vulnerability
Amazon Linux AMI 2: CVE-2022-2879: Security patch for containerd, docker, golang, golist, runc (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Oct 14, 2022 | Dec 7, 2022 | Apr 30, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Oct 14, 2022
Added
Dec 7, 2022
Modified
Apr 30, 2025
Description
Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.
Solutions
amazon-linux-ami-2-upgrade-containerdamazon-linux-ami-2-upgrade-containerd-debuginfoamazon-linux-ami-2-upgrade-containerd-stressamazon-linux-ami-2-upgrade-dockeramazon-linux-ami-2-upgrade-docker-debuginfoamazon-linux-ami-2-upgrade-golangamazon-linux-ami-2-upgrade-golang-binamazon-linux-ami-2-upgrade-golang-docsamazon-linux-ami-2-upgrade-golang-miscamazon-linux-ami-2-upgrade-golang-raceamazon-linux-ami-2-upgrade-golang-sharedamazon-linux-ami-2-upgrade-golang-srcamazon-linux-ami-2-upgrade-golang-testsamazon-linux-ami-2-upgrade-golistamazon-linux-ami-2-upgrade-golist-debuginfoamazon-linux-ami-2-upgrade-runcamazon-linux-ami-2-upgrade-runc-debuginfo
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.