Search for vulnerabilities
Vulnerability details: VCID-s48v-93da-aaaf
Vulnerability ID VCID-s48v-93da-aaaf
Aliases CVE-2022-41723
GHSA-vvpx-j8f3-3w6h
Summary A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:0485
ssvc Track https://access.redhat.com/errata/RHSA-2024:0485
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41723.json
epss 0.00188 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00188 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00188 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00188 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00188 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00188 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00188 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00229 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.0075 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.01734 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.01734 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.01734 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.01734 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.04177 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.04177 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.04177 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.04177 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.04177 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.04177 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.04177 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.04177 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
epss 0.04177 https://api.first.org/data/v1/epss?cve=CVE-2022-41723
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 7.5 https://go.dev/cl/468135
generic_textual HIGH https://go.dev/cl/468135
ssvc Track https://go.dev/cl/468135
cvssv3.1 7.5 https://go.dev/cl/468295
generic_textual HIGH https://go.dev/cl/468295
ssvc Track https://go.dev/cl/468295
cvssv3.1 7.5 https://go.dev/issue/57855
generic_textual HIGH https://go.dev/issue/57855
ssvc Track https://go.dev/issue/57855
cvssv3.1 7.5 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
generic_textual HIGH https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
ssvc Track https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-41723
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-41723
cvssv3.1 7.5 https://pkg.go.dev/vuln/GO-2023-1571
generic_textual HIGH https://pkg.go.dev/vuln/GO-2023-1571
ssvc Track https://pkg.go.dev/vuln/GO-2023-1571
ssvc Track https://security.gentoo.org/glsa/202311-09
cvssv3.1 7.5 https://vuln.go.dev/ID/GO-2023-1571.json
generic_textual HIGH https://vuln.go.dev/ID/GO-2023-1571.json
cvssv3.1 7.5 https://www.couchbase.com/alerts
generic_textual HIGH https://www.couchbase.com/alerts
cvssv3.1 7.5 https://www.couchbase.com/alerts/
cvssv3.1 7.5 https://www.couchbase.com/alerts/
ssvc Track https://www.couchbase.com/alerts/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41723.json
https://api.first.org/data/v1/epss?cve=CVE-2022-41723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://go.dev/cl/468135
https://go.dev/cl/468295
https://go.dev/issue/57855
https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/
https://pkg.go.dev/vuln/GO-2023-1571
https://security.netapp.com/advisory/ntap-20230331-0010/
https://vuln.go.dev/ID/GO-2023-1571.json
https://www.couchbase.com/alerts
https://www.couchbase.com/alerts/
2178358 https://bugzilla.redhat.com/show_bug.cgi?id=2178358
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
cpe:2.3:a:golang:go:1.20.0:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:golang:go:1.20.0:-:*:*:*:*:*:*
cpe:2.3:a:golang:hpack:*:*:*:*:*:go:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:golang:hpack:*:*:*:*:*:go:*:*
cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*
CVE-2022-41723 https://nvd.nist.gov/vuln/detail/CVE-2022-41723
GLSA-202311-09 https://security.gentoo.org/glsa/202311-09
RHSA-2023:1325 https://access.redhat.com/errata/RHSA-2023:1325
RHSA-2023:1326 https://access.redhat.com/errata/RHSA-2023:1326
RHSA-2023:3083 https://access.redhat.com/errata/RHSA-2023:3083
RHSA-2023:3167 https://access.redhat.com/errata/RHSA-2023:3167
RHSA-2023:3304 https://access.redhat.com/errata/RHSA-2023:3304
RHSA-2023:3305 https://access.redhat.com/errata/RHSA-2023:3305
RHSA-2023:3367 https://access.redhat.com/errata/RHSA-2023:3367
RHSA-2023:3445 https://access.redhat.com/errata/RHSA-2023:3445
RHSA-2023:3447 https://access.redhat.com/errata/RHSA-2023:3447
RHSA-2023:3450 https://access.redhat.com/errata/RHSA-2023:3450
RHSA-2023:3455 https://access.redhat.com/errata/RHSA-2023:3455
RHSA-2023:3495 https://access.redhat.com/errata/RHSA-2023:3495
RHSA-2023:3537 https://access.redhat.com/errata/RHSA-2023:3537
RHSA-2023:3612 https://access.redhat.com/errata/RHSA-2023:3612
RHSA-2023:3614 https://access.redhat.com/errata/RHSA-2023:3614
RHSA-2023:3742 https://access.redhat.com/errata/RHSA-2023:3742
RHSA-2023:3918 https://access.redhat.com/errata/RHSA-2023:3918
RHSA-2023:3943 https://access.redhat.com/errata/RHSA-2023:3943
RHSA-2023:4003 https://access.redhat.com/errata/RHSA-2023:4003
RHSA-2023:4090 https://access.redhat.com/errata/RHSA-2023:4090
RHSA-2023:4091 https://access.redhat.com/errata/RHSA-2023:4091
RHSA-2023:4112 https://access.redhat.com/errata/RHSA-2023:4112
RHSA-2023:4113 https://access.redhat.com/errata/RHSA-2023:4113
RHSA-2023:4225 https://access.redhat.com/errata/RHSA-2023:4225
RHSA-2023:4226 https://access.redhat.com/errata/RHSA-2023:4226
RHSA-2023:4293 https://access.redhat.com/errata/RHSA-2023:4293
RHSA-2023:4335 https://access.redhat.com/errata/RHSA-2023:4335
RHSA-2023:4421 https://access.redhat.com/errata/RHSA-2023:4421
RHSA-2023:4456 https://access.redhat.com/errata/RHSA-2023:4456
RHSA-2023:4603 https://access.redhat.com/errata/RHSA-2023:4603
RHSA-2023:4627 https://access.redhat.com/errata/RHSA-2023:4627
RHSA-2023:4664 https://access.redhat.com/errata/RHSA-2023:4664
RHSA-2023:4731 https://access.redhat.com/errata/RHSA-2023:4731
RHSA-2023:5007 https://access.redhat.com/errata/RHSA-2023:5007
RHSA-2023:5233 https://access.redhat.com/errata/RHSA-2023:5233
RHSA-2023:5314 https://access.redhat.com/errata/RHSA-2023:5314
RHSA-2023:5672 https://access.redhat.com/errata/RHSA-2023:5672
RHSA-2023:6235 https://access.redhat.com/errata/RHSA-2023:6235
RHSA-2023:6248 https://access.redhat.com/errata/RHSA-2023:6248
RHSA-2023:6251 https://access.redhat.com/errata/RHSA-2023:6251
RHSA-2023:6346 https://access.redhat.com/errata/RHSA-2023:6346
RHSA-2023:6363 https://access.redhat.com/errata/RHSA-2023:6363
RHSA-2023:6402 https://access.redhat.com/errata/RHSA-2023:6402
RHSA-2023:6473 https://access.redhat.com/errata/RHSA-2023:6473
RHSA-2023:6474 https://access.redhat.com/errata/RHSA-2023:6474
RHSA-2023:6832 https://access.redhat.com/errata/RHSA-2023:6832
RHSA-2023:6938 https://access.redhat.com/errata/RHSA-2023:6938
RHSA-2023:6939 https://access.redhat.com/errata/RHSA-2023:6939
RHSA-2023:7058 https://access.redhat.com/errata/RHSA-2023:7058
RHSA-2023:7823 https://access.redhat.com/errata/RHSA-2023:7823
RHSA-2024:0198 https://access.redhat.com/errata/RHSA-2024:0198
RHSA-2024:0485 https://access.redhat.com/errata/RHSA-2024:0485
RHSA-2024:0948 https://access.redhat.com/errata/RHSA-2024:0948
RHSA-2024:2944 https://access.redhat.com/errata/RHSA-2024:2944
RHSA-2024:3494 https://access.redhat.com/errata/RHSA-2024:3494
RHSA-2024:4677 https://access.redhat.com/errata/RHSA-2024:4677
RHSA-2025:1116 https://access.redhat.com/errata/RHSA-2025:1116
USN-7109-1 https://usn.ubuntu.com/7109-1/
USN-7111-1 https://usn.ubuntu.com/7111-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:0485
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:09:02Z/ Found at https://access.redhat.com/errata/RHSA-2024:0485
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41723.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://go.dev/cl/468135
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://go.dev/cl/468135
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://go.dev/cl/468295
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://go.dev/cl/468295
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://go.dev/issue/57855
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://go.dev/issue/57855
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-41723
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-41723
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://pkg.go.dev/vuln/GO-2023-1571
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://pkg.go.dev/vuln/GO-2023-1571

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://security.gentoo.org/glsa/202311-09
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://vuln.go.dev/ID/GO-2023-1571.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.couchbase.com/alerts
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.couchbase.com/alerts/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.couchbase.com/alerts/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:37Z/ Found at https://www.couchbase.com/alerts/
Exploit Prediction Scoring System (EPSS)
Percentile 0.41371
EPSS Score 0.00188
Published At May 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.