The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given "maxMemory" limit. It was possible for an attacker to generate a multipart request crafted such that the server ran out of file descriptors. Upstream bug: https://github.com/golang/go/issues/17965 Upstream patch: https://go-review.googlesource.com/#/c/30410/ External Reference: https://groups.google.com/forum/#!msg/golang-dev/4NdLzS8sls8/uIz8QlnIBQAJ
Created golang tracking bugs for this issue: Affects: fedora-all [bug 1401987] Affects: epel-all [bug 1401988]
Upstream commit: https://go.googlesource.com/go/+/7478ea5dba7ed02ddffd91c1d17ec8141f7cf184 https://github.com/golang/go/commit/7478ea5dba7ed02ddffd91c1d17ec8141f7cf184 Upstream bug with more details: https://github.com/golang/go/issues/16296