First published: Tue Oct 04 2022(Updated: )
A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.
Credit: security@golang.org security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.6.1-1.el8 | 0:1.6.1-1.el8 |
redhat/go-toolset | <1.18-0:1.18.9-1.el7_9 | 1.18-0:1.18.9-1.el7_9 |
redhat/go-toolset | <1.18-golang-0:1.18.9-1.el7_9 | 1.18-golang-0:1.18.9-1.el7_9 |
redhat/osbuild-composer | <0:75-1.el8 | 0:75-1.el8 |
redhat/weldr-client | <0:35.9-2.el8 | 0:35.9-2.el8 |
redhat/golang | <0:1.18.9-1.el9_1 | 0:1.18.9-1.el9_1 |
redhat/osbuild-composer | <0:76-2.el9_2 | 0:76-2.el9_2 |
redhat/weldr-client | <0:35.9-1.el9 | 0:35.9-1.el9 |
redhat/openshift-clients | <0:4.12.0-202301042257.p0.g854f807.assembly.stream.el8 | 0:4.12.0-202301042257.p0.g854f807.assembly.stream.el8 |
redhat/buildah | <1:1.23.4-4.rhaos4.12.el8 | 1:1.23.4-4.rhaos4.12.el8 |
redhat/conmon | <2:2.1.2-4.rhaos4.12.el8 | 2:2.1.2-4.rhaos4.12.el8 |
redhat/podman | <3:4.2.0-6.1.rhaos4.12.el8 | 3:4.2.0-6.1.rhaos4.12.el8 |
redhat/skopeo | <2:1.9.4-3.rhaos4.12.el9 | 2:1.9.4-3.rhaos4.12.el9 |
redhat/skupper-cli | <0:1.4.1-2.el8 | 0:1.4.1-2.el8 |
redhat/skupper-cli | <0:1.4.1-2.el9 | 0:1.4.1-2.el9 |
Golang Go | <1.18.7 | |
Golang Go | >=1.19.0<1.19.2 | |
redhat/go | <1.19.2 | 1.19.2 |
redhat/go | <1.18.7 | 1.18.7 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | 1.19.8-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this flaw is CVE-2022-2879.
The severity level of CVE-2022-2879 is high with a score of 7.5.
The affected software packages include go, openshift-serverless-clients, go-toolset, osbuild-composer, weldr-client, golang, openshift-clients, buildah, conmon, podman, skopeo, and skupper-cli.
You can fix the vulnerability in the go package by updating it to version 1.19.2 or higher.
Yes, you can find additional information about CVE-2022-2879 in the references provided.