First published: Mon Mar 06 2023(Updated: )
Security Fix(es):<br><li> archive/tar: unbounded memory consumption when reading headers</li> (CVE-2022-2879)<br><li> regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)</li> <li> net/<a href="http:" target="_blank">http:</a> An attacker can cause excessive memory growth in a Go server</li> accepting HTTP/2 requests (CVE-2022-41717)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:1079 is considered high due to potential unbounded memory consumption vulnerabilities.
To fix RHSA-2023:1079, apply the latest security updates provided by Red Hat for your affected software.
RHSA-2023:1079 addresses two vulnerabilities: CVE-2022-2879 related to unbounded memory consumption in archive/tar and CVE-2022-41715 concerning regex parsing.
Any users running the affected versions of Red Hat software with the specified vulnerabilities are at risk from RHSA-2023:1079.
Failing to address RHSA-2023:1079 may lead to excessive memory consumption and potential denial of service due to exploitation of the vulnerabilities.