First published: Thu Mar 03 2022(Updated: )
Golang Go is vulnerable to a denial of service, caused by improper input validation. By using a specially-crafted deeply nested expression, a remote attacker could exploit this vulnerability to cause a goroutine stack exhaustion, and results in a denial of service condition.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.3.1-4.el8 | 0:1.3.1-4.el8 |
redhat/servicemesh | <0:2.1.5-1.el8 | 0:2.1.5-1.el8 |
redhat/go-toolset | <1.17-golang-0:1.17.10-1.el7_9 | 1.17-golang-0:1.17.10-1.el7_9 |
redhat/golang | <0:1.17.12-1.el9_0 | 0:1.17.12-1.el9_0 |
redhat/go-toolset | <0:1.17.12-1.el9_0 | 0:1.17.12-1.el9_0 |
redhat/cri-o | <0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7 | 0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7 |
redhat/cri-tools | <0:1.23.0-1.1.el8 | 0:1.23.0-1.1.el8 |
redhat/butane | <0:0.15.0-1.rhaos4.11.el8 | 0:0.15.0-1.rhaos4.11.el8 |
redhat/ignition | <0:2.14.0-3.rhaos4.11.el8 | 0:2.14.0-3.rhaos4.11.el8 |
redhat/openshift-clients | <0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8 | 0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8 |
redhat/kubevirt | <0:4.12.0-1057.el7 | 0:4.12.0-1057.el7 |
redhat/kubevirt | <0:4.12.0-1057.el8 | 0:4.12.0-1057.el8 |
Golang Go | <1.16.15 | |
Golang Go | >=1.17<1.17.8 | |
Netapp Astra Trident | ||
Debian Debian Linux | =9.0 | |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-24921 is a vulnerability found in Golang's regexp module that can cause a stack overflow leading to a runtime crash.
CVE-2022-24921 can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps, potentially leading to denial of service.
Golang versions before 1.16.15 and 1.17.x before 1.17.8 are affected by CVE-2022-24921.
CVE-2022-24921 has a severity score of 7.5 (high).
To fix CVE-2022-24921, upgrade to Golang version 1.16.15 or 1.17.8, depending on the version you are using.