-
Notifications
You must be signed in to change notification settings - Fork 17.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/net/html: infinite loop in ParseFragment #46288
Comments
Fixed by CL 311090 |
Hi @FiloSottile Is version upgrade required for golang.org/x/net to v0.0.0-20210520170846-37e1c6afe023 or the latest in relevant release branches to mitigate the issue? -- Piyush |
To fix this issue, your module needs to depend on golang.org/x/net v0.0.0-20210520170846-37e1c6afe023 or later. There are no release branches on golang.org/x/net. |
Thanks for the response. Currently, golang.org/x/net is on v0.0.0-20210428183300-3f4a416c7d3b in release-branch.go1.16 - Line 7 in cb4cd9e
Is exploit possible in 1.16 as golang.org/x/net is not at v0.0.0-20210520170846-37e1c6afe023 or higher? |
Go 1.16 doesn't use the golang.org/x/net/html package so is unaffected even if it imports an older version of other golang.org/x/net packages. |
Thanks for confirming @FiloSottile. |
CVE-2021-33194: upgrade golang/x/net CVE-2019-19794: upgrade github.com/miekg/dns CVE-2021-29482: upgrade github.com/ulikunitz/xz CVE-2020-27813: upgrade github.com/gorilla/websocket References: golang/go#46288 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33194
CVE-2021-33194: upgrade golang/x/net CVE-2019-19794: upgrade github.com/miekg/dns CVE-2021-29482: upgrade github.com/ulikunitz/xz CVE-2020-27813: upgrade github.com/gorilla/websocket References: golang/go#46288 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33194
CVE-2021-33194: upgrade golang/x/net CVE-2019-19794: upgrade github.com/miekg/dns CVE-2021-29482: upgrade github.com/ulikunitz/xz CVE-2020-27813: upgrade github.com/gorilla/websocket References: golang/go#46288 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33194
CVE-2021-33194: upgrade golang/x/net CVE-2019-19794: upgrade github.com/miekg/dns CVE-2021-29482: upgrade github.com/ulikunitz/xz CVE-2020-27813: upgrade github.com/gorilla/websocket References: golang/go#46288 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33194
x/net/html.ParseFragment can enter an infinite loop when provided inputs that mix
<math>
and<template>
tags.This was originally found by OSS-Fuzz, and was reported to us by Andrew Thornton ([email protected]).
This is tracked as CVE-2021-33194.
The text was updated successfully, but these errors were encountered: