Bugzilla – Bug 1206135
VUL-0: CVE-2022-41717: go1.18,go1.19: net/http: limit canonical header cache by bytes, not entries
Last modified: 2024-05-03 09:18:44 UTC
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. This issue is also fixed in golang.org/x/net/http2 vX.Y.Z, for users manually configuring HTTP/2. Thanks to Josselin Costanzi for reporting this issue. This is CVE-2022-41717 and Go issue https://go.dev/issue/56350.
This is an autogenerated message for OBS integration: This bug (1206135) was mentioned in https://build.opensuse.org/request/show/1041234 Factory / go1.18 https://build.opensuse.org/request/show/1041235 Factory / go1.19
SUSE-SU-2022:4397-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1200441,1206134,1206135 CVE References: CVE-2022-41717,CVE-2022-41720 JIRA References: Sources used: openSUSE Leap 15.4 (src): go1.19-1.19.4-150000.1.18.1 openSUSE Leap 15.3 (src): go1.19-1.19.4-150000.1.18.1 SUSE Linux Enterprise Module for Development Tools 15-SP4 (src): go1.19-1.19.4-150000.1.18.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): go1.19-1.19.4-150000.1.18.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4398-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1193742,1206134,1206135 CVE References: CVE-2022-41717,CVE-2022-41720 JIRA References: Sources used: openSUSE Leap 15.4 (src): go1.18-1.18.9-150000.1.40.1 openSUSE Leap 15.3 (src): go1.18-1.18.9-150000.1.40.1 SUSE Linux Enterprise Module for Development Tools 15-SP4 (src): go1.18-1.18.9-150000.1.40.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): go1.18-1.18.9-150000.1.40.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2312-1: An update that solves 28 vulnerabilities, contains one feature and has three fixes can now be installed. Category: security (important) Bug References: 1183043, 1193742, 1198423, 1198424, 1198427, 1199413, 1200134, 1200135, 1200136, 1200137, 1201434, 1201436, 1201437, 1201440, 1201443, 1201444, 1201445, 1201447, 1201448, 1202035, 1203185, 1204023, 1204024, 1204025, 1204941, 1206134, 1206135, 1208270, 1208271, 1208272, 1208491 CVE References: CVE-2022-1705, CVE-2022-1962, CVE-2022-24675, CVE-2022-27536, CVE-2022-27664, CVE-2022-28131, CVE-2022-28327, CVE-2022-2879, CVE-2022-2880, CVE-2022-29526, CVE-2022-29804, CVE-2022-30580, CVE-2022-30629, CVE-2022-30630, CVE-2022-30631, CVE-2022-30632, CVE-2022-30633, CVE-2022-30634, CVE-2022-30635, CVE-2022-32148, CVE-2022-32189, CVE-2022-41715, CVE-2022-41716, CVE-2022-41717, CVE-2022-41720, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725 Jira References: PED-1962 Sources used: openSUSE Leap 15.4 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 openSUSE Leap 15.5 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 Development Tools Module 15-SP4 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Linux Enterprise Real Time 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Enterprise Storage 7.1 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done, closing