Closed mend-for-github-com[bot] closed 6 months ago
github.com/golang/net-v0.0.0-20200301022130-244492dfa37a
[mirror] Go supplementary network libraries
Library home page: https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20200301022130-244492dfa37a.zip
Path to dependency file: /examples/load-reporting-service/go.mod
Path to vulnerable library: /examples/load-reporting-service/go.mod
Dependency Hierarchy: - github.com/grpc/grpc-go-v1.25.1 (Root Library) - :x: **github.com/golang/net-v0.0.0-20200301022130-244492dfa37a** (Vulnerable Library)
Library home page: https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20190403144856-b630fd6fe46b.zip
Path to dependency file: /examples/ext_authz/auth/grpc-service/go.mod
Path to vulnerable library: /examples/ext_authz/auth/grpc-service/go.mod
Dependency Hierarchy: - github.com/grpc/grpc-go-v1.25.1 (Root Library) - :x: **github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b** (Vulnerable Library)
Found in base branch: main
net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.
Publish Date: 2022-01-01
URL: CVE-2021-44716
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-vc3p-29h2-gpcp
Release Date: 2022-01-01
Fix Resolution: github.com/golang/net - 491a49abca63de5e07ef554052d180a1b5fe2d70
:information_source: This issue was automatically closed by Mend because it is a duplicate of an existing issue: #57
CVE-2021-44716 - High Severity Vulnerability
Vulnerable Libraries - github.com/golang/net-v0.0.0-20200301022130-244492dfa37a, github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b
github.com/golang/net-v0.0.0-20200301022130-244492dfa37a
[mirror] Go supplementary network libraries
Library home page: https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20200301022130-244492dfa37a.zip
Path to dependency file: /examples/load-reporting-service/go.mod
Path to vulnerable library: /examples/load-reporting-service/go.mod
Dependency Hierarchy: - github.com/grpc/grpc-go-v1.25.1 (Root Library) - :x: **github.com/golang/net-v0.0.0-20200301022130-244492dfa37a** (Vulnerable Library)
github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b
[mirror] Go supplementary network libraries
Library home page: https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20190403144856-b630fd6fe46b.zip
Path to dependency file: /examples/ext_authz/auth/grpc-service/go.mod
Path to vulnerable library: /examples/ext_authz/auth/grpc-service/go.mod
Dependency Hierarchy: - github.com/grpc/grpc-go-v1.25.1 (Root Library) - :x: **github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b** (Vulnerable Library)
Found in base branch: main
Vulnerability Details
net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.
Publish Date: 2022-01-01
URL: CVE-2021-44716
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-vc3p-29h2-gpcp
Release Date: 2022-01-01
Fix Resolution: github.com/golang/net - 491a49abca63de5e07ef554052d180a1b5fe2d70