer.WriteData
  • http2Framer.WriteDataPadded
  • http2Framer.WriteGoAway
  • http2Framer.WriteHeaders
  • http2Framer.WritePing
  • http2Framer.WritePriority
  • http2Framer.WritePushPromise
  • http2Framer.WriteRSTStream
  • http2Framer.WriteRawFrame
  • http2Framer.WriteSettings
  • http2Framer.WriteSettingsAck
  • http2Framer.WriteWindowUpdate
  • http2GoAwayError.Error
  • http2Server.ServeConn
  • http2Setting.String
  • http2SettingID.String
  • http2SettingsFrame.ForeachSetting
  • http2StreamError.Error
  • http2Transport.CloseIdleConnections
  • http2Transport.NewClientConn
  • http2Transport.RoundTrip
  • http2Transport.RoundTripOpt
  • http2bufferedWriter.Flush
  • http2bufferedWriter.Write
  • http2chunkWriter.Write
  • http2clientConnPool.GetClientConn
  • http2connError.Error
  • http2dataBuffer.Read
  • http2duplicatePseudoHeaderError.Error
  • http2gzipReader.Close
  • http2gzipReader.Read
  • http2headerFieldNameError.Error
  • http2headerFieldValueError.Error
  • http2noDialClientConnPool.GetClientConn
  • http2noDialH2RoundTripper.RoundTrip
  • http2pipe.Read
  • http2priorityWriteScheduler.CloseStream
  • http2priorityWriteScheduler.OpenStream
  • http2pseudoHeaderError.Error
  • http2requestBody.Close
  • http2requestBody.Read
  • http2responseWriter.Flush
  • http2responseWriter.FlushError
  • http2responseWriter.Push
  • http2responseWriter.SetReadDeadline
  • http2responseWriter.SetWriteDeadline
  • http2responseWriter.Write
  • http2responseWriter.WriteHeader
  • http2responseWriter.WriteString
  • http2roundRobinWriteScheduler.OpenStream
  • http2serverConn.CloseConn
  • http2serverConn.Flush
  • http2stickyErrWriter.Write
  • http2transportResponseBody.Close
  • http2transportResponseBody.Read
  • http2writeData.String
  • initALPNRequest.ServeHTTP
  • loggingConn.Close
  • loggingConn.Read
  • loggingConn.Write
  • maxBytesReader.Close
  • maxBytesReader.Read
  • onceCloseListener.Close
  • persistConn.Read
  • persistConnWriter.ReadFrom
  • persistConnWriter.Write
  • populateResponse.Write
  • populateResponse.WriteHeader
  • readTrackingBody.Close
  • readTrackingBody.Read
  • readWriteCloserBody.Read
  • redirectHandler.ServeHTTP
  • response.Flush
  • response.FlushError
  • response.Hijack
  • response.ReadFrom
  • response.Write
  • response.WriteHeader
  • response.WriteString
  • serverHandler.ServeHTTP
  • socksDialer.DialWithConn
  • socksUsernamePassword.Authenticate
  • stringWriter.WriteString
  • timeoutHandler.ServeHTTP
  • timeoutWriter.Write
  • timeoutWriter.WriteHeader
  • transportReadFromServerError.Error
Default Status
unaffected
Versions
Affected
  • From 0 before 1.21.9 (semver)
  • From 1.22.0-0 before 1.22.2 (semver)
Vendor
golang.org/x/net
Product
golang.org/x/net/http2
Collection URL
https://pkg.go.dev
Package Name
golang.org/x/net/http2
Program Routines
  • Framer.readMetaFrame
  • ClientConn.Close
  • ClientConn.Ping
  • ClientConn.RoundTrip
  • ClientConn.Shutdown
  • ConfigureServer
  • ConfigureTransport
  • ConfigureTransports
  • ConnectionError.Error
  • ErrCode.String
  • FrameHeader.String
  • FrameType.String
  • FrameWriteRequest.String
  • Framer.ReadFrame
  • Framer.WriteContinuation
  • Framer.WriteData
  • Framer.WriteDataPadded
  • Framer.WriteGoAway
  • Framer.WriteHeaders
  • Framer.WritePing
  • Framer.WritePriority
  • Framer.WritePushPromise
  • Framer.WriteRSTStream
  • Framer.WriteRawFrame
  • Framer.WriteSettings
  • Framer.WriteSettingsAck
  • Framer.WriteWindowUpdate
  • GoAwayError.Error
  • ReadFrameHeader
  • Server.ServeConn
  • Setting.String
  • SettingID.String
  • SettingsFrame.ForeachSetting
  • StreamError.Error
  • Transport.CloseIdleConnections
  • Transport.NewClientConn
  • Transport.RoundTrip
  • Transport.RoundTripOpt
  • bufferedWriter.Flush
  • bufferedWriter.Write
  • chunkWriter.Write
  • clientConnPool.GetClientConn
  • connError.Error
  • dataBuffer.Read
  • duplicatePseudoHeaderError.Error
  • gzipReader.Close
  • gzipReader.Read
  • headerFieldNameError.Error
  • headerFieldValueError.Error
  • noDialClientConnPool.GetClientConn
  • noDialH2RoundTripper.RoundTrip
  • pipe.Read
  • priorityWriteScheduler.CloseStream
  • priorityWriteScheduler.OpenStream
  • pseudoHeaderError.Error
  • requestBody.Close
  • requestBody.Read
  • responseWriter.Flush
  • responseWriter.FlushError
  • responseWriter.Push
  • responseWriter.SetReadDeadline
  • responseWriter.SetWriteDeadline
  • responseWriter.Write
  • responseWriter.WriteHeader
  • responseWriter.WriteString
  • roundRobinWriteScheduler.OpenStream
  • serverConn.CloseConn
  • serverConn.Flush
  • stickyErrWriter.Write
  • transportResponseBody.Close
  • transportResponseBody.Read
  • writeData.String
Default Status
unaffected
Versions
Affected
  • From 0 before 0.23.0 (semver)
Problem Types
TypeCWE IDDescription
N/AN/ACWE-400: Uncontrolled Resource Consumption
Type: N/A
CWE ID: N/A
Description: CWE-400: Uncontrolled Resource Consumption
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Bartek Nowotarski (https://nowotarski.info/)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://go.dev/issue/65051
N/A
https://go.dev/cl/576155
N/A
https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M
N/A
https://pkg.go.dev/vuln/GO-2024-2687
N/A
https://security.netapp.com/advisory/ntap-20240419-0009/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/
N/A
http://www.openwall.com/lists/oss-security/2024/04/05/4
N/A
http://www.openwall.com/lists/oss-security/2024/04/03/16
N/A
Hyperlink: https://go.dev/issue/65051
Resource: N/A
Hyperlink: https://go.dev/cl/576155
Resource: N/A
Hyperlink: https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M
Resource: N/A
Hyperlink: https://pkg.go.dev/vuln/GO-2024-2687
Resource: N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20240419-0009/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/05/4
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/03/16
Resource: N/A
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://go.dev/issue/65051
x_transferred
https://go.dev/cl/576155
x_transferred
https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M
x_transferred
https://pkg.go.dev/vuln/GO-2024-2687
x_transferred
https://security.netapp.com/advisory/ntap-20240419-0009/
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/
x_transferred
http://www.openwall.com/lists/oss-security/2024/04/05/4
x_transferred
http://www.openwall.com/lists/oss-security/2024/04/03/16
x_transferred
https://www.kb.cert.org/vuls/id/421644
N/A
Hyperlink: https://go.dev/issue/65051
Resource:
x_transferred
Hyperlink: https://go.dev/cl/576155
Resource:
x_transferred
Hyperlink: https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M
Resource:
x_transferred
Hyperlink: https://pkg.go.dev/vuln/GO-2024-2687
Resource:
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20240419-0009/
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/05/4
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/03/16
Resource:
x_transferred
Hyperlink: https://www.kb.cert.org/vuls/id/421644
Resource: N/A
2. CISA ADP Vulnrichment
Affected Products
Vendor
go_standard_library
Product
net\/http
CPEs
  • cpe:2.3:a:go_standard_library:net\/http:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 1.21.9 (custom)
  • From 1.22.0-0 before 1.22.2 (custom)
Vendor
Gogolang
Product
http2
CPEs
  • cpe:2.3:a:golang:http2:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 0.23.0 (custom)
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@golang.org
Published At:04 Apr, 2024 | 21:15
Updated At:04 Nov, 2025 | 19:16

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2024/04/03/16security@golang.org
N/A
http://www.openwall.com/lists/oss-security/2024/04/05/4security@golang.org
N/A
https://go.dev/cl/576155security@golang.org
N/A
https://go.dev/issue/65051security@golang.org
N/A
https://groups.google.com/g/golang-announce/c/YgW0sx8mN3Msecurity@golang.org
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/security@golang.org
N/A
https://pkg.go.dev/vuln/GO-2024-2687security@golang.org
N/A
https://security.netapp.com/advisory/ntap-20240419-0009/security@golang.org
N/A
http://www.openwall.com/lists/oss-security/2024/04/03/16af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2024/04/05/4af854a3a-2127-422b-91ae-364da2661108
N/A
https://go.dev/cl/576155af854a3a-2127-422b-91ae-364da2661108
N/A
https://go.dev/issue/65051af854a3a-2127-422b-91ae-364da2661108
N/A
https://groups.google.com/g/golang-announce/c/YgW0sx8mN3Maf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/af854a3a-2127-422b-91ae-364da2661108
N/A
https://pkg.go.dev/vuln/GO-2024-2687af854a3a-2127-422b-91ae-364da2661108
N/A
https://security.netapp.com/advisory/ntap-20240419-0009/af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.kb.cert.org/vuls/id/421644af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/03/16
Source: security@golang.org
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/05/4
Source: security@golang.org
Resource: N/A
Hyperlink: https://go.dev/cl/576155
Source: security@golang.org
Resource: N/A
Hyperlink: https://go.dev/issue/65051
Source: security@golang.org
Resource: N/A
Hyperlink: https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M
Source: security@golang.org
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/
Source: security@golang.org
Resource: N/A
Hyperlink: https://pkg.go.dev/vuln/GO-2024-2687
Source: security@golang.org
Resource: N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20240419-0009/
Source: security@golang.org
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/03/16
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2024/04/05/4
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://go.dev/cl/576155
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://go.dev/issue/65051
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://pkg.go.dev/vuln/GO-2024-2687
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20240419-0009/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.kb.cert.org/vuls/id/421644
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

67Records found

CVE-2022-30630
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.29%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 20:17
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack exhaustion in Glob on certain paths in io/fs

Uncontrolled recursion in Glob in io/fs before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path which contains a large number of path separators.

Action-Not Available
Vendor-Go standard libraryGo
Product-goio/fs
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2022-30633
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.10% / 26.61%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 20:16
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack exhaustion when unmarshaling certain documents in encoding/xml

Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag.

Action-Not Available
Vendor-Go standard libraryGo
Product-goencoding/xml
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2022-30635
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.10% / 27.13%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 20:16
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack exhaustion when decoding certain messages in encoding/gob

Uncontrolled recursion in Decoder.Decode in encoding/gob before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a message which contains deeply nested structures.

Action-Not Available
Vendor-Go standard libraryGo
Product-goencoding/gob
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2022-30634
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.02% / 6.19%
||
7 Day CHG~0.00%
Published-15 Jul, 2022 | 19:36
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Indefinite hang with large buffers on Windows in crypto/rand

Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows allows attacker to cause an indefinite hang by passing a buffer larger than 1 << 32 - 1 bytes.

Action-Not Available
Vendor-Go standard libraryNetApp, Inc.GoMicrosoft Corporation
Product-gowindowscloud_insights_telegraf_agentcrypto/rand
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2017-1000098
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.43% / 62.40%
||
7 Day CHG~0.00%
Published-04 Oct, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given "maxMemory" limit. It was possible for an attacker to generate a multipart request crafted such that the server ran out of file descriptors.

Action-Not Available
Vendor-n/aGo
Product-gon/a
CWE ID-CWE-769
DEPRECATED: Uncontrolled File Descriptor Consumption
CVE-2022-2879
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.02% / 3.20%
||
7 Day CHG~0.00%
Published-14 Oct, 2022 | 00:00
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unbounded memory consumption when reading headers in archive/tar

Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.

Action-Not Available
Vendor-Go standard libraryGo
Product-goarchive/tar
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2022-27664
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 26.60%
||
7 Day CHG~0.00%
Published-06 Sep, 2022 | 17:29
Updated-03 Aug, 2024 | 05:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.

Action-Not Available
Vendor-n/aFedora ProjectGo
Product-gofedoran/a
CVE-2020-16845
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.13%
||
7 Day CHG~0.00%
Published-06 Aug, 2020 | 17:03
Updated-04 Aug, 2024 | 13:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectGoopenSUSE
Product-godebian_linuxfedoraleapn/a
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2022-27191
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.33%
||
7 Day CHG~0.00%
Published-18 Mar, 2022 | 06:03
Updated-03 Aug, 2024 | 05:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.

Action-Not Available
Vendor-n/aFedora ProjectGoRed Hat, Inc.
Product-extra_packages_for_enterprise_linuxfedoraenterprise_linuxsshadvanced_cluster_management_for_kubernetesn/a
CVE-2022-24921
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.31%
||
7 Day CHG~0.00%
Published-05 Mar, 2022 | 00:00
Updated-03 Aug, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression.

Action-Not Available
Vendor-n/aNetApp, Inc.GoDebian GNU/Linux
Product-godebian_linuxastra_tridentn/a
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2022-41724
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.01% / 2.65%
||
7 Day CHG~0.00%
Published-28 Feb, 2023 | 17:19
Updated-07 Mar, 2025 | 17:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Panic on large handshake records in crypto/tls

Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).

Action-Not Available
Vendor-Go standard libraryGo
Product-gocrypto/tls
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-23772
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.02% / 3.34%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 00:11
Updated-03 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Rat.SetString in math/big in Go before 1.16.14 and 1.17.x before 1.17.7 has an overflow that can lead to Uncontrolled Memory Consumption.

Action-Not Available
Vendor-n/aNetApp, Inc.GoDebian GNU/Linux
Product-debian_linuxcloud_insights_telegraf_agentbeegfs_csi_drivergostoragegridkubernetes_monitoring_operatorn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2022-32189
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.98%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 20:17
Updated-03 Aug, 2024 | 07:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Panic when decoding Float and Rat types in math/big

A too-short encoded message can cause a panic in Float.GobDecode and Rat GobDecode in math/big in Go before 1.17.13 and 1.18.5, potentially allowing a denial of service.

Action-Not Available
Vendor-Go standard libraryGo
Product-gomath/big
CVE-2021-44716
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 26.55%
||
7 Day CHG~0.00%
Published-01 Jan, 2022 | 00:00
Updated-04 Aug, 2024 | 04:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.

Action-Not Available
Vendor-n/aNetApp, Inc.GoDebian GNU/Linux
Product-gocloud_insights_telegrafdebian_linuxn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2023-24536
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.07% / 21.41%
||
7 Day CHG~0.00%
Published-06 Apr, 2023 | 15:50
Updated-13 Feb, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Excessive resource consumption in net/http, net/textproto and mime/multipart

Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. With fix, ReadForm now does a better job of estimating the memory consumption of parsed forms, and performs many fewer short-lived allocations. In addition, the fixed mime/multipart.Reader imposes the following limits on the size of parsed forms: 1. Forms parsed with ReadForm may contain no more than 1000 parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxparts=. 2. Form parts parsed with NextPart and NextRawPart may contain no more than 10,000 header fields. In addition, forms parsed with ReadForm may contain no more than 10,000 header fields across all parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxheaders=.

Action-Not Available
Vendor-Go standard libraryGo
Product-gomime/multipartnet/textproto
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2021-39293
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.58%
||
7 Day CHG~0.00%
Published-24 Jan, 2022 | 00:00
Updated-04 Aug, 2024 | 02:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.

Action-Not Available
Vendor-n/aNetApp, Inc.Go
Product-gocloud_insights_telegrafn/a
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2021-38561
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.47%
||
7 Day CHG~0.00%
Published-26 Dec, 2022 | 00:00
Updated-14 Apr, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack.

Action-Not Available
Vendor-n/aGo
Product-textn/a
CWE ID-CWE-125
Out-of-bounds Read
  • Previous
  • 1
  • 2
  • Next
Details not found