First published: Tue Jul 12 2022(Updated: )
A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/skupper-cli | <0:1.0.2-2.el8 | 0:1.0.2-2.el8 |
redhat/openshift-serverless-clients | <0:1.3.1-4.el8 | 0:1.3.1-4.el8 |
redhat/go-toolset | <1.17-golang-0:1.17.12-1.el7_9 | 1.17-golang-0:1.17.12-1.el7_9 |
redhat/grafana | <0:7.5.15-3.el8 | 0:7.5.15-3.el8 |
redhat/golang | <0:1.17.12-1.el9_0 | 0:1.17.12-1.el9_0 |
redhat/grafana | <0:7.5.15-3.el9 | 0:7.5.15-3.el9 |
redhat/kubevirt | <0:4.12.0-1057.el7 | 0:4.12.0-1057.el7 |
redhat/kubevirt | <0:4.12.0-1057.el8 | 0:4.12.0-1057.el8 |
Golang Go | <1.17.12 | |
Golang Go | >=1.18.0<1.18.4 | |
redhat/golang | <1.18.4 | 1.18.4 |
redhat/golang | <1.17.12 | 1.17.12 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | 1.19.8-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-1962 is a vulnerability in go/parser, a part of the golang standard library, that can lead to a system panic and impact system availability when parsing deeply nested types or declarations in Go source code.
CVE-2022-1962 has a severity rating of medium with a CVSS score of 5.5.
CVE-2022-1962 can cause a panic and lead to system unavailability when calling Parse functions on Go source code that contains deeply nested types or declarations.
To fix CVE-2022-1962, update golang to version 1.18.4 or 1.17.12, depending on your current version.
You can find more information about CVE-2022-1962 on the Red Hat Bugzilla page and the Red Hat Advisory page.