git: c3241745dfdc - main - security/vuxml: Document Go vulnerabilities

From: Dmitri Goutnik <dmgk_at_FreeBSD.org>
Date: Thu, 14 Jul 2022 12:52:02 UTC
The branch main has been updated by dmgk:

URL: https://cgit.FreeBSD.org/ports/commit/?id=c3241745dfdc451d6ab8f334020c9200f40e08a8

commit c3241745dfdc451d6ab8f334020c9200f40e08a8
Author:     Dmitri Goutnik <dmgk@FreeBSD.org>
AuthorDate: 2022-07-13 12:11:12 +0000
Commit:     Dmitri Goutnik <dmgk@FreeBSD.org>
CommitDate: 2022-07-14 12:39:43 +0000

    security/vuxml: Document Go vulnerabilities
---
 security/vuxml/vuln-2022.xml | 96 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 96 insertions(+)

diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index b3c1221d17e4..0a3fa85690aa 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,99 @@
+  <vuln vid="a4f2416c-02a0-11ed-b817-10c37b4ac2ea">
+    <topic>go -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>go118</name>
+	<range><lt>1.18.4</lt></range>
+      </package>
+      <package>
+	<name>go117</name>
+	<range><lt>1.17.12</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The Go project reports:</p>
+	<blockquote cite="https://go.dev/issue/53188">
+	  <p>net/http: improper sanitization of Transfer-Encoding
+	    header</p>
+	  <p>The HTTP/1 client accepted some invalid
+	    Transfer-Encoding headers as indicating a "chunked"
+	    encoding. This could potentially allow for request
+	    smuggling, but only if combined with an intermediate
+	    server that also improperly failed to reject the header
+	    as invalid.</p>
+	</blockquote>
+	<blockquote cite="https://go.dev/issue/53423">
+	  <p>When httputil.ReverseProxy.ServeHTTP was called with a
+	    Request.Header map containing a nil value for the
+	    X-Forwarded-For header, ReverseProxy would set the client
+	    IP as the value of the X-Forwarded-For header, contrary to
+	    its documentation. In the more usual case where a Director
+	    function set the X-Forwarded-For header value to nil,
+	    ReverseProxy would leave the header unmodified as
+	    expected.</p>
+	</blockquote>
+	<blockquote cite="https://go.dev/issue/53168">
+	  <p>compress/gzip: stack exhaustion in Reader.Read</p>
+	  <p>Calling Reader.Read on an archive containing a large
+	    number of concatenated 0-length compressed files can
+	    cause a panic due to stack exhaustion.</p>
+	</blockquote>
+	<blockquote cite="https://go.dev/issue/53611">
+	  <p>encoding/xml: stack exhaustion in Unmarshal</p>
+	  <p>Calling Unmarshal on a XML document into a Go struct
+	    which has a nested field that uses the any field tag can
+	    cause a panic due to stack exhaustion.</p>
+	</blockquote>
+	<blockquote cite="https://go.dev/issue/53614">
+	  <p>encoding/xml: stack exhaustion in Decoder.Skip</p>
+	  <p>Calling Decoder.Skip when parsing a deeply nested XML
+	    document can cause a panic due to stack exhaustion.</p>
+	</blockquote>
+	<blockquote cite="https://go.dev/issue/53615">
+	  <p>encoding/gob: stack exhaustion in Decoder.Decode</p>
+	  <p>Calling Decoder.Decode on a message which contains
+	    deeply nested structures can cause a panic due to stack
+	    exhaustion.</p>
+	</blockquote>
+	<blockquote cite="https://go.dev/issue/53416">
+	  <p>path/filepath: stack exhaustion in Glob</p>
+	  <p>Calling Glob on a path which contains a large number of
+	    path separators can cause a panic due to stack
+	    exhaustion.</p>
+	</blockquote>
+	<blockquote cite="https://go.dev/issue/53415">
+	  <p>io/fs: stack exhaustion in Glob</p>
+	  <p>Calling Glob on a path which contains a large number of
+	    path separators can cause a panic due to stack
+	    exhaustion.</p>
+	</blockquote>
+	<blockquote cite="https://go.dev/issue/53616">
+	  <p>go/parser: stack exhaustion in all Parse* functions</p>
+	  <p>Calling any of the Parse functions on Go source code
+	    which contains deeply nested types or declarations can
+	    cause a panic due to stack exhaustion.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2022-1705</cvename>
+      <cvename>CVE-2022-32148</cvename>
+      <cvename>CVE-2022-30631</cvename>
+      <cvename>CVE-2022-30633</cvename>
+      <cvename>CVE-2022-28131</cvename>
+      <cvename>CVE-2022-30635</cvename>
+      <cvename>CVE-2022-30632</cvename>
+      <cvename>CVE-2022-30630</cvename>
+      <cvename>CVE-2022-1962</cvename>
+      <url>https://groups.google.com/g/golang-dev/c/frczlF8OFQ0</url>
+    </references>
+    <dates>
+      <discovery>2022-07-12</discovery>
+      <entry>2022-07-13</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="b99f99f6-021e-11ed-8c6f-000c29ffbb6c">
     <topic>git -- privilege escalation</topic>
     <affects>