First published: Tue Sep 06 2022(Updated: )
A closing HTTP/2 server connection could hang forever waiting for a clean shutdown that was preempted by a subsequent fatal error. This failure mode could be exploited to cause a denial of service. References: <a href="https://go.dev/issue/54658">https://go.dev/issue/54658</a> <a href="https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ">https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ</a> Upstream Commits: Master: <a href="https://github.com/golang/go/commit/29af494fca8a25d7d46276f6d4835c4dcd09e47d">https://github.com/golang/go/commit/29af494fca8a25d7d46276f6d4835c4dcd09e47d</a> Branch.go1.18 : <a href="https://github.com/golang/go/commit/5bc9106458fc07851ac324a4157132a91b1f3479">https://github.com/golang/go/commit/5bc9106458fc07851ac324a4157132a91b1f3479</a> Branch.go1.19 : <a href="https://github.com/golang/go/commit/9cfe4e258b1c9d4a04a42539c21c7bdb2e227824">https://github.com/golang/go/commit/9cfe4e258b1c9d4a04a42539c21c7bdb2e227824</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.6.1-1.el8 | 0:1.6.1-1.el8 |
redhat/git-lfs | <0:2.13.3-3.el8_6 | 0:2.13.3-3.el8_6 |
redhat/osbuild-composer | <0:75-1.el8 | 0:75-1.el8 |
redhat/weldr-client | <0:35.9-2.el8 | 0:35.9-2.el8 |
redhat/grafana | <0:7.5.15-4.el8 | 0:7.5.15-4.el8 |
redhat/grafana-pcp | <0:3.2.0-3.el8 | 0:3.2.0-3.el8 |
redhat/golang | <0:1.18.9-1.el9_1 | 0:1.18.9-1.el9_1 |
redhat/grafana | <0:9.0.9-2.el9 | 0:9.0.9-2.el9 |
redhat/grafana-pcp | <0:5.1.1-1.el9 | 0:5.1.1-1.el9 |
redhat/butane | <0:0.16.0-1.el9 | 0:0.16.0-1.el9 |
redhat/osbuild-composer | <0:76-2.el9_2 | 0:76-2.el9_2 |
redhat/weldr-client | <0:35.9-1.el9 | 0:35.9-1.el9 |
redhat/toolbox | <0:0.0.99.3-9.el9 | 0:0.0.99.3-9.el9 |
redhat/git-lfs | <0:3.2.0-1.el9 | 0:3.2.0-1.el9 |
redhat/cri-o | <0:1.24.4-5.rhaos4.11.git57d7127.el8 | 0:1.24.4-5.rhaos4.11.git57d7127.el8 |
redhat/cri-tools | <0:1.24.2-7.el8 | 0:1.24.2-7.el8 |
redhat/cri-o | <0:1.25.1-5.rhaos4.12.git6005903.el8 | 0:1.25.1-5.rhaos4.12.git6005903.el8 |
redhat/cri-tools | <0:1.25.0-2.el8 | 0:1.25.0-2.el8 |
redhat/openshift-clients | <0:4.12.0-202301042257.p0.g854f807.assembly.stream.el8 | 0:4.12.0-202301042257.p0.g854f807.assembly.stream.el8 |
redhat/podman | <3:4.2.0-7.rhaos4.12.el9 | 3:4.2.0-7.rhaos4.12.el9 |
redhat/skopeo | <2:1.9.4-3.rhaos4.12.el9 | 2:1.9.4-3.rhaos4.12.el9 |
redhat/openshift-clients | <0:4.12.0-202308151125.p0.gf61957e.assembly.stream.el9 | 0:4.12.0-202308151125.p0.gf61957e.assembly.stream.el9 |
redhat/openshift-clients | <0:4.13.0-202308112024.p0.g17b7acc.assembly.stream.el9 | 0:4.13.0-202308112024.p0.g17b7acc.assembly.stream.el9 |
redhat/etcd | <0:3.3.23-12.el8 | 0:3.3.23-12.el8 |
redhat/kubevirt | <0:4.13.0-1469.el7 | 0:4.13.0-1469.el7 |
redhat/kubevirt | <0:4.13.0-1469.el8 | 0:4.13.0-1469.el8 |
redhat/kubevirt | <0:4.13.0-1469.el9 | 0:4.13.0-1469.el9 |
Golang Go | <1.18.6 | |
Golang Go | =1.19.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
go/golang.org/x/net/http2 | <0.0.0-20220906165146-f3363e06e74c | 0.0.0-20220906165146-f3363e06e74c |
go/golang.org/x/net | <0.0.0-20220906165146-f3363e06e74c | 0.0.0-20220906165146-f3363e06e74c |
redhat/golang | <1.19.1 | 1.19.1 |
redhat/golang | <1.18.6 | 1.18.6 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | 1.19.8-2 | |
debian/golang-golang-x-net | <=1:0.0+git20210119.5f4716e+dfsg-4 | 1:0.7.0+dfsg-1 1:0.27.0-1 |
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-27664 is a vulnerability in the golang package that allows a denial of service attack by causing a closing HTTP/2 server connection to hang.
CVE-2022-27664 affects Golang Go by enabling a remote attacker to exploit the vulnerability and cause a denial of service condition.
CVE-2022-27664 has a severity level of high.
To fix CVE-2022-27664, you need to update the affected software to version 0.0.0-20220906165146-f3363e06e74c or later.
You can find more information about CVE-2022-27664 on the NIST website and the Golang announcement groups.