Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

encoding/binary: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs [Go 1.13] #40620

Closed
katiehockman opened this issue Aug 6, 2020 · 0 comments
Labels
CherryPickApproved Used during the release process for point releases FrozenDueToAge Security
Milestone

Comments

@katiehockman
Copy link
Contributor

This is a tracking issue for #40618, a security vulnerability fixed in Go 1.13.15.

@katiehockman katiehockman added Security CherryPickApproved Used during the release process for point releases labels Aug 6, 2020
@katiehockman katiehockman added this to the Go1.13.15 milestone Aug 6, 2020
woodsts pushed a commit to woodsts/buildroot that referenced this issue Sep 8, 2020
Fixes the following security issue:

CVE-2020-16845: Go before 1.13.15 and 14.x before 1.14.7 can have an
infinite read loop in ReadUvarint and ReadVarint in encoding/binary via
invalid inputs

golang/go#40620

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
woodsts pushed a commit to woodsts/buildroot that referenced this issue Sep 8, 2020
Fixes the following security issue:

CVE-2020-16845: Go before 1.13.15 and 14.x before 1.14.7 can have an
infinite read loop in ReadUvarint and ReadVarint in encoding/binary via
invalid inputs

golang/go#40620

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
woodsts pushed a commit to woodsts/buildroot that referenced this issue Sep 8, 2020
Fixes the following security issue:

CVE-2020-16845: Go before 1.13.15 and 14.x before 1.14.7 can have an
infinite read loop in ReadUvarint and ReadVarint in encoding/binary via
invalid inputs

golang/go#40620

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
@golang golang locked and limited conversation to collaborators Aug 6, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
CherryPickApproved Used during the release process for point releases FrozenDueToAge Security
Projects
None yet
Development

No branches or pull requests

2 participants