CVE-2022-41723:
golang.org/x/net vulnerable to Uncontrolled Resource Consumption
7.5
CVSS ScoreBasic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
golang.org/x/net | go | < 0.7.0 | 0.7.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerable functions were identified based on the GO-2023-1571 vulnerability report from vuln.go.dev, which explicitly lists the affected symbols within the golang.org/x/net/http2/hpack package. The vulnerability description points to excessive CPU consumption in the HPACK decoder. The listed functions are all methods of the HPACK Decoder and are directly involved in processing and parsing the HTTP/2 stream, making them the locus of the uncontrolled resource consumption. Attempts to fetch direct commit diffs were unsuccessful, so the analysis relies on the trusted vulnerability database information. The file_path is set to the package path as the exact file names were not available from the provided information, but the symbols clearly indicate the package.