First published: Thu Jun 02 2022(Updated: )
A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.3.1-4.el8 | 0:1.3.1-4.el8 |
redhat/servicemesh | <0:2.1.5-1.el8 | 0:2.1.5-1.el8 |
redhat/servicemesh-operator | <0:2.1.5-1.el8 | 0:2.1.5-1.el8 |
redhat/servicemesh-prometheus | <0:2.23.0-9.el8 | 0:2.23.0-9.el8 |
redhat/servicemesh-proxy | <0:2.1.5-1.el8 | 0:2.1.5-1.el8 |
redhat/servicemesh-ratelimit | <0:2.1.5-1.el8 | 0:2.1.5-1.el8 |
redhat/go-toolset | <1.17-0:1.17.12-1.el7_9 | 1.17-0:1.17.12-1.el7_9 |
redhat/go-toolset | <1.17-golang-0:1.17.12-1.el7_9 | 1.17-golang-0:1.17.12-1.el7_9 |
redhat/golang | <0:1.17.12-1.el9_0 | 0:1.17.12-1.el9_0 |
redhat/go-toolset | <0:1.17.12-1.el9_0 | 0:1.17.12-1.el9_0 |
redhat/buildah | <1:1.29.1-1.el9 | 1:1.29.1-1.el9 |
redhat/podman | <2:4.4.1-3.el9 | 2:4.4.1-3.el9 |
redhat/skopeo | <2:1.11.2-0.1.el9 | 2:1.11.2-0.1.el9 |
redhat/containernetworking-plugins | <1:1.2.0-1.el9 | 1:1.2.0-1.el9 |
redhat/butane | <0:0.15.0-2.rhaos4.11.el8 | 0:0.15.0-2.rhaos4.11.el8 |
redhat/cri-o | <0:1.24.2-4.rhaos4.11.gitd6283df.el8 | 0:1.24.2-4.rhaos4.11.gitd6283df.el8 |
redhat/ignition | <0:2.14.0-4.rhaos4.11.el8 | 0:2.14.0-4.rhaos4.11.el8 |
redhat/cri-tools | <0:1.24.2-6.el8 | 0:1.24.2-6.el8 |
redhat/skopeo | <2:1.5.2-4.rhaos4.11.el8 | 2:1.5.2-4.rhaos4.11.el8 |
redhat/etcd | <0:3.3.23-12.el8 | 0:3.3.23-12.el8 |
redhat/kubevirt | <0:4.12.0-1057.el7 | 0:4.12.0-1057.el7 |
redhat/kubevirt | <0:4.12.0-1057.el8 | 0:4.12.0-1057.el8 |
Golang Go | <1.17.11 | |
Golang Go | >=1.18.0<1.18.3 | |
redhat/go | <1.18.3 | 1.18.3 |
redhat/go | <1.17.11 | 1.17.11 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-30629 is a vulnerability that affects the crypto/tls package in Go versions before 1.17.11 and 1.18.3.
CVE-2022-30629 allows an attacker to observe TLS handshakes and correlate successive connections during session resumption.
CVE-2022-30629 has a severity rating of 3.1 (low).
The remedy for CVE-2022-30629 is to update to Go versions 1.17.11 or 1.18.3.
You can find more information about CVE-2022-30629 at the following references: [Link 1](https://go.dev/issue/52814), [Link 2](https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg), [Link 3](https://github.com/golang/go/commit/fe4de36198794c447fbd9d7cc2d7199a506c76a5).