Sign in
Sign up
Explore
Enterprise
Education
Search
Help
Terms of use
About Us
Explore
Enterprise
Education
Gitee Premium
Gitee AI
AI teammates
Sign in
Sign up
Fetch the repository succeeded.
description of repo status
Donate
Please sign in before you donate.
Cancel
Sign in
Scan WeChat QR to Pay
Cancel
Complete
Prompt
Switch to Alipay.
OK
Cancel
Watch
Unwatch
Watching
Releases Only
Ignoring
12
Star
0
Fork
33
src-openEuler
/
etcd
Closed
Code
Issues
32
Pull Requests
1
Wiki
Insights
Pipelines
Service
JavaDoc
PHPDoc
Quality Analysis
Jenkins for Gitee
Tencent CloudBase
Tencent Cloud Serverless
悬镜安全
Aliyun SAE
Codeblitz
SBOM
DevLens
Don’t show this again
Update failed. Please try again later!
Remove this flag
Content Risk Flag
This task is identified by
as the content contains sensitive information such as code security bugs, privacy leaks, etc., so it is only accessible to contributors of this repository.
CVE-2022-24675
Done
#IAS45R
CVE和安全问题
openeuler-ci-bot
owner
Opened this issue
2024-09-19 11:28
一、漏洞信息 漏洞编号:[CVE-2022-24675](https://nvd.nist.gov/vuln/detail/CVE-2022-24675) 漏洞归属组件:[etcd](https://gitee.com/src-openeuler/etcd) 漏洞归属的版本:3.4.14,3.4.7 CVSS V3.0分值: BaseScore:7.5 High Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 漏洞简述: encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data. 漏洞公开时间:2022-04-20 18:15:07 漏洞创建时间:2024-09-19 11:28:52 漏洞详情参考链接: https://nvd.nist.gov/vuln/detail/CVE-2022-24675 <details> <summary>更多参考(点击展开)</summary> | 参考来源 | 参考链接 | 来源链接 | | ------- | -------- | -------- | | cve.mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf | | | cve.mitre.org | https://groups.google.com/g/golang-announce | | | cve.mitre.org | https://groups.google.com/g/golang-announce/c/oecdBNLOml8 | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TYZC4OAY54TO75FBEFAPV5G7O4D5TM/ | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3BMW5QGX53CMIJIZWKXFKBJX2C5GWTY/ | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RCRSABD6CUDIZULZPZL5BJ3ET3A2NEJP/ | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/ | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/ | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/ | | | cve.mitre.org | https://security.gentoo.org/glsa/202208-02 | | | cve.mitre.org | https://security.netapp.com/advisory/ntap-20220915-0010/ | | | redhat_bugzilla | https://go.dev/issue/51853 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://go-review.googlesource.com/c/go/+/399816/ | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/errata/RHSA-2022:5006 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/errata/RHSA-2022:5337 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/errata/RHSA-2022:5415 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | </details> 漏洞分析指导链接: https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md 漏洞数据来源: openBrain开源漏洞感知系统 漏洞补丁信息: <details> <summary>详情(点击展开)</summary> | 影响的包 | 修复版本 | 修复补丁 | 问题引入补丁 | 来源 | | ------- | -------- | ------- | -------- | --------- | | | | https://groups.google.com/g/golang-announce | | nvd | | | | https://groups.google.com/g/golang-announce/c/oecdBNLOml8 | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TYZC4OAY54TO75FBEFAPV5G7O4D5TM/ | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3BMW5QGX53CMIJIZWKXFKBJX2C5GWTY/ | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RCRSABD6CUDIZULZPZL5BJ3ET3A2NEJP/ | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/ | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/ | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/ | | nvd | | | | https://security.gentoo.org/glsa/202208-02 | | nvd | | | | https://security.netapp.com/advisory/ntap-20220915-0010/ | | nvd | </details> 二、漏洞分析结构反馈 影响性分析说明: 在Go语言的encoding/pem包中,存在一个堆栈溢出漏洞,影响了Go 1.17.9之前的版本和1.18.x系列中1.18.1之前的版本。该漏洞可以通过大量的PEM格式数据触发Decode函数时引起。当解码特别构造的大规模PEM数据时,由于递归调用或分配过多的局部变量,可能会超出函数调用栈的容量,从而导致堆栈溢出。这不仅可能导致应用程序崩溃,还可能被恶意利用来执行远程代码或进行其他攻击。 openEuler评分: 7.5 Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 受影响版本排查(受影响/不受影响): 1.openEuler-20.03-LTS-SP4(3.4.14):受影响 2.openEuler-22.03-LTS-SP1(3.4.14):受影响 3.openEuler-22.03-LTS-SP3(3.4.14):受影响 4.openEuler-22.03-LTS-SP4(3.4.14):受影响 5.master(3.4.14):不受影响 6.openEuler-24.03-LTS(3.4.14):不受影响 7.openEuler-24.03-LTS-Next(3.4.14):不受影响 8.openEuler-24.03-LTS-SP1(3.4.14):不受影响 修复是否涉及abi变化(是/否): 1.master(3.4.14):否 2.openEuler-20.03-LTS-SP4(3.4.14):否 3.openEuler-22.03-LTS-SP1(3.4.14):否 4.openEuler-22.03-LTS-SP3(3.4.14):否 5.openEuler-22.03-LTS-SP4(3.4.14):否 6.openEuler-24.03-LTS(3.4.14):否 7.openEuler-24.03-LTS-Next(3.4.14):否 8.openEuler-24.03-LTS-SP1(3.4.14):否 原因说明: 1.master(3.4.14): 2.openEuler-20.03-LTS-SP4(3.4.14): 3.openEuler-22.03-LTS-SP3(3.4.14): 4.openEuler-22.03-LTS-SP4(3.4.14): 5.openEuler-24.03-LTS(3.4.14): 6.openEuler-24.03-LTS-Next(3.4.14): 7.openEuler-24.03-LTS-SP1(3.4.14): 三、漏洞修复 安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2025-1123
一、漏洞信息 漏洞编号:[CVE-2022-24675](https://nvd.nist.gov/vuln/detail/CVE-2022-24675) 漏洞归属组件:[etcd](https://gitee.com/src-openeuler/etcd) 漏洞归属的版本:3.4.14,3.4.7 CVSS V3.0分值: BaseScore:7.5 High Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 漏洞简述: encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data. 漏洞公开时间:2022-04-20 18:15:07 漏洞创建时间:2024-09-19 11:28:52 漏洞详情参考链接: https://nvd.nist.gov/vuln/detail/CVE-2022-24675 <details> <summary>更多参考(点击展开)</summary> | 参考来源 | 参考链接 | 来源链接 | | ------- | -------- | -------- | | cve.mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf | | | cve.mitre.org | https://groups.google.com/g/golang-announce | | | cve.mitre.org | https://groups.google.com/g/golang-announce/c/oecdBNLOml8 | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TYZC4OAY54TO75FBEFAPV5G7O4D5TM/ | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3BMW5QGX53CMIJIZWKXFKBJX2C5GWTY/ | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RCRSABD6CUDIZULZPZL5BJ3ET3A2NEJP/ | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/ | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/ | | | cve.mitre.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/ | | | cve.mitre.org | https://security.gentoo.org/glsa/202208-02 | | | cve.mitre.org | https://security.netapp.com/advisory/ntap-20220915-0010/ | | | redhat_bugzilla | https://go.dev/issue/51853 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://go-review.googlesource.com/c/go/+/399816/ | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/errata/RHSA-2022:5006 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/errata/RHSA-2022:5337 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/errata/RHSA-2022:5415 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | | redhat_bugzilla | https://access.redhat.com/security/cve/cve-2022-24675 | https://bugzilla.redhat.com/show_bug.cgi?id=2077688 | </details> 漏洞分析指导链接: https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md 漏洞数据来源: openBrain开源漏洞感知系统 漏洞补丁信息: <details> <summary>详情(点击展开)</summary> | 影响的包 | 修复版本 | 修复补丁 | 问题引入补丁 | 来源 | | ------- | -------- | ------- | -------- | --------- | | | | https://groups.google.com/g/golang-announce | | nvd | | | | https://groups.google.com/g/golang-announce/c/oecdBNLOml8 | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TYZC4OAY54TO75FBEFAPV5G7O4D5TM/ | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3BMW5QGX53CMIJIZWKXFKBJX2C5GWTY/ | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RCRSABD6CUDIZULZPZL5BJ3ET3A2NEJP/ | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/ | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/ | | nvd | | | | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/ | | nvd | | | | https://security.gentoo.org/glsa/202208-02 | | nvd | | | | https://security.netapp.com/advisory/ntap-20220915-0010/ | | nvd | </details> 二、漏洞分析结构反馈 影响性分析说明: 在Go语言的encoding/pem包中,存在一个堆栈溢出漏洞,影响了Go 1.17.9之前的版本和1.18.x系列中1.18.1之前的版本。该漏洞可以通过大量的PEM格式数据触发Decode函数时引起。当解码特别构造的大规模PEM数据时,由于递归调用或分配过多的局部变量,可能会超出函数调用栈的容量,从而导致堆栈溢出。这不仅可能导致应用程序崩溃,还可能被恶意利用来执行远程代码或进行其他攻击。 openEuler评分: 7.5 Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 受影响版本排查(受影响/不受影响): 1.openEuler-20.03-LTS-SP4(3.4.14):受影响 2.openEuler-22.03-LTS-SP1(3.4.14):受影响 3.openEuler-22.03-LTS-SP3(3.4.14):受影响 4.openEuler-22.03-LTS-SP4(3.4.14):受影响 5.master(3.4.14):不受影响 6.openEuler-24.03-LTS(3.4.14):不受影响 7.openEuler-24.03-LTS-Next(3.4.14):不受影响 8.openEuler-24.03-LTS-SP1(3.4.14):不受影响 修复是否涉及abi变化(是/否): 1.master(3.4.14):否 2.openEuler-20.03-LTS-SP4(3.4.14):否 3.openEuler-22.03-LTS-SP1(3.4.14):否 4.openEuler-22.03-LTS-SP3(3.4.14):否 5.openEuler-22.03-LTS-SP4(3.4.14):否 6.openEuler-24.03-LTS(3.4.14):否 7.openEuler-24.03-LTS-Next(3.4.14):否 8.openEuler-24.03-LTS-SP1(3.4.14):否 原因说明: 1.master(3.4.14): 2.openEuler-20.03-LTS-SP4(3.4.14): 3.openEuler-22.03-LTS-SP3(3.4.14): 4.openEuler-22.03-LTS-SP4(3.4.14): 5.openEuler-24.03-LTS(3.4.14): 6.openEuler-24.03-LTS-Next(3.4.14): 7.openEuler-24.03-LTS-SP1(3.4.14): 三、漏洞修复 安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2025-1123
Comments (
7
)
Sign in
to comment
Status
Done
Backlog
已挂起
Doing
Done
Declined
Assignees
Not set
haozi007
duguhaotian
Assignee
Collaborator
+Assign
+Mention
Labels
CVE/FIXED
sig/sig-CloudNative
Not set
Projects
Unprojected
Unprojected
Milestones
No related milestones
No related milestones
Pull Requests
None yet
None yet
Successfully merging a pull request will close this issue.
Branches
No related branch
Branches (
-
)
Tags (
-
)
Planed to start   -   Planed to end
-
Top level
Not Top
Top Level: High
Top Level: Medium
Top Level: Low
Priority
Not specified
Serious
Main
Secondary
Unimportant
Duration
(hours)
参与者(2)
1
https://gitee.com/src-openeuler/etcd.git
git@gitee.com:src-openeuler/etcd.git
src-openeuler
etcd
etcd
Going to Help Center
Search
Git 命令在线学习
如何在 Gitee 导入 GitHub 仓库
Git 仓库基础操作
企业版和社区版功能对比
SSH 公钥设置
如何处理代码冲突
仓库体积过大,如何减小?
如何找回被删除的仓库数据
Gitee 产品配额说明
GitHub仓库快速导入Gitee及同步更新
什么是 Release(发行版)
将 PHP 项目自动发布到 packagist.org
Comment
Repository Report
Back to the top
Login prompt
This operation requires login to the code cloud account. Please log in before operating.
Go to login
No account. Register