Code Monkey home page Code Monkey logo

golang-examples's Issues

CVE-2020-28852 (High) detected in github.com/golang/text/internal/language-v0.3.3

CVE-2020-28852 - High Severity Vulnerability

Vulnerable Library - github.com/golang/text/internal/language-v0.3.3

[mirror] Go text processing support

Dependency Hierarchy:

  • simonwaldherr.de/go/gwv-v0.7.0 (Root Library)
    • github.com/golang/net/http2-v0.1.0
      • github.com/golang/net/http/httpguts-v0.1.0
        • github.com/golang/net/idna-v0.1.0
          • github.com/golang/text/secure/bidirule-v0.3.3
            • github.com/golang/text/unicode/bidi-v0.3.3
              • github.com/golang/text/unicode/rangetable-v0.3.3
                • github.com/golang/text/language-v0.3.3
                  • github.com/golang/text/internal/language-v0.3.3 (Vulnerable Library)

Vulnerability Details

In x/text in Go before v0.3.5, a "slice bounds out of range" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag. (x/text/language is supposed to be able to parse an HTTP Accept-Language header.)

Publish Date: 2021-01-02

URL: CVE-2020-28852

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-28852

Release Date: 2021-01-02

Fix Resolution: golang-golang-x-text-dev - 0.3.5-1,0.3.5-1

CVE-2022-32149 (High) detected in github.com/golang/text/language-v0.3.3

CVE-2022-32149 - High Severity Vulnerability

Vulnerable Library - github.com/golang/text/language-v0.3.3

[mirror] Go text processing support

Dependency Hierarchy:

  • simonwaldherr.de/go/gwv-v0.7.0 (Root Library)
    • github.com/golang/net/http2-v0.1.0
      • github.com/golang/net/http/httpguts-v0.1.0
        • github.com/golang/net/idna-v0.1.0
          • github.com/golang/text/secure/bidirule-v0.3.3
            • github.com/golang/text/unicode/bidi-v0.3.3
              • github.com/golang/text/unicode/rangetable-v0.3.3
                • github.com/golang/text/language-v0.3.3 (Vulnerable Library)

Vulnerability Details

An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.

Publish Date: 2022-10-14

URL: CVE-2022-32149

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2022-32149

Release Date: 2022-10-14

Fix Resolution: v0.3.8

CVE-2020-28851 (High) detected in github.com/golang/text/internal/language-v0.3.3

CVE-2020-28851 - High Severity Vulnerability

Vulnerable Library - github.com/golang/text/internal/language-v0.3.3

[mirror] Go text processing support

Dependency Hierarchy:

  • simonwaldherr.de/go/gwv-v0.7.0 (Root Library)
    • github.com/golang/net/http2-v0.1.0
      • github.com/golang/net/http/httpguts-v0.1.0
        • github.com/golang/net/idna-v0.1.0
          • github.com/golang/text/secure/bidirule-v0.3.3
            • github.com/golang/text/unicode/bidi-v0.3.3
              • github.com/golang/text/unicode/rangetable-v0.3.3
                • github.com/golang/text/language-v0.3.3
                  • github.com/golang/text/internal/language-v0.3.3 (Vulnerable Library)

Vulnerability Details

In x/text in Go 1.15.4, an "index out of range" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension. (x/text/language is supposed to be able to parse an HTTP Accept-Language header.)

Publish Date: 2021-01-02

URL: CVE-2020-28851

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-28851

Release Date: 2021-01-02

Fix Resolution: golang-golang-x-text-dev - 0.3.6-1,0.3.6-1

CVE-2021-38561 (High) detected in github.com/golang/text/internal/language-v0.3.3, github.com/golang/text/language-v0.3.3

CVE-2021-38561 - High Severity Vulnerability

Vulnerable Libraries - github.com/golang/text/internal/language-v0.3.3, github.com/golang/text/language-v0.3.3

github.com/golang/text/internal/language-v0.3.3

[mirror] Go text processing support

Dependency Hierarchy:

  • simonwaldherr.de/go/gwv-v0.7.0 (Root Library)
    • github.com/golang/net/http2-v0.1.0
      • github.com/golang/net/http/httpguts-v0.1.0
        • github.com/golang/net/idna-v0.1.0
          • github.com/golang/text/secure/bidirule-v0.3.3
            • github.com/golang/text/unicode/bidi-v0.3.3
              • github.com/golang/text/unicode/rangetable-v0.3.3
                • github.com/golang/text/language-v0.3.3
                  • github.com/golang/text/internal/language-v0.3.3 (Vulnerable Library)
github.com/golang/text/language-v0.3.3

[mirror] Go text processing support

Dependency Hierarchy:

  • simonwaldherr.de/go/gwv-v0.7.0 (Root Library)
    • github.com/golang/net/http2-v0.1.0
      • github.com/golang/net/http/httpguts-v0.1.0
        • github.com/golang/net/idna-v0.1.0
          • github.com/golang/text/secure/bidirule-v0.3.3
            • github.com/golang/text/unicode/bidi-v0.3.3
              • github.com/golang/text/unicode/rangetable-v0.3.3
                • github.com/golang/text/language-v0.3.3 (Vulnerable Library)

Vulnerability Details

golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack.

Publish Date: 2022-12-26

URL: CVE-2021-38561

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://osv.dev/vulnerability/GO-2021-0113

Release Date: 2021-08-12

Fix Resolution: v0.3.7

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.