| Severity |
|
| Remote |
|
| Type |
| - |
Unknown |
| + |
Denial of service |
|
| Description |
| + |
A security issue has been found in go before version 1.17.5. An attacker can cause unbounded memory growth in a Go server accepting HTTP/2 requests. |
|
| References |
| + |
https://groups.google.com/g/golang-announce/c/hcmEScgc00k |
| + |
https://github.com/golang/go/issues/50058 |
| + |
https://github.com/golang/net/commit/491a49abca63de5e07ef554052d180a1b5fe2d70 |
| + |
https://github.com/golang/go/commit/48d948963c5ce7add72af5665a871caff6c1d35a |
|
| Notes |
| + |
Workaround |
| + |
========== |
| + |
|
| + |
The issue can be mitigated by setting the GODEBUG=http2server=0 environment variable before calling Serve, which will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package. |
|