vulnerability
Red Hat: CVE-2022-32189: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | 2022-08-10 | 2022-10-26 | 2025-04-14 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
2022-08-10
Added
2022-10-26
Modified
2025-04-14
Description
A too-short encoded message can cause a panic in Float.GobDecode and Rat GobDecode in math/big in Go before 1.17.13 and 1.18.5, potentially allowing a denial of service.
Solution(s)
redhat-upgrade-aardvark-dnsredhat-upgrade-buildahredhat-upgrade-buildah-debuginforedhat-upgrade-buildah-debugsourceredhat-upgrade-buildah-testsredhat-upgrade-buildah-tests-debuginforedhat-upgrade-butaneredhat-upgrade-butane-debuginforedhat-upgrade-butane-debugsourceredhat-upgrade-cockpit-composerredhat-upgrade-cockpit-podmanredhat-upgrade-conmonredhat-upgrade-conmon-debuginforedhat-upgrade-conmon-debugsourceredhat-upgrade-container-selinuxredhat-upgrade-containernetworking-pluginsredhat-upgrade-containernetworking-plugins-debuginforedhat-upgrade-containernetworking-plugins-debugsourceredhat-upgrade-containers-commonredhat-upgrade-critredhat-upgrade-criuredhat-upgrade-criu-debuginforedhat-upgrade-criu-debugsourceredhat-upgrade-criu-develredhat-upgrade-criu-libsredhat-upgrade-criu-libs-debuginforedhat-upgrade-crunredhat-upgrade-crun-debuginforedhat-upgrade-crun-debugsourceredhat-upgrade-delveredhat-upgrade-delve-debuginforedhat-upgrade-delve-debugsourceredhat-upgrade-fuse-overlayfsredhat-upgrade-fuse-overlayfs-debuginforedhat-upgrade-fuse-overlayfs-debugsourceredhat-upgrade-git-lfsredhat-upgrade-git-lfs-debuginforedhat-upgrade-git-lfs-debugsourceredhat-upgrade-go-toolsetredhat-upgrade-golangredhat-upgrade-golang-binredhat-upgrade-golang-docsredhat-upgrade-golang-miscredhat-upgrade-golang-raceredhat-upgrade-golang-srcredhat-upgrade-golang-testsredhat-upgrade-libslirpredhat-upgrade-libslirp-debuginforedhat-upgrade-libslirp-debugsourceredhat-upgrade-libslirp-develredhat-upgrade-netavarkredhat-upgrade-oci-seccomp-bpf-hookredhat-upgrade-oci-seccomp-bpf-hook-debuginforedhat-upgrade-oci-seccomp-bpf-hook-debugsourceredhat-upgrade-osbuildredhat-upgrade-osbuild-composerredhat-upgrade-osbuild-composer-coreredhat-upgrade-osbuild-composer-core-debuginforedhat-upgrade-osbuild-composer-debuginforedhat-upgrade-osbuild-composer-debugsourceredhat-upgrade-osbuild-composer-dnf-jsonredhat-upgrade-osbuild-composer-tests-debuginforedhat-upgrade-osbuild-composer-workerredhat-upgrade-osbuild-composer-worker-debuginforedhat-upgrade-osbuild-luks2redhat-upgrade-osbuild-lvm2redhat-upgrade-osbuild-ostreeredhat-upgrade-osbuild-selinuxredhat-upgrade-podmanredhat-upgrade-podman-catatonitredhat-upgrade-podman-catatonit-debuginforedhat-upgrade-podman-debuginforedhat-upgrade-podman-debugsourceredhat-upgrade-podman-dockerredhat-upgrade-podman-gvproxyredhat-upgrade-podman-gvproxy-debuginforedhat-upgrade-podman-pluginsredhat-upgrade-podman-plugins-debuginforedhat-upgrade-podman-remoteredhat-upgrade-podman-remote-debuginforedhat-upgrade-podman-testsredhat-upgrade-python3-criuredhat-upgrade-python3-osbuildredhat-upgrade-python3-podmanredhat-upgrade-runcredhat-upgrade-runc-debuginforedhat-upgrade-runc-debugsourceredhat-upgrade-skopeoredhat-upgrade-skopeo-debuginforedhat-upgrade-skopeo-debugsourceredhat-upgrade-skopeo-testsredhat-upgrade-slirp4netnsredhat-upgrade-slirp4netns-debuginforedhat-upgrade-slirp4netns-debugsourceredhat-upgrade-toolboxredhat-upgrade-toolbox-debuginforedhat-upgrade-toolbox-debugsourceredhat-upgrade-toolbox-testsredhat-upgrade-udicaredhat-upgrade-weldr-clientredhat-upgrade-weldr-client-debuginforedhat-upgrade-weldr-client-debugsourceredhat-upgrade-weldr-client-tests-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.