Source: golang-github-go-resty-resty
Version: 2.10.0-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/go-resty/resty/pull/745
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for golang-github-go-resty-resty.

CVE-2023-45286[0]:
| A race condition in go-resty can result in HTTP request body
| disclosure across requests. This condition can be triggered by
| calling sync.Pool.Put with the same *bytes.Buffer more than once,
| when request retries are enabled and a retry occurs. The call to
| sync.Pool.Get will then return a bytes.Buffer that hasn't had
| bytes.Buffer.Reset called on it. This dirty buffer will contain the
| HTTP request body from an unrelated request, and go-resty will
| append the current HTTP request body to it, sending two bodies in
| one request. The sync.Pool in question is defined at package level
| scope, so a completely unrelated server could receive the request
| body.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-45286
    https://www.cve.org/CVERecord?id=CVE-2023-45286
[1] https://github.com/go-resty/resty/pull/745

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to