Vulnerabilites related to Go standard library - encoding/xml
cve-2022-28131
Vulnerability from cvelistv5
Published
2022-08-09 00:00
Modified
2024-08-03 05:48
Severity ?
EPSS score ?
Summary
Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Go standard library | encoding/xml |
Version: 0 ≤ Version: 1.18.0-0 ≤ |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T05:48:36.830Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://go.dev/cl/417062", }, { tags: [ "x_transferred", ], url: "https://go.googlesource.com/go/+/08c46ed43d80bbb67cb904944ea3417989be4af3", }, { tags: [ "x_transferred", ], url: "https://go.dev/issue/53614", }, { tags: [ "x_transferred", ], url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, { tags: [ "x_transferred", ], url: "https://pkg.go.dev/vuln/GO-2022-0521", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { collectionURL: "https://pkg.go.dev", defaultStatus: "unaffected", packageName: "encoding/xml", product: "encoding/xml", programRoutines: [ { name: "Decoder.Skip", }, ], vendor: "Go standard library", versions: [ { lessThan: "1.17.12", status: "affected", version: "0", versionType: "semver", }, { lessThan: "1.18.4", status: "affected", version: "1.18.0-0", versionType: "semver", }, ], }, ], credits: [ { lang: "en", value: "Go Security Team", }, { lang: "en", value: "Juho Nurminen of Mattermost", }, ], descriptions: [ { lang: "en", value: "Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document.", }, ], problemTypes: [ { descriptions: [ { description: "CWE-674: Uncontrolled Recursion", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-06-12T19:04:35.004Z", orgId: "1bb62c36-49e3-4200-9d77-64a1400537cc", shortName: "Go", }, references: [ { url: "https://go.dev/cl/417062", }, { url: "https://go.googlesource.com/go/+/08c46ed43d80bbb67cb904944ea3417989be4af3", }, { url: "https://go.dev/issue/53614", }, { url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, { url: "https://pkg.go.dev/vuln/GO-2022-0521", }, ], title: "Stack exhaustion from deeply nested XML documents in encoding/xml", }, }, cveMetadata: { assignerOrgId: "1bb62c36-49e3-4200-9d77-64a1400537cc", assignerShortName: "Go", cveId: "CVE-2022-28131", datePublished: "2022-08-09T00:00:00", dateReserved: "2022-03-29T00:00:00", dateUpdated: "2024-08-03T05:48:36.830Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-30633
Vulnerability from cvelistv5
Published
2022-08-09 20:16
Modified
2024-08-03 06:56
Severity ?
EPSS score ?
Summary
Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Go standard library | encoding/xml |
Version: 0 ≤ Version: 1.18.0-0 ≤ |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T06:56:13.196Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://go.dev/cl/417061", }, { tags: [ "x_transferred", ], url: "https://go.googlesource.com/go/+/c4c1993fd2a5b26fe45c09592af6d3388a3b2e08", }, { tags: [ "x_transferred", ], url: "https://go.dev/issue/53611", }, { tags: [ "x_transferred", ], url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, { tags: [ "x_transferred", ], url: "https://pkg.go.dev/vuln/GO-2022-0523", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { collectionURL: "https://pkg.go.dev", defaultStatus: "unaffected", packageName: "encoding/xml", product: "encoding/xml", programRoutines: [ { name: "Decoder.DecodeElement", }, { name: "Decoder.unmarshal", }, { name: "Decoder.unmarshalPath", }, ], vendor: "Go standard library", versions: [ { lessThan: "1.17.12", status: "affected", version: "0", versionType: "semver", }, { lessThan: "1.18.4", status: "affected", version: "1.18.0-0", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag.", }, ], problemTypes: [ { descriptions: [ { description: "CWE-674: Uncontrolled Recursion", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-06-12T19:04:39.511Z", orgId: "1bb62c36-49e3-4200-9d77-64a1400537cc", shortName: "Go", }, references: [ { url: "https://go.dev/cl/417061", }, { url: "https://go.googlesource.com/go/+/c4c1993fd2a5b26fe45c09592af6d3388a3b2e08", }, { url: "https://go.dev/issue/53611", }, { url: "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", }, { url: "https://pkg.go.dev/vuln/GO-2022-0523", }, ], title: "Stack exhaustion when unmarshaling certain documents in encoding/xml", }, }, cveMetadata: { assignerOrgId: "1bb62c36-49e3-4200-9d77-64a1400537cc", assignerShortName: "Go", cveId: "CVE-2022-30633", datePublished: "2022-08-09T20:16:19", dateReserved: "2022-05-12T00:00:00", dateUpdated: "2024-08-03T06:56:13.196Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }