Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/hashicorp/vault: GHSA-g233-2p4r-3q7v #3246

Closed
GoVulnBot opened this issue Oct 31, 2024 · 1 comment
Assignees
Labels

Comments

@GoVulnBot
Copy link

Advisory GHSA-g233-2p4r-3q7v references a vulnerability in the following Go modules:

Module
github.com/hashicorp/vault

Description:
Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint. An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.

This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/hashicorp/vault
      versions:
        - introduced: 1.2.0
        - fixed: 1.18.1
      vulnerable_at: 1.18.0
summary: Hashicorp Vault vulnerable to denial of service through memory exhaustion in github.com/hashicorp/vault
cves:
    - CVE-2024-8185
ghsas:
    - GHSA-g233-2p4r-3q7v
references:
    - advisory: https://github.com/advisories/GHSA-g233-2p4r-3q7v
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-8185
    - fix: https://github.com/hashicorp/vault/commit/195dfca433028887973f5bd82d173d91fe9dab4a
    - web: https://discuss.hashicorp.com/t/hcsec-2024-26-vault-vulnerable-to-denial-of-service-through-memory-exhaustion-when-processing-raft-cluster-join-requests/71047
source:
    id: GHSA-g233-2p4r-3q7v
    created: 2024-10-31T21:01:26.317811365Z
review_status: UNREVIEWED

@zpavlinovic zpavlinovic self-assigned this Nov 1, 2024
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/624496 mentions this issue: data/reports: add GO-2024-3246

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants