First published: Fri Jun 03 2022(Updated: )
MinIO is a multi-cloud object storage solution. Starting with version RELEASE.2019-09-25T18-25-51Z and ending with version RELEASE.2022-06-02T02-11-04Z, MinIO is vulnerable to an unending go-routine buildup while keeping connections established due to HTTP clients not closing the connections. Public-facing MinIO deployments are most affected. Users should upgrade to RELEASE.2022-06-02T02-11-04Z to receive a patch. One possible workaround is to use a reverse proxy to limit the number of connections being attempted in front of MinIO, and actively rejecting connections from such malicious clients.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
MinIO MinIO | >=2019-09-25t18-25-51z<2022-06-02t02-11-04z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31028 is classified as a medium severity vulnerability.
To fix CVE-2022-31028, it is recommended to upgrade MinIO to version RELEASE.2022-06-03T01-40-53Z or later.
CVE-2022-31028 involves an unending go-routine buildup due to HTTP clients not closing connections properly.
CVE-2022-31028 affects MinIO versions from RELEASE.2019-09-25T18-25-51Z to RELEASE.2022-06-02T02-11-04Z.
The impact of CVE-2022-31028 can lead to resource exhaustion and degraded performance due to the accumulation of go-routines.