logo

CVE-2019-9512 golang.org/x/net

Package

Manager: go
Name: golang.org/x/net
Vulnerable Version: >=0 <0.0.0-20190813141303-74dc4d7220e7

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.17862 pctl0.94886

Details

golang.org/x/net/http vulnerable to ping floods Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. ### Specific Go Packages Affected golang.org/x/net/http2

Metadata

Created: 2022-05-24T16:53:17Z
Modified: 2024-05-20T21:30:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-hgr8-6h9x-f7q9/GHSA-hgr8-6h9x-f7q9.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-hgr8-6h9x-f7q9
Finding: F067
Auto approve: 1