Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).
References
Link | Resource |
---|---|
https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E | Mailing List Vendor Advisory |
https://pkg.go.dev/vuln/GO-2023-1570 | Vendor Advisory |
https://go.dev/cl/468125 | Patch Release Notes |
https://go.dev/issue/58001 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-02-28 10:15
Updated : 2023-03-09 20:58
NVD link : CVE-2022-41724
Mitre link : CVE-2022-41724
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
golang
- go