CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
79.9%
It was discovered that the Go net/http module incorrectly handled
Transfer-Encoding headers in the HTTP/1 client. A remote attacker could
possibly use this issue to perform an HTTP Request Smuggling attack.
(CVE-2022-1705)
It was discovered that Go did not properly manage memory under certain
circumstances. An attacker could possibly use this issue to cause a panic
resulting into a denial of service. (CVE-2022-1962, CVE-2022-27664,
CVE-2022-28131, CVE-2022-30630, CVE-2022-30631, CVE-2022-30632,
CVE-2022-30633, CVE-2022-30635, CVE-2022-32189, CVE-2022-41715,
CVE-2022-41717, CVE-2023-24534, CVE-2023-24537)
It was discovered that Go did not properly implemented the maximum size of
file headers in Reader.Read. An attacker could possibly use this issue to
cause a panic resulting into a denial of service. (CVE-2022-2879)
It was discovered that the Go net/http module incorrectly handled query
parameters in requests forwarded by ReverseProxy. A remote attacker could
possibly use this issue to perform an HTTP Query Parameter Smuggling attack.
(CVE-2022-2880)
It was discovered that Go did not properly manage the permissions for
Faccessat function. A attacker could possibly use this issue to expose
sensitive information. (CVE-2022-29526)
It was discovered that Go did not properly generate the values for
ticket_age_add in session tickets. An attacker could possibly use this
issue to observe TLS handshakes to correlate successive connections by
comparing ticket ages during session resumption. (CVE-2022-30629)
It was discovered that Go did not properly manage client IP addresses in
net/http. An attacker could possibly use this issue to cause ReverseProxy
to set the client IP as the value of the X-Forwarded-For header.
(CVE-2022-32148)
It was discovered that Go did not properly validate backticks (`) as
Javascript string delimiters, and do not escape them as expected. An
attacker could possibly use this issue to inject arbitrary Javascript code
into the Go template. (CVE-2023-24538)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | golang-1.18-go | < 1.18.1-1ubuntu1.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | golang-1.18 | < 1.18.1-1ubuntu1.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | golang-1.18-doc | < 1.18.1-1ubuntu1.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | golang-1.18-src | < 1.18.1-1ubuntu1.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | golang-1.18-go | < 1.18.1-1ubuntu1~20.04.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | golang-1.18 | < 1.18.1-1ubuntu1~20.04.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | golang-1.18-doc | < 1.18.1-1ubuntu1~20.04.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | golang-1.18-src | < 1.18.1-1ubuntu1~20.04.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | golang-1.18-go | < 1.18.1-1ubuntu1~18.04.4 | UNKNOWN |
Ubuntu | 18.04 | noarch | golang-1.18 | < 1.18.1-1ubuntu1~18.04.4 | UNKNOWN |
ubuntu.com/security/CVE-2022-1705
ubuntu.com/security/CVE-2022-1962
ubuntu.com/security/CVE-2022-27664
ubuntu.com/security/CVE-2022-28131
ubuntu.com/security/CVE-2022-2879
ubuntu.com/security/CVE-2022-2880
ubuntu.com/security/CVE-2022-29526
ubuntu.com/security/CVE-2022-30629
ubuntu.com/security/CVE-2022-30630
ubuntu.com/security/CVE-2022-30631
ubuntu.com/security/CVE-2022-30632
ubuntu.com/security/CVE-2022-30633
ubuntu.com/security/CVE-2022-30635
ubuntu.com/security/CVE-2022-32148
ubuntu.com/security/CVE-2022-32189
ubuntu.com/security/CVE-2022-41715
ubuntu.com/security/CVE-2022-41717
ubuntu.com/security/CVE-2023-24534
ubuntu.com/security/CVE-2023-24537
ubuntu.com/security/CVE-2023-24538
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
79.9%