First published: Fri Feb 11 2022(Updated: )
An unspecified error with not treating branches with semantic-version names as releases in cmd/go in Golang Go has an unknown impact and attack vector.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.16.14 | |
Golang Go | >=1.17.0<1.17.7 | |
Netapp Beegfs Csi Driver | ||
Netapp Cloud Insights Telegraf Agent | ||
Netapp Kubernetes Monitoring Operator | ||
Netapp Storagegrid | ||
redhat/go | <1.17.7 | 1.17.7 |
redhat/go | <1.16.14 | 1.16.14 |
redhat/openshift-serverless-clients | <0:1.1.0-3.el8 | 0:1.1.0-3.el8 |
redhat/servicemesh | <0:2.1.3-1.el8 | 0:2.1.3-1.el8 |
redhat/servicemesh-operator | <0:2.1.3-2.el8 | 0:2.1.3-2.el8 |
redhat/servicemesh-prometheus | <0:2.23.0-7.el8 | 0:2.23.0-7.el8 |
redhat/servicemesh-proxy | <0:2.1.3-1.el8 | 0:2.1.3-1.el8 |
redhat/servicemesh-ratelimit | <0:2.1.3-1.el8 | 0:2.1.3-1.el8 |
redhat/cri-tools | <0:1.23.0-1.1.el7 | 0:1.23.0-1.1.el7 |
redhat/cri-o | <0:1.23.3-14.rhaos4.10.git6af791c.1.el8 | 0:1.23.3-14.rhaos4.10.git6af791c.1.el8 |
redhat/buildah | <1:1.23.4-2.el8 | 1:1.23.4-2.el8 |
redhat/butane | <0:0.15.0-1.rhaos4.11.el8 | 0:0.15.0-1.rhaos4.11.el8 |
redhat/podman | <2:4.0.2-6.rhaos4.11.el8 | 2:4.0.2-6.rhaos4.11.el8 |
redhat/runc | <3:1.1.2-1.rhaos4.11.el8 | 3:1.1.2-1.rhaos4.11.el8 |
redhat/skopeo | <2:1.5.2-3.rhaos4.11.el8 | 2:1.5.2-3.rhaos4.11.el8 |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-23773 is a vulnerability in the cmd/go package in Go before versions 1.16.14 and 1.17.x before 1.17.7 that can misinterpret branch names and lead to the introduction of invalid or incorrect tags.
CVE-2022-23773 has a severity rating of high with a CVSS score of 7.5.
CVE-2022-23773 affects Go versions before 1.16.14 and 1.17.x before 1.17.7.
CVE-2022-23773 can be exploited by tricking the go command into accepting a branch that resembles a version tag.
Yes, you can find more information about CVE-2022-23773 at the following references: [Reference 1](https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ), [Reference 2](https://security.gentoo.org/glsa/202208-02), [Reference 3](https://security.netapp.com/advisory/ntap-20220225-0006/).