Lucene search

K
mageiaGentoo FoundationMGASA-2023-0109
HistoryMar 24, 2023 - 8:55 a.m.

Updated golang packages fix security vulnerability

2023-03-2408:55:49
Gentoo Foundation
advisories.mageia.org
59
golang
security vulnerability
http/2
cpu consumption
denial of service
handshake records
crypto/tls
resource consumption
p256 curve

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.024 Low

EPSS

Percentile

90.0%

A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. (CVE-2022-41723) Large handshake records may cause panics in crypto/tls. (CVE-2022-41724) Denial of service from excessive resource consumption in net/http and mime/multipart. (CVE-2022-41725) The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (CVE-2023-24532)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchgolang< 1.19.7-1golang-1.19.7-1.mga8

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.024 Low

EPSS

Percentile

90.0%