7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
43.8%
A denial of service is possible from excessive resource consumption in
net/http and mime/multipart. Multipart form parsing with
mime/multipart.Reader.ReadForm can consume largely unlimited amounts of
memory and disk files. This also affects form parsing in the net/http
package with the Request methods FormFile, FormValue, ParseMultipartForm,
and PostFormValue. ReadForm takes a maxMemory parameter, and is documented
as storing “up to maxMemory bytes +10MB (reserved for non-file parts) in
memory”. File parts which cannot be stored in memory are stored on disk in
temporary files. The unconfigurable 10MB reserved for non-file parts is
excessively large and can potentially open a denial of service vector on
its own. However, ReadForm did not properly account for all memory consumed
by a parsed form, such as map entry overhead, part names, and MIME headers,
permitting a maliciously crafted form to consume well over 10MB. In
addition, ReadForm contained no limit on the number of disk files created,
permitting a relatively small request body to create a large number of disk
temporary files. With fix, ReadForm now properly accounts for various forms
of memory overhead, and should now stay within its documented limit of 10MB
Author | Note |
---|---|
mdeslaur | containerd doesn’t appear to use the vulnerable functions |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | golang-1.10 | < any | UNKNOWN |
ubuntu | 14.04 | noarch | golang-1.10 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | golang-1.10 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | golang-1.13 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | golang-1.13 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | golang-1.13 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | golang-1.13 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | golang-1.14 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | golang-1.16 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | golang-1.16 | < any | UNKNOWN |
github.com/golang/go/commit/5c55ac9bf1e5f779220294c843526536605f42ab [1.19]
groups.google.com/g/golang-announce/c/V0aBFqaFs_E
launchpad.net/bugs/cve/CVE-2022-41725
nvd.nist.gov/vuln/detail/CVE-2022-41725
security-tracker.debian.org/tracker/CVE-2022-41725
ubuntu.com/security/notices/USN-6140-1
www.cve.org/CVERecord?id=CVE-2022-41725
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
43.8%