vulnerability
Oracle Linux: CVE-2022-41715: ELSA-2023-18908: ol8addon security update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:S/C:N/I:N/A:C) | Oct 4, 2022 | Jan 24, 2023 | Jan 7, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:C)
Published
Oct 4, 2022
Added
Jan 24, 2023
Modified
Jan 7, 2025
Description
Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.
A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.
A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.
Solution(s)
oracle-linux-upgrade-aardvark-dnsoracle-linux-upgrade-buildahoracle-linux-upgrade-buildah-testsoracle-linux-upgrade-cockpit-composeroracle-linux-upgrade-cockpit-podmanoracle-linux-upgrade-conmonoracle-linux-upgrade-containernetworking-pluginsoracle-linux-upgrade-containers-commonoracle-linux-upgrade-container-selinuxoracle-linux-upgrade-critoracle-linux-upgrade-criuoracle-linux-upgrade-criu-develoracle-linux-upgrade-criu-libsoracle-linux-upgrade-crunoracle-linux-upgrade-delveoracle-linux-upgrade-fuse-overlayfsoracle-linux-upgrade-git-lfsoracle-linux-upgrade-golangoracle-linux-upgrade-golang-binoracle-linux-upgrade-golang-docsoracle-linux-upgrade-golang-github-cpuguy83-md2manoracle-linux-upgrade-golang-miscoracle-linux-upgrade-golang-raceoracle-linux-upgrade-golang-srcoracle-linux-upgrade-golang-testsoracle-linux-upgrade-go-toolsetoracle-linux-upgrade-grafanaoracle-linux-upgrade-libslirporacle-linux-upgrade-libslirp-develoracle-linux-upgrade-netavarkoracle-linux-upgrade-oci-seccomp-bpf-hookoracle-linux-upgrade-osbuildoracle-linux-upgrade-osbuild-composeroracle-linux-upgrade-osbuild-composer-coreoracle-linux-upgrade-osbuild-composer-dnf-jsonoracle-linux-upgrade-osbuild-composer-workeroracle-linux-upgrade-osbuild-luks2oracle-linux-upgrade-osbuild-lvm2oracle-linux-upgrade-osbuild-ostreeoracle-linux-upgrade-osbuild-selinuxoracle-linux-upgrade-podmanoracle-linux-upgrade-podman-catatonitoracle-linux-upgrade-podman-dockeroracle-linux-upgrade-podman-gvproxyoracle-linux-upgrade-podman-pluginsoracle-linux-upgrade-podman-remoteoracle-linux-upgrade-podman-testsoracle-linux-upgrade-python3-criuoracle-linux-upgrade-python3-osbuildoracle-linux-upgrade-python3-podmanoracle-linux-upgrade-runcoracle-linux-upgrade-skopeooracle-linux-upgrade-skopeo-testsoracle-linux-upgrade-slirp4netnsoracle-linux-upgrade-udicaoracle-linux-upgrade-weldr-client
References
- CVE-2022-41715
- https://attackerkb.com/topics/CVE-2022-41715
- ELSA-ELSA-2023-18908
- ELSA-ELSA-2023-0446
- ELSA-ELSA-2023-2866
- ELSA-ELSA-2023-2204
- ELSA-ELSA-2024-2988
- ELSA-ELSA-2024-3254
- ELSA-ELSA-2023-0328
- ELSA-ELSA-2023-2780
- ELSA-ELSA-2022-24267
- ELSA-ELSA-2023-2784
- ELSA-ELSA-2023-2592
- ELSA-ELSA-2023-2167
- ELSA-ELSA-2023-2357
- ELSA-ELSA-2024-0121

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.