CVE-2022-41724
Panic on large handshake records in crypto/tls
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).
A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition.
Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language. Issues addressed include a denial of service vulnerability.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2022-09-28 CVE Reserved
- 2023-02-28 CVE Published
- 2025-03-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://security.gentoo.org/glsa/202311-09 |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://go.dev/cl/468125 | 2023-11-25 | |
https://go.dev/issue/58001 | 2023-11-25 |
URL | Date | SRC |
---|---|---|
https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E | 2023-11-25 | |
https://pkg.go.dev/vuln/GO-2023-1570 | 2023-11-25 | |
https://access.redhat.com/security/cve/CVE-2022-41724 | 2024-05-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2178492 | 2024-05-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.19.6 Search vendor "Golang" for product "Go" and version " < 1.19.6" | - |
Affected
| ||||||
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | 1.20.0 Search vendor "Golang" for product "Go" and version "1.20.0" | - |
Affected
| ||||||
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | 1.20.0 Search vendor "Golang" for product "Go" and version "1.20.0" | rc1 |
Affected
| ||||||
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | 1.20.0 Search vendor "Golang" for product "Go" and version "1.20.0" | rc2 |
Affected
| ||||||
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | 1.20.0 Search vendor "Golang" for product "Go" and version "1.20.0" | rc3 |
Affected
|