First published: Tue Apr 12 2022(Updated: )
An integer overflow flaw was found in Golang's crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.3.1-4.el8 | 0:1.3.1-4.el8 |
redhat/servicemesh | <0:2.1.5-1.el8 | 0:2.1.5-1.el8 |
redhat/servicemesh-operator | <0:2.1.5-1.el8 | 0:2.1.5-1.el8 |
redhat/servicemesh-prometheus | <0:2.23.0-9.el8 | 0:2.23.0-9.el8 |
redhat/servicemesh-ratelimit | <0:2.1.5-1.el8 | 0:2.1.5-1.el8 |
redhat/go-toolset | <1.17-golang-0:1.17.10-1.el7_9 | 1.17-golang-0:1.17.10-1.el7_9 |
redhat/golang | <0:1.17.12-1.el9_0 | 0:1.17.12-1.el9_0 |
redhat/go-toolset | <0:1.17.12-1.el9_0 | 0:1.17.12-1.el9_0 |
redhat/cri-tools | <0:1.23.0-1.1.el8 | 0:1.23.0-1.1.el8 |
redhat/cri-o | <0:1.23.3-14.rhaos4.10.git6af791c.1.el8 | 0:1.23.3-14.rhaos4.10.git6af791c.1.el8 |
redhat/butane | <0:0.15.0-1.rhaos4.11.el8 | 0:0.15.0-1.rhaos4.11.el8 |
redhat/containernetworking-plugins | <0:1.0.1-5.rhaos4.11.el8 | 0:1.0.1-5.rhaos4.11.el8 |
redhat/buildah | <1:1.23.4-3.rhaos4.11.el8 | 1:1.23.4-3.rhaos4.11.el8 |
redhat/podman | <2:4.0.2-7.rhaos4.11.el8 | 2:4.0.2-7.rhaos4.11.el8 |
redhat/runc | <3:1.1.2-2.rhaos4.11.el8 | 3:1.1.2-2.rhaos4.11.el8 |
redhat/skopeo | <2:1.5.2-4.rhaos4.11.el8 | 2:1.5.2-4.rhaos4.11.el8 |
redhat/mcg | <0:5.11.0-22.el8 | 0:5.11.0-22.el8 |
redhat/skupper-cli | <0:1.4.1-2.el8 | 0:1.4.1-2.el8 |
redhat/skupper-cli | <0:1.4.1-2.el9 | 0:1.4.1-2.el9 |
redhat/go | <1.17.9 | 1.17.9 |
redhat/go | <1.18.1 | 1.18.1 |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 | |
Go | <1.17.9 | |
Go | >=1.18.0<1.18.1 | |
Fedoraproject Extra Packages for Enterprise Linux | =7.0 | |
Fedoraproject Extra Packages for Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-28327 is an integer overflow vulnerability in Golang's crypto/elliptic library.
CVE-2022-28327 allows an attacker to cause P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.
CVE-2022-28327 has a severity rating of 7.5 (High).
To fix CVE-2022-28327 in Go, upgrade to version 1.17.9 or 1.18.1.
More information about CVE-2022-28327 can be found at the following links: - [Red Hat Security Advisory](https://access.redhat.com/security/cve/CVE-2022-28327) - [Go Issue Tracker](https://go.dev/issue/52075) - [Go Source Code](https://go-review.googlesource.com/c/go/+/397135/)