Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.

Project Subscriptions

Vendors Products
Advanced Cluster Security Subscribe
Application Interconnect Subscribe
Ceph Storage Subscribe
Container Native Virtualization Subscribe
Devtools Subscribe
Enterprise Linux Subscribe
Logging Subscribe
Multicluster Engine Subscribe
Openshift Subscribe
Openshift Api Data Protection Subscribe
Openshift Custom Metrics Autoscaler Subscribe
Openshift Secondary Scheduler Subscribe
Openstack Subscribe
Serverless Subscribe
Workload Availability Nmo Subscribe
Workload Availability Node Healthcheck Subscribe
Workload Availability Snr Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-52462 Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.
Ubuntu USN Ubuntu USN USN-6038-1 Go vulnerabilities
Ubuntu USN Ubuntu USN USN-6038-2 Go vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 20 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00034}

epss

{'score': 0.00029}


Tue, 17 Jun 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat stf
CPEs cpe:/a:redhat:service_telemetry_framework:1.3::el8
cpe:/a:redhat:service_telemetry_framework:1.4::el8
cpe:/a:redhat:service_telemetry_framework:1.5::el8
cpe:/a:redhat:stf:1.3::el8
cpe:/a:redhat:stf:1.4::el8
cpe:/a:redhat:stf:1.5::el8
Vendors & Products Redhat service Telemetry Framework
Redhat stf

Wed, 28 May 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat workload Availability Snr
CPEs cpe:/a:redhat:workload_availability_self_node_remediation:0.4::el8 cpe:/a:redhat:workload_availability_snr:0.4::el8
Vendors & Products Redhat workload Availability Self Node Remediation
Redhat workload Availability Snr

Thu, 13 Feb 2025 00:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat workload Availability Nmo
CPEs cpe:/a:redhat:workload_availability_node_maintenance:4.11::el8 cpe:/a:redhat:workload_availability_nmo:4.11::el8
Vendors & Products Redhat workload Availability Node Maintenance
Redhat workload Availability Nmo

Sun, 08 Sep 2024 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat acm
Redhat multicluster Engine
CPEs cpe:/a:redhat:acm:2.5::el8
cpe:/a:redhat:acm:2.6::el8
cpe:/a:redhat:multicluster_engine:2.1::el8
Vendors & Products Redhat acm
Redhat multicluster Engine

Mon, 19 Aug 2024 22:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.5::el8
cpe:/a:redhat:acm:2.6::el8
cpe:/a:redhat:multicluster_engine:2.1::el8
Vendors & Products Redhat acm
Redhat multicluster Engine

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2025-10-20T17:51:28.366Z

Reserved: 2022-05-12T00:00:00.000Z

Link: CVE-2022-30631

cve-icon Vulnrichment

Updated: 2024-08-03T06:56:13.231Z

cve-icon NVD

Status : Modified

Published: 2022-08-10T20:15:41.373

Modified: 2025-10-20T18:15:36.863

Link: CVE-2022-30631

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-07-12T00:00:00Z

Links: CVE-2022-30631 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses