CVE-2022-41715
Docker vulnerability analysis and mitigation

Overview

CVE-2022-41715 is a vulnerability in the Go programming language's regular expression parsing functionality, discovered and disclosed in September 2022. The vulnerability affects programs that compile regular expressions from untrusted sources, making them susceptible to memory exhaustion or denial of service attacks. While the parsed regexp representation maintains linear size relative to input, the constant factor could reach up to 40,000, causing relatively small regular expressions to consume disproportionately large amounts of memory (Go Issue, Go Announce).

Technical details

The vulnerability exists in the regexp/syntax package of Go, where the parsing of regular expressions could lead to excessive memory consumption. The issue stems from the parsed regexp representation having a constant factor that could be as high as 40,000 times the input size. After the fix, each regexp being parsed is now limited to a 256 MB memory footprint, with expressions exceeding this limit being rejected. The vulnerability was discovered by Adam Korczynski from ADA Logics and OSS-Fuzz (CVE Details, Go Vuln).

Impact

The primary impact of this vulnerability is the potential for denial of service through memory exhaustion. When processing regular expressions from untrusted sources, affected systems could experience excessive memory consumption, potentially leading to resource exhaustion or system crashes. However, normal use of regular expressions remains unaffected by this vulnerability (NVD).

Mitigation and workarounds

The vulnerability was patched in Go versions 1.19.2 and 1.18.7. The fix implements a 256 MB memory limit for regexp parsing, automatically rejecting regular expressions that would exceed this limit. Users are advised to upgrade to these versions or later to mitigate the vulnerability (Go Announce).

Additional resources


SourceThis report was generated using AI

Related Docker vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61729HIGH7.5
  • cAdvisorcAdvisor
  • apache-beam-java-sdk
NoYesDec 02, 2025
CVE-2025-52881HIGH7.3
  • cAdvisorcAdvisor
  • kernel-debug
NoYesNov 06, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • kyverno-notation-aws-fips
NoYesDec 03, 2025
CVE-2025-58181MEDIUM5.3
  • cAdvisorcAdvisor
  • aws-node-termination-handler
NoYesNov 19, 2025
CVE-2025-47914MEDIUM5.3
  • cAdvisorcAdvisor
  • sftpgo-plugin-eventsearch
NoYesNov 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management