First published: Fri Feb 17 2023(Updated: )
<a href="https://access.redhat.com/security/cve/CVE-2022-41723">CVE-2022-41723</a> : net/http: avoid quadratic complexity in HPACK decoding A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. This issue is also fixed in golang.org/x/net/http2 v0.7.0, for users manually configuring HTTP/2. <a href="https://go.dev/issue/57855">https://go.dev/issue/57855</a> <a href="https://pkg.go.dev/vuln/GO-2023-1571">https://pkg.go.dev/vuln/GO-2023-1571</a> <a href="https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E">https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E</a>
Credit: security@golang.org security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.8.1-3.el8 | 0:1.8.1-3.el8 |
redhat/openshift | <0:4.13.0-202304211155.p0.gb404935.assembly.stream.el9 | 0:4.13.0-202304211155.p0.gb404935.assembly.stream.el9 |
redhat/etcd | <0:3.3.23-14.el8 | 0:3.3.23-14.el8 |
redhat/skupper-cli | <0:1.4.1-2.el8 | 0:1.4.1-2.el8 |
redhat/skupper-cli | <0:1.4.1-2.el9 | 0:1.4.1-2.el9 |
Golang Go | <1.19.6 | |
Golang Go | =1.20.0 | |
Golang Hpack Go | <0.7.0 | |
Golang Http2 Go | <0.7.0 | |
go/golang.org/x/net | <0.7.0 | 0.7.0 |
redhat/golang.org/x/net | <0.7.0 | 0.7.0 |
redhat/golang | <1.20.1 | 1.20.1 |
redhat/golang | <1.19.6 | 1.19.6 |
IBM Concert Software | <=1.0.0 - 1.0.1 | |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | 1.19.8-2 | |
debian/golang-golang-x-net | <=1:0.0+git20210119.5f4716e+dfsg-4 | 1:0.7.0+dfsg-1 1:0.27.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-41723 is a vulnerability in golang that allows a maliciously crafted HTTP/2 stream to cause excessive CPU consumption and result in a denial of service.
CVE-2022-41723 has a severity rating of 7.5, which is considered high.
Openshift Serverless Clients version 1.8.1-3.el8, Openshift version 4.13.0-202304211155.p0.gb404935.assembly.stream.el9, Etcd version 3.3.23-14.el8, Skupper CLI version 1.4.1-2.el8 and 1.4.1-2.el9, Golang Go versions up to 1.19.6, Golang Go version 1.20.0, Golang Hpack version up to 0.7.0, Golang Http2 version up to 0.7.0, Golang.org/x/net version 0.7.0, Golang version 1.20.1, and Golang version 1.19.6 are affected by CVE-2022-41723.
CVE-2022-41723 can be exploited by sending a maliciously crafted HTTP/2 stream to the vulnerable software, causing excessive CPU consumption in the HPACK decoder.
Yes, the fix for CVE-2022-41723 is available. Please refer to the official references for more information on how to apply the fix.