CVE-2022-27664 Affecting toolbox-tests package, versions <0:0.0.99.3-9.el9
Threat Intelligence
EPSS
0.24% (63rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-TOOLBOXTESTS-5624188
- published 28 May 2023
- disclosed 9 May 2023
Introduced: 9 May 2023
CVE-2022-27664 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
toolbox-tests
to version 0:0.0.99.3-9.el9 or higher.
This issue was patched in ALSA-2023:2236
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream toolbox-tests
package and not the toolbox-tests
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.
References
- https://errata.almalinux.org/8/ALSA-2022-7129.html
- https://errata.almalinux.org/9/ALSA-2023-2167.html
- https://errata.almalinux.org/9/ALSA-2023-2177.html
- https://errata.almalinux.org/9/ALSA-2023-2193.html
- https://errata.almalinux.org/9/ALSA-2023-2204.html
- https://errata.almalinux.org/9/ALSA-2023-2236.html
- https://errata.almalinux.org/9/ALSA-2023-2357.html
- https://errata.almalinux.org/8/ALSA-2023-2758.html
- https://errata.almalinux.org/8/ALSA-2023-2780.html
- https://errata.almalinux.org/8/ALSA-2023-2784.html
- https://errata.almalinux.org/8/ALSA-2023-2785.html
- https://errata.almalinux.org/8/ALSA-2023-2802.html
- https://errata.almalinux.org/8/ALSA-2024-0121.html
- https://access.redhat.com/security/cve/CVE-2022-27664
- https://access.redhat.com/errata/RHSA-2022:7129
- https://access.redhat.com/errata/RHSA-2023:2167
- https://access.redhat.com/errata/RHSA-2023:2177
- https://access.redhat.com/errata/RHSA-2023:2193
- https://access.redhat.com/errata/RHSA-2023:2204
- https://access.redhat.com/errata/RHSA-2023:2236
- https://access.redhat.com/errata/RHSA-2023:2357
- https://access.redhat.com/errata/RHSA-2023:2758
- https://access.redhat.com/errata/RHSA-2023:2780
- https://access.redhat.com/errata/RHSA-2023:2784
- https://access.redhat.com/errata/RHSA-2023:2785
- https://access.redhat.com/errata/RHSA-2023:2802
- https://access.redhat.com/errata/RHSA-2024:0121
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXKTHIGE5F576MAPFYCIJXNRGBSPISUF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXS2OQ57KZC5XZKK5UW4SYKPVQAHIOJX/
- https://groups.google.com/g/golang-announce
- https://groups.google.com/g/golang-announce/c/x49AQzIVX-s
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXKTHIGE5F576MAPFYCIJXNRGBSPISUF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXS2OQ57KZC5XZKK5UW4SYKPVQAHIOJX/
- https://security.gentoo.org/glsa/202209-26
- https://security.netapp.com/advisory/ntap-20220923-0004/
CVSS Scores
version 3.1