Search CVE reports
41 – 50 of 77 results
CVE-2022-41724
Medium prioritySome fixes available 6 of 13
Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all...
13 affected packages
golang, golang-1.10, golang-1.13, golang-1.14, golang-1.16...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
golang | Not in release | Not in release | Not in release | Not in release | Not in release |
golang-1.10 | Not in release | Not in release | Not in release | Not affected | Not affected |
golang-1.13 | Not in release | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
golang-1.14 | Not in release | Not in release | Vulnerable | Not in release | Not in release |
golang-1.16 | Not in release | Not in release | Vulnerable | Vulnerable | Not in release |
golang-1.17 | Not in release | Fixed | Not in release | Not in release | Not in release |
golang-1.18 | Not in release | Fixed | Fixed | Fixed | Fixed |
golang-1.19 | Not in release | Not in release | Not in release | Not in release | Ignored |
golang-1.20 | Not in release | Not affected | Not affected | Not in release | Ignored |
golang-1.21 | Not affected | Not affected | Not affected | Not in release | Not in release |
golang-1.6 | Not in release | Not in release | Not in release | Not in release | Not affected |
golang-1.8 | Not in release | Not in release | Not in release | Not affected | Not in release |
golang-1.9 | Not in release | Not in release | Not in release | Not affected | Not in release |
CVE-2022-41723
Medium prioritySome fixes available 10 of 29
A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
16 affected packages
containerd, golang, golang-1.10, golang-1.13, golang-1.14...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
containerd | Not affected | Not affected | Not affected | Not affected | Not affected |
golang | Not in release | Not in release | Not in release | Not in release | Not in release |
golang-1.10 | Not in release | Not in release | Not in release | Vulnerable | Vulnerable |
golang-1.13 | Not in release | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
golang-1.14 | Not in release | Not in release | Vulnerable | Not in release | Not in release |
golang-1.16 | Not in release | Not in release | Vulnerable | Vulnerable | Not in release |
golang-1.17 | Not in release | Fixed | Not in release | Not in release | Not in release |
golang-1.18 | Not in release | Fixed | Fixed | Fixed | Fixed |
golang-1.19 | Not in release | Not in release | Not in release | Not in release | Not in release |
golang-1.20 | Not in release | Not affected | Not affected | Not in release | Not in release |
golang-1.21 | Not affected | Not affected | Not affected | Not in release | Not in release |
golang-1.6 | Not in release | Not in release | Not in release | Not in release | Vulnerable |
golang-1.8 | Not in release | Not in release | Not in release | Vulnerable | Not in release |
golang-1.9 | Not in release | Not in release | Not in release | Vulnerable | Not in release |
golang-golang-x-net | Not affected | Vulnerable | Not in release | Not in release | Ignored |
google-guest-agent | Fixed | Fixed | Fixed | Vulnerable | Vulnerable |
CVE-2022-41717
Medium prioritySome fixes available 10 of 19
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped,...
10 affected packages
golang, golang-1.10, golang-1.13, golang-1.14, golang-1.16...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
golang | — | Not in release | Not in release | Not in release | Ignored |
golang-1.10 | — | Not in release | Not in release | Vulnerable | Needs evaluation |
golang-1.13 | Not in release | Fixed | Fixed | Fixed | Fixed |
golang-1.14 | — | Not in release | Vulnerable | Not in release | Not in release |
golang-1.16 | — | Not in release | Fixed | Fixed | Ignored |
golang-1.17 | — | Vulnerable | Not in release | Not in release | Ignored |
golang-1.18 | Not in release | Fixed | Fixed | Fixed | Fixed |
golang-1.6 | — | Not in release | Not in release | Not in release | Needs evaluation |
golang-1.8 | — | Not in release | Not in release | Vulnerable | Not in release |
golang-1.9 | — | Not in release | Not in release | Vulnerable | Not in release |
CVE-2022-41720
Medium priorityOn Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files...
10 affected packages
golang, golang-1.10, golang-1.13, golang-1.14, golang-1.16...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
golang | — | Not in release | Not in release | Not in release | Ignored |
golang-1.10 | — | Not in release | Not in release | Not affected | Not affected |
golang-1.13 | — | Not affected | Not affected | Not affected | Not affected |
golang-1.14 | — | Not in release | Not affected | Not in release | Not in release |
golang-1.16 | — | Not in release | Not affected | Not affected | Ignored |
golang-1.17 | — | Not affected | Not in release | Not in release | Ignored |
golang-1.18 | — | Not affected | Not affected | Not affected | Ignored |
golang-1.6 | — | Not in release | Not in release | Not in release | Not affected |
golang-1.8 | — | Not in release | Not in release | Not affected | Not in release |
golang-1.9 | — | Not in release | Not in release | Not affected | Not in release |
CVE-2022-41716
Negligible priorityDue to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked...
12 affected packages
golang, golang-1.10, golang-1.13, golang-1.14, golang-1.16...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
golang | Not in release | Not in release | Not in release | Not in release | Ignored |
golang-1.10 | Not in release | Not in release | Not in release | Needs evaluation | Needs evaluation |
golang-1.13 | Not in release | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
golang-1.14 | Not in release | Not in release | Needs evaluation | Not in release | Not in release |
golang-1.16 | Not in release | Not in release | Needs evaluation | Needs evaluation | Ignored |
golang-1.17 | Not in release | Needs evaluation | Not in release | Not in release | Ignored |
golang-1.18 | Not in release | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
golang-1.19 | Not in release | Not in release | Not in release | Not in release | Ignored |
golang-1.20 | Not in release | Needs evaluation | Needs evaluation | Not in release | Ignored |
golang-1.6 | Not in release | Not in release | Not in release | Not in release | Needs evaluation |
golang-1.8 | Not in release | Not in release | Not in release | Needs evaluation | Not in release |
golang-1.9 | Not in release | Not in release | Not in release | Needs evaluation | Not in release |
CVE-2022-41715
Medium prioritySome fixes available 3 of 16
Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant...
10 affected packages
golang-1.10, golang-1.13, golang-1.14, golang-1.16, golang-1.17...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
golang-1.10 | Not in release | Not in release | Not in release | Needs evaluation | Needs evaluation |
golang-1.13 | Not in release | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
golang-1.14 | Not in release | Not in release | Vulnerable | Not in release | Not in release |
golang-1.16 | Not in release | Not in release | Vulnerable | Vulnerable | Not in release |
golang-1.17 | — | Not affected | Not in release | Not in release | Ignored |
golang-1.18 | Not in release | Fixed | Fixed | Fixed | Not affected |
golang-1.19 | Not in release | Not in release | Not in release | Not in release | Ignored |
golang-1.6 | Not in release | Not in release | Not in release | Not in release | Vulnerable |
golang-1.8 | Not in release | Not in release | Not in release | Vulnerable | Not in release |
golang-1.9 | Not in release | Not in release | Not in release | Vulnerable | Not in release |
CVE-2022-2880
Medium prioritySome fixes available 10 of 18
Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparsable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter...
10 affected packages
golang-1.10, golang-1.13, golang-1.14, golang-1.16, golang-1.17...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
golang-1.10 | Not in release | Not in release | Not in release | Vulnerable | Vulnerable |
golang-1.13 | Not in release | Fixed | Fixed | Fixed | Fixed |
golang-1.14 | Not in release | Not in release | Vulnerable | Not in release | Not in release |
golang-1.16 | Not in release | Not in release | Fixed | Fixed | Ignored |
golang-1.17 | — | Vulnerable | Not in release | Not in release | Ignored |
golang-1.18 | Not in release | Fixed | Fixed | Fixed | Fixed |
golang-1.19 | Not in release | Not in release | Not in release | Not in release | Ignored |
golang-1.6 | Not in release | Not in release | Not in release | Not in release | Vulnerable |
golang-1.8 | Not in release | Not in release | Not in release | Vulnerable | Not in release |
golang-1.9 | Not in release | Not in release | Not in release | Vulnerable | Not in release |
CVE-2022-2879
Medium prioritySome fixes available 10 of 18
Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After...
10 affected packages
golang-1.10, golang-1.13, golang-1.14, golang-1.16, golang-1.17...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
golang-1.10 | Not in release | Not in release | Not in release | Vulnerable | Vulnerable |
golang-1.13 | Not in release | Fixed | Fixed | Fixed | Fixed |
golang-1.14 | Not in release | Not in release | Vulnerable | Not in release | Not in release |
golang-1.16 | Not in release | Not in release | Fixed | Fixed | Ignored |
golang-1.17 | — | Vulnerable | Not in release | Not in release | Ignored |
golang-1.18 | Not in release | Fixed | Fixed | Fixed | Fixed |
golang-1.19 | Not in release | Not in release | Not in release | Not in release | Ignored |
golang-1.6 | Not in release | Not in release | Not in release | Not in release | Vulnerable |
golang-1.8 | Not in release | Not in release | Not in release | Vulnerable | Not in release |
golang-1.9 | Not in release | Not in release | Not in release | Vulnerable | Not in release |
CVE-2022-32190
Medium priorityJoinPath and URL.JoinPath do not remove ../ path elements appended to a relative path. For example, JoinPath("https://go.dev", "../go") returns the URL "https://go.dev/../go", despite the JoinPath documentation stating that ../...
9 affected packages
golang-1.10, golang-1.13, golang-1.14, golang-1.16, golang-1.17...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
golang-1.10 | — | Not in release | Not in release | Not affected | Not affected |
golang-1.13 | — | Not affected | Not affected | Not affected | Not affected |
golang-1.14 | — | Not in release | Not affected | Not in release | Ignored |
golang-1.16 | — | Not in release | Not affected | Not affected | Ignored |
golang-1.17 | — | Not affected | Not in release | Not in release | Ignored |
golang-1.18 | — | Not affected | Not affected | Not affected | Ignored |
golang-1.6 | — | Not in release | Not in release | Not in release | Not affected |
golang-1.8 | — | Not in release | Not in release | Not affected | Ignored |
golang-1.9 | — | Not in release | Not in release | Not affected | Ignored |
CVE-2022-27664
Medium prioritySome fixes available 15 of 32
In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.
14 affected packages
containerd, golang, golang-1.10, golang-1.13, golang-1.14...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
containerd | Not affected | Not affected | Not affected | Not affected | Not affected |
golang | — | Not in release | Not in release | Not in release | Ignored |
golang-1.10 | — | Not in release | Not in release | Vulnerable | Vulnerable |
golang-1.13 | Not in release | Fixed | Fixed | Fixed | Fixed |
golang-1.14 | — | Not in release | Vulnerable | Not in release | Ignored |
golang-1.16 | — | Not in release | Fixed | Fixed | Ignored |
golang-1.17 | — | Vulnerable | Not in release | Not in release | Ignored |
golang-1.18 | Not in release | Fixed | Fixed | Fixed | Fixed |
golang-1.6 | — | Not in release | Not in release | Not in release | Vulnerable |
golang-1.8 | — | Not in release | Not in release | Vulnerable | Ignored |
golang-1.9 | — | Not in release | Not in release | Vulnerable | Ignored |
golang-golang-x-net | Not affected | Vulnerable | Not in release | Not in release | Not in release |
golang-golang-x-net-dev | Not in release | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
google-guest-agent | Fixed | Fixed | Fixed | Needs evaluation | Needs evaluation |