First published: Fri Jul 15 2022(Updated: )
Golang Go is vulnerable to a denial of service, caused by improper input validation. By sending a specially-crafted request using large buffers, a remote attacker could exploit this vulnerability to cause rand.Read to hang,a and results in a denial of service condition.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Concert Software | <=1.0.0 - 1.0.1 | |
Go | <1.17.11 | |
Go | >=1.18.0<1.18.3 | |
Microsoft Windows | ||
NetApp Cloud Insights Telegraf Agent |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID CVE-2022-30634 refers to an infinite loop in the Read function in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows.
The severity of CVE-2022-30634 is high with a severity value of 7.5.
CVE-2022-30634 affects Golang Go versions up to and excluding 1.17.11 and versions between 1.18.0 and 1.18.3.
No, Microsoft Windows is not affected by CVE-2022-30634.
Golang Go versions up to and excluding 1.17.11 and versions between 1.18.0 and 1.18.3, as well as Netapp Cloud Insights Telegraf Agent.
To fix CVE-2022-30634, it is recommended to update to Go 1.17.11 or Go 1.18.3, depending on the affected version.
The CWE ID associated with CVE-2022-30634 is CWE 835.
You can find more information about CVE-2022-30634 at the following references: [link1], [link2], [link3].