vulnerability
Red Hat OpenShift: CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Sep 6, 2022 | Nov 29, 2022 | Apr 11, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Sep 6, 2022
Added
Nov 29, 2022
Modified
Apr 11, 2025
Description
In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.
Solution(s)
linuxrpm-upgrade-cri-olinuxrpm-upgrade-cri-toolslinuxrpm-upgrade-openshift-clientslinuxrpm-upgrade-podmanlinuxrpm-upgrade-skopeo
References
- CVE-2022-27664
- https://attackerkb.com/topics/CVE-2022-27664
- REDHAT-RHSA-2022:7129
- REDHAT-RHSA-2022:7398
- REDHAT-RHSA-2022:8535
- REDHAT-RHSA-2022:8626
- REDHAT-RHSA-2022:8634
- REDHAT-RHSA-2022:8781
- REDHAT-RHSA-2023:0264
- REDHAT-RHSA-2023:0328
- REDHAT-RHSA-2023:0446
- REDHAT-RHSA-2023:0542
- REDHAT-RHSA-2023:0584
- REDHAT-RHSA-2023:0631
- REDHAT-RHSA-2023:0693
- REDHAT-RHSA-2023:0708
- REDHAT-RHSA-2023:0709
- REDHAT-RHSA-2023:1042
- REDHAT-RHSA-2023:1275
- REDHAT-RHSA-2023:1529
- REDHAT-RHSA-2023:2167
- REDHAT-RHSA-2023:2177
- REDHAT-RHSA-2023:2193
- REDHAT-RHSA-2023:2204
- REDHAT-RHSA-2023:2236
- REDHAT-RHSA-2023:2357
- REDHAT-RHSA-2023:2758
- REDHAT-RHSA-2023:2780
- REDHAT-RHSA-2023:2784
- REDHAT-RHSA-2023:2785
- REDHAT-RHSA-2023:2802
- REDHAT-RHSA-2023:3204
- REDHAT-RHSA-2023:3205
- REDHAT-RHSA-2023:3613
- REDHAT-RHSA-2023:3642
- REDHAT-RHSA-2023:3742
- REDHAT-RHSA-2023:4674
- REDHAT-RHSA-2023:4734
- REDHAT-RHSA-2023:5009
- REDHAT-RHSA-2024:0121
- REDHAT-RHSA-2024:2944

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.