Bug 2092918 (CVE-2022-30321)
Summary: | CVE-2022-30321 go-getter: unsafe download (issue 1 of 3) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | amctagga, bdettelb, bmontgom, eclipseo, eglynn, eparis, go-sig, gparvin, gsuckevi, hfukumot, jburrell, jjoyce, jokerman, jramanat, lhh, mburns, njean, nstielau, pahickey, rdey, rhos-maint, rpittau, security-response-team, sponnaga, spower, stcannon, tsedovic, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | github.com/hashicorp/go-getter 1.6.1, github.com/hashicorp/go-getter 2.1.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in go-getter. Several vulnerabilities were identified in the way go-getter processes HTTP responses, response headers, and password-protected ZIP files. This flaw allows an attacker to bypass certain configuration settings and may lead to a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-12-07 13:32:53 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2092922, 2100980, 2100981, 2100982, 2100983, 2100984, 2100985, 2100986, 2100987, 2100988, 2100989, 2100990, 2100991, 2100992, 2100993, 2100994, 2100995, 2100996, 2100997, 2100998, 2100999, 2101000, 2101001, 2101002, 2101003, 2101004, 2101005, 2101006, 2101007, 2101008, 2101009, 2101010, 2101011, 2101012, 2101013, 2101014, 2101015, 2101016, 2101017, 2101018, 2101026, 2101027, 2101028 | ||
Bug Blocks: | 2092556 |
Description
Guilherme de Almeida Suckevicz
2022-06-02 14:25:44 UTC
Created golang-github-yujunz-getter tracking bugs for this issue: Affects: fedora-all [bug 2092922] What's the point of the three duplicate issues[1]? Is there something that I'm missing here? [1]: https://bugzilla.redhat.com/show_bug.cgi?id=2092918 https://bugzilla.redhat.com/show_bug.cgi?id=2092923 https://bugzilla.redhat.com/show_bug.cgi?id=2092925 (In reply to Maxwell G from comment #5) > What's the point of the three duplicate issues[1]? Is there something that > I'm missing here? > > [1]: https://bugzilla.redhat.com/show_bug.cgi?id=2092918 > https://bugzilla.redhat.com/show_bug.cgi?id=2092923 > https://bugzilla.redhat.com/show_bug.cgi?id=2092925 Ah, I guess there are three different CVEs surrounding unsafe downloads. I did not look closely at the CVE numbers. Feel free to disregard this. This issue has been addressed in the following products: Red Hat OpenStack Platform 16.2 Via RHSA-2022:5673 https://access.redhat.com/errata/RHSA-2022:5673 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.11 Via RHSA-2022:5069 https://access.redhat.com/errata/RHSA-2022:5069 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.10 Via RHSA-2022:6133 https://access.redhat.com/errata/RHSA-2022:6133 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2022:6147 https://access.redhat.com/errata/RHSA-2022:6147 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.10 Via RHSA-2022:6258 https://access.redhat.com/errata/RHSA-2022:6258 I am removing myself from this issue. Please see https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/ETPDV57SDTABYN6P6MGRZWRRCXVFLPZD/ for a discussion on how prodsec can properly deal with Fedora vulnerabilities. This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.8 Via RHSA-2022:6308 https://access.redhat.com/errata/RHSA-2022:6308 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.10 Via RHSA-2022:6805 https://access.redhat.com/errata/RHSA-2022:6805 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.8 Via RHSA-2022:6801 https://access.redhat.com/errata/RHSA-2022:6801 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2022:6905 https://access.redhat.com/errata/RHSA-2022:6905 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.11 Via RHSA-2022:7201 https://access.redhat.com/errata/RHSA-2022:7201 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.10 Via RHSA-2022:7211 https://access.redhat.com/errata/RHSA-2022:7211 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2022:7216 https://access.redhat.com/errata/RHSA-2022:7216 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.8 Via RHSA-2022:7874 https://access.redhat.com/errata/RHSA-2022:7874 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-30321 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2022:9111 https://access.redhat.com/errata/RHSA-2022:9111 |