-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/vulndb: potential Go vuln in github.com/etcd-io/etcd: CVE-2022-34038 #2016
Comments
Change https://go.dev/cl/522555 mentions this issue: |
The only way to trigger this CVE is to dynamically change an unexported variable's value at runtime. I am curious how can it be done? |
This is some big misunderstanding. Yes, there is a function in etcd util packages called There is no way to exploit this. Also etcd-io/etcd#14452 is not a proper fix, it adds validation that will also panic, but will provide a nice error. |
Thanks for pointing this out! It would have been excluded from the database either way, but we'll update the reason to be "not a vuln" |
Change https://go.dev/cl/524456 mentions this issue: |
Aliases: CVE-2022-34038, GHSA-65rp-cv85-263x Updates #2016 Change-Id: I9008796db816c8005579b3f809127d0b2ccef56d Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/524456 Run-TryBot: Maceo Thompson <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Damien Neil <[email protected]>
CVE-2022-34038 references github.com/etcd-io/etcd, which may be a Go module.
Description:
Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: