发布时间: 2023年12月22日
修改时间: 2025年4月25日
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.
NVD | openEuler | |
---|---|---|
Confidentiality | Low | Low |
Attack Vector | Network | Network |
CVSS评分 | 5.3 | 5.3 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-2052 | golang security update | 2023年12月22日 |
KylinSec-SA-2025-1601 | etcd security update | 2025年3月13日 |
KylinSec-SA-2025-2438 | golang security update | 2025年6月3日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | golang | Fixed |
KY3.4-5A | golang | Fixed |
KY3.5.2 | golang | Fixed |
KY3.5.1 | golang | Fixed |
V6 | golang | Fixed |