View all vulnerabilities

CVE-2022-41717

Excessive memory growth in net/http and golang.org/x/net/http2

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests.HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
Score Vector
Affected Versions
stdlib >= 1.19.0-0 < 1.19.4; golang.org/x/net < 0.4.0
Severity
Ecosystem
GO
Publish Date
December 8, 2022
Modified Date
May 20, 2024