First published: Tue Oct 04 2022(Updated: )
A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.
Credit: security@golang.org security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.6.1-1.el8 | 0:1.6.1-1.el8 |
redhat/go-toolset | <1.18-0:1.18.9-1.el7_9 | 1.18-0:1.18.9-1.el7_9 |
redhat/go-toolset | <1.18-golang-0:1.18.9-1.el7_9 | 1.18-golang-0:1.18.9-1.el7_9 |
redhat/osbuild-composer | <0:75-1.el8 | 0:75-1.el8 |
redhat/weldr-client | <0:35.9-2.el8 | 0:35.9-2.el8 |
redhat/grafana | <0:7.5.15-4.el8 | 0:7.5.15-4.el8 |
redhat/git-lfs | <0:3.2.0-2.el8 | 0:3.2.0-2.el8 |
redhat/golang | <0:1.18.9-1.el9_1 | 0:1.18.9-1.el9_1 |
redhat/grafana | <0:9.0.9-2.el9 | 0:9.0.9-2.el9 |
redhat/osbuild-composer | <0:76-2.el9_2 | 0:76-2.el9_2 |
redhat/weldr-client | <0:35.9-1.el9 | 0:35.9-1.el9 |
redhat/git-lfs | <0:3.2.0-1.el9 | 0:3.2.0-1.el9 |
redhat/golang-github-cpuguy83-md2man | <0:2.0.2-4.el9 | 0:2.0.2-4.el9 |
redhat/butane | <0:0.16.0-2.rhaos4.12.el8 | 0:0.16.0-2.rhaos4.12.el8 |
redhat/ignition | <0:2.14.0-5.rhaos4.12.el8 | 0:2.14.0-5.rhaos4.12.el8 |
redhat/openshift-clients | <0:4.12.0-202301042257.p0.g854f807.assembly.stream.el9 | 0:4.12.0-202301042257.p0.g854f807.assembly.stream.el9 |
redhat/buildah | <1:1.23.4-4.rhaos4.12.el9 | 1:1.23.4-4.rhaos4.12.el9 |
redhat/conmon | <2:2.1.2-4.rhaos4.12.el8 | 2:2.1.2-4.rhaos4.12.el8 |
redhat/podman | <3:4.2.0-7.rhaos4.12.el9 | 3:4.2.0-7.rhaos4.12.el9 |
redhat/runc | <3:1.1.6-4.rhaos4.12.el8 | 3:1.1.6-4.rhaos4.12.el8 |
redhat/skopeo | <2:1.9.4-3.rhaos4.12.el9 | 2:1.9.4-3.rhaos4.12.el9 |
redhat/etcd | <0:3.3.23-12.el8 | 0:3.3.23-12.el8 |
redhat/skupper-cli | <0:1.4.1-2.el8 | 0:1.4.1-2.el8 |
redhat/skupper-router | <0:2.4.1-2.el8 | 0:2.4.1-2.el8 |
redhat/skupper-cli | <0:1.4.1-2.el9 | 0:1.4.1-2.el9 |
redhat/skupper-router | <0:2.4.1-2.el9 | 0:2.4.1-2.el9 |
Golang Go | <1.18.7 | |
Golang Go | >=1.19.0<1.19.2 | |
redhat/go | <1.19.2 | 1.19.2 |
redhat/go | <1.18.7 | 1.18.7 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | 1.19.8-2 | |
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2022-41715.
The severity of CVE-2022-41715 is high.
The affected software packages are go, openshift-serverless-clients, go-toolset, osbuild-composer, weldr-client, grafana, git-lfs, golang, golang-github-cpuguy83-md2man, butane, ignition, openshift-clients, buildah, conmon, podman, runc, skopeo, etcd, skupper-cli, and skupper-router.
To fix CVE-2022-41715, update the affected software packages to the specified versions.
You can find more information about CVE-2022-41715 at the following references: [link1], [link2], [link3].