-
Notifications
You must be signed in to change notification settings - Fork 67
x/vulndb: potential Go vuln in github.com/etcd-io/etcd: CVE-2022-34038 #2016
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Change https://go.dev/cl/522555 mentions this issue: |
The only way to trigger this CVE is to dynamically change an unexported variable's value at runtime. I am curious how can it be done? |
This is some big misunderstanding. Yes, there is a function in etcd util packages called There is no way to exploit this. Also etcd-io/etcd#14452 is not a proper fix, it adds validation that will also panic, but will provide a nice error. |
Thanks for pointing this out! It would have been excluded from the database either way, but we'll update the reason to be "not a vuln" |
Change https://go.dev/cl/524456 mentions this issue: |
Aliases: CVE-2022-34038, GHSA-65rp-cv85-263x Updates #2016 Change-Id: I9008796db816c8005579b3f809127d0b2ccef56d Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/524456 Run-TryBot: Maceo Thompson <maceothompson@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Damien Neil <dneil@google.com>
CVE-2022-34038 references github.com/etcd-io/etcd, which may be a Go module.
Description:
Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: