Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in golang.org/x/net: GHSA-w32m-9786-jp63 #3348

Closed
GoVulnBot opened this issue Dec 18, 2024 · 1 comment
Closed

Comments

@GoVulnBot
Copy link

Advisory GHSA-w32m-9786-jp63 references a vulnerability in the following Go modules:

Module
golang.org/x/net

Description:
An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: golang.org/x/net
      versions:
        - fixed: 0.33.0
      vulnerable_at: 0.32.0
summary: Non-linear parsing of case-insensitive content in golang.org/x/net/html in golang.org/x/net
cves:
    - CVE-2024-45338
ghsas:
    - GHSA-w32m-9786-jp63
references:
    - advisory: https://github.com/advisories/GHSA-w32m-9786-jp63
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-45338
    - fix: https://go.dev/cl/637536
    - report: https://go.dev/issue/70906
    - report: https://go.dev/issue/70906
    - web: https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ
source:
    id: GHSA-w32m-9786-jp63
    created: 2024-12-18T22:01:18.168343528Z
review_status: UNREVIEWED

@tatianab
Copy link
Contributor

Duplicate of #3333

@tatianab tatianab marked this as a duplicate of #3333 Dec 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants