NA

CVE-2023-45290

Published: 05/03/2024 Updated: 01/05/2024

Vulnerability Summary

Description<!---->A flaw exists in Go's net/http standard library package. When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This issue permitted a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to a denial of service.A flaw exists in Go's net/http standard library package. When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This issue permitted a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to a denial of service.

Vendor Advisories

Description<!---->A flaw was discovered in Go's net/http standard library package When parsing a multipart form (either explicitly with RequestParseMultipartForm or implicitly with RequestFormValue, RequestPostFormValue, or RequestFormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a sin ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> 5 CVEs fixed in Go 1221 and Go 1218, 1 CVE fixed in googlegolangorg/protobuf <!--X-Subject-Header-End--> <!--X-Head-of-M ...