git: f1d8b3346b6a - main - security/vuxml: Document Go vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 04 Oct 2022 20:57:27 UTC
The branch main has been updated by dmgk: URL: https://cgit.FreeBSD.org/ports/commit/?id=f1d8b3346b6ad98a622ec17b6a4cfe32ae3c4936 commit f1d8b3346b6ad98a622ec17b6a4cfe32ae3c4936 Author: Dmitri Goutnik <dmgk@FreeBSD.org> AuthorDate: 2022-10-04 20:52:41 +0000 Commit: Dmitri Goutnik <dmgk@FreeBSD.org> CommitDate: 2022-10-04 20:57:19 +0000 security/vuxml: Document Go vulnerabilities --- security/vuxml/vuln-2022.xml | 66 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 66 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index 75aeb198e88a..d34a0ccdb841 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,69 @@ + <vuln vid="854c2afb-4424-11ed-af97-adcabf310f9b"> + <topic>go -- multiple vulnerabilities</topic> + <affects> + <package> + <name>go118</name> + <range><lt>1.18.7</lt></range> + </package> + <package> + <name>go119</name> + <range><lt>1.19.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Go project reports:</p> + <blockquote cite="https://go.dev/issue/54853"> + <p>archive/tar: unbounded memory consumption when reading + headers</p> + <p>Reader.Read did not set a limit on the maximum size of + file headers. A maliciously crafted archive could cause + Read to allocate unbounded amounts of memory, potentially + causing resource exhaustion or panics. Reader.Read now + limits the maximum size of header blocks to 1 MiB.</p> + </blockquote> + <blockquote cite="https://go.dev/issue/54663"> + <p>net/http/httputil: ReverseProxy should not forward + unparseable query parameters</p> + <p>Requests forwarded by ReverseProxy included the raw + query parameters from the inbound request, including + unparseable parameters rejected by net/http. This could + permit query parameter smuggling when a Go proxy + forwards a parameter with an unparseable value.</p> + <p>ReverseProxy will now sanitize the query parameters in + the forwarded query when the outbound request's Form + field is set after the ReverseProxy.Director function + returns, indicating that the proxy has parsed the query + parameters. Proxies which do not parse query parameters + continue to forward the original query parameters + unchanged.</p> + </blockquote> + <blockquote cite="https://go.dev/issue/55949"> + <p>regexp/syntax: limit memory used by parsing regexps</p> + <p>The parsed regexp representation is linear in the size + of the input, but in some cases the constant factor can be + as high as 40,000, making relatively small regexps consume + much larger amounts of memory.</p> + <p>Each regexp being parsed is now limited to a 256 MB + memory footprint. Regular expressions whose + representation would use more space than that are now + rejected. Normal use of regular expressions is + unaffected.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2022-2879</cvename> + <cvename>CVE-2022-2880</cvename> + <cvename>CVE-2022-41715</cvename> + <url>https://groups.google.com/g/golang-announce/c/xtuG5faxtaU/m/jEhlI_5WBgAJ</url> + </references> + <dates> + <discovery>2022-10-04</discovery> + <entry>2022-10-04</entry> + </dates> + </vuln> + <vuln vid="d487d4fc-43a8-11ed-8b01-b42e991fc52e"> <topic>zydis -- heap buffer overflow</topic> <affects>