First published: Wed Jul 20 2022(Updated: )
Release osp-director-operator images<br>Security Fix(es):<br><li> go-getter: unsafe download (issue 1 of 3) [Important] (CVE-2022-30321)</li> <li> go-getter: unsafe download (issue 2 of 3) [Important] (CVE-2022-30322)</li> <li> go-getter: unsafe download (issue 3 of 3) [Important] (CVE-2022-30323)</li> <li> go-getter: command injection vulnerability [Important] (CVE-2022-26945)</li> <li> golang.org/x/crypto: empty plaintext packet causes panic [Moderate] (CVE-2021-43565)</li> <li> containerd: insufficiently restricted permissions on container root and plugin directories [Moderate] (CVE-2021-41103)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
>=16.2.z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:5673 is classified as Important.
RHSA-2022:5673 addresses three vulnerabilities related to unsafe downloads of the go-getter library.
To fix RHSA-2022:5673, update the affected packages to the latest version provided in the security advisory.
The CVE identifiers associated with RHSA-2022:5673 are CVE-2022-30321, CVE-2022-30322, and others.
There are currently no documented workarounds for the vulnerabilities in RHSA-2022:5673.