7.5
CVSSv3

CVE-2022-23772

Published: 11/02/2022 Updated: 09/11/2022
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 696
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Rat.SetString in math/big in Go prior to 1.16.14 and 1.17.x prior to 1.17.7 has an overflow that can lead to Uncontrolled Memory Consumption.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

golang go

netapp storagegrid -

netapp cloud insights telegraf agent -

netapp kubernetes monitoring operator -

netapp beegfs csi driver -

debian debian linux 9.0

Vendor Advisories

RatSetString in math/big in Go before 11614 and 117x before 1177 has an overflow that can lead to Uncontrolled Memory Consumption (CVE-2022-23772) cmd/go in Go before 11614 and 117x before 1177 can misinterpret branch names that falsely appear to be version tags This can lead to incorrect access control if an actor is supposed to be ...
Synopsis Important: Red Hat OpenShift Enterprise security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic Red Hat OpenShift Container Platform release 41144 is now available with updates to packages and images th ...
Synopsis Moderate: OpenShift Container Platform 4110 packages and security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic Red Hat OpenShift Container Platform release 4110 is now available withupdates to packag ...
Synopsis Moderate: Release of OpenShift Serverless Client kn 1221 Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic Release of OpenShift Serverless Client kn 1221Red Hat Product Security has rated this update as having a ...
Synopsis Moderate: OpenShift Container Platform 41025 bug fix and security update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 41025 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Co ...
Synopsis Moderate: Red Hat OpenShift Data Foundation 4110 security, enhancement & bugfix update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic Updated packages that include numerous enhancements, security, and bug f ...
Synopsis Important: Red Hat OpenShift Service Mesh 213 Containers security update Type/Severity Security Advisory: Important Topic Red Hat OpenShift Service Mesh 213Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed sever ...
Synopsis Critical: Red Hat OpenShift Service Mesh 213 security update Type/Severity Security Advisory: Critical Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic Red Hat OpenShift Service Mesh 213 has been releasedRed Hat Product Security has rated this update ...
Synopsis Moderate: Release of OpenShift Serverless Version 1221 Type/Severity Security Advisory: Moderate Topic OpenShift Serverless version 1221 contains a moderate security impactThe References section contains CVE links providing detailed severity ratings for each vulnerability Ratings are based on a Common Vulnerability Scoring Syst ...
Synopsis Important: OpenShift Virtualization 4110 Images security and bug fix update Type/Severity Security Advisory: Important Topic Red Hat OpenShift Virtualization release 4110 is now available with updates to packages and images that fix several bugs and add enhancementsRed Hat Product Security has rated this update as having a secur ...
Synopsis Important: OpenShift Container Platform 4110 bug fix and security update Type/Severity Security Advisory: Important Topic Red Hat OpenShift Container Platform release 4110 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Co ...
Synopsis Moderate: OpenShift Container Platform 4110 extras and security update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 4110 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Conta ...
Synopsis Important: Red Hat OpenShift Data Foundation 4110 security, enhancement, & bugfix update Type/Severity Security Advisory: Important Topic Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4110 on Red Hat Enterprise Linux 8Red Hat Product Securit ...
Synopsis Important: OpenShift Virtualization 4120 Images security update Type/Severity Security Advisory: Important Topic Red Hat OpenShift Virtualization release 412 is now available with updates to packages and images that fix several bugs and add enhancementsRed Hat Product Security has rated this update as having a security impact of ...
An out of bounds read vulnerability was found in debug/macho of the Go standard library When using the debug/macho standard library (stdlib) and malformed binaries are parsed using Open or OpenFat, it can cause golang to attempt to read outside of a slice (array) causing a panic when calling ImportedSymbols An attacker can use this vulnerability ...
A null pointer dereference vulnerability was found in golang When using the library's ssh server without specifying an option for GSSAPIWithMICConfig, it is possible for an attacker to craft an ssh client connection using the authentication method and cause the server to panic resulting in a denial of service The highest threat from this vulnera ...
A validation flaw was found in golang When invoking functions from WASM modules built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments The highest threat from this vulnerability is to integrity (CVE-2021-38297) A vulnerability was found in archive/zip of the G ...

Github Repositories

gosec - Golang Security Checker Inspects source code for security problems by scanning the Go AST License Licensed under the Apache License, Version 20 (the "License") You may not use this file except in compliance with the License You may obtain a copy of the License here Project status Install CI Installation # binary will be $(go env GOPATH)/bin/gose

ccojocar ccojocar gcmurphy gcmurphy Go security checker

gosec - Go Security Checker Inspects source code for security problems by scanning the Go AST and SSA code representation License Licensed under the Apache License, Version 20 (the "License") You may not use this file except in compliance with the License You may obtain a copy of the License here Project status Install CI Installation # binary will be $

gosec - Golang Security Checker Inspects source code for security problems by scanning the Go AST and SSA code representation License Licensed under the Apache License, Version 20 (the "License") You may not use this file except in compliance with the License You may obtain a copy of the License here Project status Install CI Installation # binary will

gosec - Go Security Checker Inspects source code for security problems by scanning the Go AST and SSA code representation License Licensed under the Apache License, Version 20 (the "License") You may not use this file except in compliance with the License You may obtain a copy of the License here Project status Install CI Installation # binary will be $

gosec - Go Security Checker Inspects source code for security problems by scanning the Go AST and SSA code representation License Licensed under the Apache License, Version 20 (the "License") You may not use this file except in compliance with the License You may obtain a copy of the License here Project status Install CI Installation # binary will be $