blob: 403c2e7fbf8087cd5f88f262934a6665a60b648f [file] [log] [blame]
packages:
- module: github.com/gorilla/websocket
symbols:
- Conn.advanceFrame
- messageReader.Read
derived_symbols:
- Conn.Close
- Conn.NextReader
- Conn.ReadJSON
- Conn.ReadMessage
- Conn.WriteJSON
- Conn.WritePreparedMessage
- Dialer.Dial
- Dialer.DialContext
- NewClient
- NewPreparedMessage
- ReadJSON
- Subprotocols
- Upgrade
- Upgrader.Upgrade
- WriteJSON
- httpProxyDialer.Dial
- netDialerFunc.Dial
- proxy_direct.Dial
- proxy_envOnce.Get
- proxy_socks5.Dial
versions:
- fixed: 1.4.1
description: |
An attacker can craft malicious WebSocket frames that cause an integer
overflow in a variable which tracks the number of bytes remaining. This
may cause the server or client to get stuck attempting to read frames
in a loop, which can be used as a denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-27813
ghsas:
- GHSA-3xh2-74w9-5vxm
credit: Max Justicz
links:
pr: https://github.com/gorilla/websocket/pull/537
commit: https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37