Skip to content

Commit d566c92

Browse files
committed
data/reports: add GO-2022-0969.yaml for CVE-2022-27664
Fixes #969 Change-Id: Id06310e824dee8272a89119579d0e903ea071d46 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/430395 Run-TryBot: Damien Neil <dneil@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Tatiana Bradley <tatiana@golang.org>
1 parent 419de1b commit d566c92

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed

data/reports/GO-2022-0969.yaml

+43
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
modules:
2+
- module: std
3+
versions:
4+
- fixed: 1.18.6
5+
- introduced: 1.19.0
6+
fixed: 1.19.1
7+
vulnerable_at: 1.19.0
8+
packages:
9+
- package: net/http
10+
symbols:
11+
- http2serverConn.goAway
12+
derived_symbols:
13+
- ListenAndServe
14+
- ListenAndServeTLS
15+
- Serve
16+
- ServeTLS
17+
- Server.ListenAndServe
18+
- Server.ListenAndServeTLS
19+
- Server.Serve
20+
- Server.ServeTLS
21+
- http2Server.ServeConn
22+
- module: golang.org/x/net
23+
versions:
24+
- fixed: 0.0.0-20220906165146-f3363e06e74c
25+
vulnerable_at: 0.0.0-20220826154423-83b083e8dc8b
26+
packages:
27+
- package: golang.org/x/net/http2
28+
symbols:
29+
- serverConn.goAway
30+
derived_symbols:
31+
- Server.ServeConn
32+
description: |
33+
HTTP/2 server connections can hang forever waiting for a clean shutdown
34+
that was preempted by a fatal error. This condition can be exploited
35+
by a malicious client to cause a denial of service.
36+
cves:
37+
- CVE-2022-27664
38+
credit: Bahruz Jabiyev, Tommaso Innocenti, Anthony Gavazzi, Steven Sprecher, and Kaan
39+
Onarlioglu
40+
references:
41+
- web: https://groups.google.com/g/golang-announce/c/x49AQzIVX-s
42+
- report: https://go.dev/issue/54658
43+
- fix: https://go.dev/cl/428735

0 commit comments

Comments
 (0)