Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-45290
HistoryMar 05, 2024 - 12:00 a.m.

CVE-2023-45290

2024-03-0500:00:00
ubuntu.com
ubuntu.com
9
cve-2023-45290; dos attack; multipart form.

6.9 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.6%

When parsing a multipart form (either explicitly with
Request.ParseMultipartForm or implicitly with Request.FormValue,
Request.PostFormValue, or Request.FormFile), limits on the total size of
the parsed form were not applied to the memory consumed while reading a
single form line. This permits a maliciously crafted input containing very
long lines to cause allocation of arbitrarily large amounts of memory,
potentially leading to memory exhaustion. With fix, the ParseMultipartForm
function now correctly limits the maximum size of form lines.

Notes

Author Note
mdeslaur Packages built using golang need to be rebuilt once the vulnerability has been fixed. This CVE entry does not list packages that need rebuilding outside of the main repository or the Ubuntu variants with PPA overlays. Warning: do not include nullboot in the list of no-change rebuilds after fixing an issue in golang.