First published: Wed Jun 17 2020(Updated: )
A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/golang.org/x/text | <0.3.3 | 0.3.3 |
redhat/golang.org/x/text | <0.3.3 | 0.3.3 |
redhat/kiali | <0:v1.12.10.redhat2-1.el7 | 0:v1.12.10.redhat2-1.el7 |
redhat/ior | <0:1.1.6-1.el8 | 0:1.1.6-1.el8 |
redhat/servicemesh | <0:1.1.6-1.el8 | 0:1.1.6-1.el8 |
redhat/servicemesh-cni | <0:1.1.6-1.el8 | 0:1.1.6-1.el8 |
redhat/servicemesh-grafana | <0:6.4.3-13.el8 | 0:6.4.3-13.el8 |
redhat/servicemesh-operator | <0:1.1.6-2.el8 | 0:1.1.6-2.el8 |
redhat/servicemesh-prometheus | <0:2.14.0-14.el8 | 0:2.14.0-14.el8 |
redhat/go-toolset | <1.13-0:1.13.15-1.el7 | 1.13-0:1.13.15-1.el7 |
redhat/go-toolset | <1.13-golang-0:1.13.15-3.el7 | 1.13-golang-0:1.13.15-3.el7 |
redhat/skopeo | <1:0.1.40-12.el7_9 | 1:0.1.40-12.el7_9 |
redhat/buildah | <0:1.11.6-12.el7_9 | 0:1.11.6-12.el7_9 |
redhat/podman | <0:1.6.4-26.el7_9 | 0:1.6.4-26.el7_9 |
redhat/podman | <0:1.9.3-3.rhaos4.6.el8 | 0:1.9.3-3.rhaos4.6.el8 |
redhat/skopeo | <1:1.1.1-2.rhaos4.6.el8 | 1:1.1.1-2.rhaos4.6.el8 |
redhat/mcg | <0:5.6.0-39.2279a46.5.6.el8 | 0:5.6.0-39.2279a46.5.6.el8 |
Golang Text | <0.3.3 | |
Fedoraproject Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-14040 is a vulnerability in the x/text package for Go that could cause a program to crash or run out of memory due to an infinite loop in the UTF-16 decoder.
CVE-2020-14040 has a severity score of 7.5 (high).
To fix CVE-2020-14040, update the x/text package to version 0.3.3 or higher.
You can find more information about CVE-2020-14040 at the following sources: CVE website, NIST NVD, Go Issue Tracker, Red Hat Bugzilla, and Red Hat Security Advisory.
The CWE IDs associated with CVE-2020-14040 are 835 and 400.