-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
x/vulndb: potential Go vuln in github.com/etcd-io/etcd: CVE-2022-34038 #2016
Comments
Change https://go.dev/cl/522555 mentions this issue: |
The only way to trigger this CVE is to dynamically change an unexported variable's value at runtime. I am curious how can it be done? |
This is some big misunderstanding. Yes, there is a function in etcd util packages called There is no way to exploit this. Also etcd-io/etcd#14452 is not a proper fix, it adds validation that will also panic, but will provide a nice error. |
Thanks for pointing this out! It would have been excluded from the database either way, but we'll update the reason to be "not a vuln" |
Change https://go.dev/cl/524456 mentions this issue: |
Aliases: CVE-2022-34038, GHSA-65rp-cv85-263x Updates #2016 Change-Id: I9008796db816c8005579b3f809127d0b2ccef56d Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/524456 Run-TryBot: Maceo Thompson <maceothompson@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Damien Neil <dneil@google.com>
CVE-2022-34038 references github.com/etcd-io/etcd, which may be a Go module.
Description:
Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: