Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2022-1996 CVE-2022-24675 CVE-2022-28327 CVE-2022-27191 CVE-2022-29526 CVE-2022-30629 |
CWE-ID | CWE-942 CWE-120 CWE-190 CWE-327 CWE-264 CWE-330 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Fedora Operating systems & Components / Operating system xe-guest-utilities-latest Operating systems & Components / Operating system package or component skopeo Operating systems & Components / Operating system package or component singularity Operating systems & Components / Operating system package or component runc Operating systems & Components / Operating system package or component restic Operating systems & Components / Operating system package or component reposurgeon Operating systems & Components / Operating system package or component podman Operating systems & Components / Operating system package or component pack Operating systems & Components / Operating system package or component osbuild-composer Operating systems & Components / Operating system package or component origin Operating systems & Components / Operating system package or component oci-seccomp-bpf-hook Operating systems & Components / Operating system package or component manifest-tool Operating systems & Components / Operating system package or component kompose Operating systems & Components / Operating system package or component kata-containers Operating systems & Components / Operating system package or component ignition Operating systems & Components / Operating system package or component gron Operating systems & Components / Operating system package or component grafana-pcp Operating systems & Components / Operating system package or component grafana Operating systems & Components / Operating system package or component gotun Operating systems & Components / Operating system package or component google-guest-agent Operating systems & Components / Operating system package or component gomtree Operating systems & Components / Operating system package or component golang-starlark Operating systems & Components / Operating system package or component golang-rsc-pdf Operating systems & Components / Operating system package or component golang-github-zyedidia-highlight Operating systems & Components / Operating system package or component golang-github-tscholl2-siec Operating systems & Components / Operating system package or component golang-github-tomnomnom-xtermcolor Operating systems & Components / Operating system package or component golang-github-sqshq-sampler Operating systems & Components / Operating system package or component golang-github-segmentio-ksuid Operating systems & Components / Operating system package or component golang-github-rickb777-date Operating systems & Components / Operating system package or component golang-github-msprev-fzf-bibtex Operating systems & Components / Operating system package or component golang-github-mozillazg-pinyin Operating systems & Components / Operating system package or component golang-github-mbndr-figlet4go Operating systems & Components / Operating system package or component golang-github-lunixbochs-vtclean Operating systems & Components / Operating system package or component golang-github-lofanmi-pinyin Operating systems & Components / Operating system package or component golang-github-letsencrypt-pebble Operating systems & Components / Operating system package or component golang-github-kalafut-imohash Operating systems & Components / Operating system package or component golang-github-heistp-irtt Operating systems & Components / Operating system package or component golang-github-google-dap Operating systems & Components / Operating system package or component golang-github-elves-elvish Operating systems & Components / Operating system package or component golang-github-client9-gospell Operating systems & Components / Operating system package or component golang-github-chromedp Operating systems & Components / Operating system package or component golang-entgo-ent Operating systems & Components / Operating system package or component golang-ariga-atlas Operating systems & Components / Operating system package or component golang Operating systems & Components / Operating system package or component godep Operating systems & Components / Operating system package or component go-bindata Operating systems & Components / Operating system package or component gmailctl Operating systems & Components / Operating system package or component git-octopus Operating systems & Components / Operating system package or component git-lfs Operating systems & Components / Operating system package or component docker-distribution Operating systems & Components / Operating system package or component deepin-gir-generator Operating systems & Components / Operating system package or component cri-o Operating systems & Components / Operating system package or component clipman Operating systems & Components / Operating system package or component cheat Operating systems & Components / Operating system package or component caddy Operating systems & Components / Operating system package or component butane Operating systems & Components / Operating system package or component buildah Operating systems & Components / Operating system package or component asciigraph Operating systems & Components / Operating system package or component apptainer Operating systems & Components / Operating system package or component |
Vendor | Fedoraproject |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU66447
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-1996
CWE-ID:
CWE-942 - Overly Permissive Cross-domain Whitelist
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass the CORS protection mechanism.
The vulnerability exists due to incorrect processing of the "Origin" HTTP header that is supplied within HTTP request. A remote attacker can supply arbitrary value via the "Origin" HTTP header, bypass implemented CORS protection mechanism and perform cross-site scripting attacks against the vulnerable application.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 36
xe-guest-utilities-latest: before 7.30.0-4.fc36
skopeo: before 1.8.0-9.fc36
singularity: before 3.8.7-2.fc36
runc: before 1.1.1-2.fc36
restic: before 0.12.1-3.fc36
reposurgeon: before 4.32-2.fc36
podman: before 4.1.1-2.fc36
pack: before 0.27.0~rc1-4.fc36
osbuild-composer: before 55-2.fc36
origin: before 3.11.2-6.fc36
oci-seccomp-bpf-hook: before 1.2.5-3.fc36
manifest-tool: before 2.0.3-2.fc36
kompose: before 1.17.0-9.fc36
kata-containers: before 2.3.3-2.fc36.1
ignition: before 2.14.0-2.fc36
gron: before 0.7.1-2.fc36
grafana-pcp: before 3.2.0-3.fc36
grafana: before 7.5.15-3.fc36
gotun: before 0-0.14.gita9dbe4d.fc36
google-guest-agent: before 20201217.02-4.fc36
gomtree: before 0.4.0-11.fc36
golang-starlark: before 0-0.7.20210113gite81fc95.fc36
golang-rsc-pdf: before 0.1.1-10.fc36
golang-github-zyedidia-highlight: before 0-0.6.20200218git291680f.fc36
golang-github-tscholl2-siec: before 0-3.20211128git9bdfc48.fc36
golang-github-tomnomnom-xtermcolor: before 0.1.2-8.fc36
golang-github-sqshq-sampler: before 1.1.0-9.fc36
golang-github-segmentio-ksuid: before 1.0.4-3.fc36
golang-github-rickb777-date: before 1.19.1-2.fc36
golang-github-msprev-fzf-bibtex: before 1.1-5.20220205gitd5df2c6.fc36
golang-github-mozillazg-pinyin: before 0.19.0-4.fc36
golang-github-mbndr-figlet4go: before 0-0.8.20191009gitd6cef5b.fc36
golang-github-lunixbochs-vtclean: before 1.0.0-8.fc36
golang-github-lofanmi-pinyin: before 1.0-4.fc36
golang-github-letsencrypt-pebble: before 2.3.1-5.fc36
golang-github-kalafut-imohash: before 1.0.2-3.fc36
golang-github-heistp-irtt: before 0.9.1-2.fc36
golang-github-google-dap: before 0.4.0-4.fc36
golang-github-elves-elvish: before 0.15.0-4.fc36
golang-github-client9-gospell: before 0-0.11.20190524git90dfc71.fc36
golang-github-chromedp: before 0.8.1-2.fc36
golang-entgo-ent: before 0.10.0-4.fc36
golang-ariga-atlas: before 0.3.6-3.fc36
golang: before 1.18.3-2.fc36
godep: before 62-17.fc36
go-bindata: before 3.0.7-22.gita0ff256.fc36
gmailctl: before 0.10.4-3.fc36
git-octopus: before 2.0-0.4.beta.3.fc36.12
git-lfs: before 3.1.2-4.fc36
docker-distribution: before 2.6.2-17.git48294d9.fc36
deepin-gir-generator: before 2.1.0-3.fc36
cri-o: before 1.24.1-2.fc36
clipman: before 1.6.1-3.fc36
cheat: before 4.2.2-4.fc36
caddy: before 2.4.6-3.fc36
butane: before 0.14.0-2.fc36
buildah: before 1.26.1-4.fc36
asciigraph: before 0.5.5-2.fc36
apptainer: before 1.0.2-2.fc36
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2022-ba365d3703
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64266
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-24675
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists in the Golang's library encoding/pem. A remote attacker can send to victim a large (more than 5 MB) PEM input to cause a stack overflow in Decode and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 36
xe-guest-utilities-latest: before 7.30.0-4.fc36
skopeo: before 1.8.0-9.fc36
singularity: before 3.8.7-2.fc36
runc: before 1.1.1-2.fc36
restic: before 0.12.1-3.fc36
reposurgeon: before 4.32-2.fc36
podman: before 4.1.1-2.fc36
pack: before 0.27.0~rc1-4.fc36
osbuild-composer: before 55-2.fc36
origin: before 3.11.2-6.fc36
oci-seccomp-bpf-hook: before 1.2.5-3.fc36
manifest-tool: before 2.0.3-2.fc36
kompose: before 1.17.0-9.fc36
kata-containers: before 2.3.3-2.fc36.1
ignition: before 2.14.0-2.fc36
gron: before 0.7.1-2.fc36
grafana-pcp: before 3.2.0-3.fc36
grafana: before 7.5.15-3.fc36
gotun: before 0-0.14.gita9dbe4d.fc36
google-guest-agent: before 20201217.02-4.fc36
gomtree: before 0.4.0-11.fc36
golang-starlark: before 0-0.7.20210113gite81fc95.fc36
golang-rsc-pdf: before 0.1.1-10.fc36
golang-github-zyedidia-highlight: before 0-0.6.20200218git291680f.fc36
golang-github-tscholl2-siec: before 0-3.20211128git9bdfc48.fc36
golang-github-tomnomnom-xtermcolor: before 0.1.2-8.fc36
golang-github-sqshq-sampler: before 1.1.0-9.fc36
golang-github-segmentio-ksuid: before 1.0.4-3.fc36
golang-github-rickb777-date: before 1.19.1-2.fc36
golang-github-msprev-fzf-bibtex: before 1.1-5.20220205gitd5df2c6.fc36
golang-github-mozillazg-pinyin: before 0.19.0-4.fc36
golang-github-mbndr-figlet4go: before 0-0.8.20191009gitd6cef5b.fc36
golang-github-lunixbochs-vtclean: before 1.0.0-8.fc36
golang-github-lofanmi-pinyin: before 1.0-4.fc36
golang-github-letsencrypt-pebble: before 2.3.1-5.fc36
golang-github-kalafut-imohash: before 1.0.2-3.fc36
golang-github-heistp-irtt: before 0.9.1-2.fc36
golang-github-google-dap: before 0.4.0-4.fc36
golang-github-elves-elvish: before 0.15.0-4.fc36
golang-github-client9-gospell: before 0-0.11.20190524git90dfc71.fc36
golang-github-chromedp: before 0.8.1-2.fc36
golang-entgo-ent: before 0.10.0-4.fc36
golang-ariga-atlas: before 0.3.6-3.fc36
golang: before 1.18.3-2.fc36
godep: before 62-17.fc36
go-bindata: before 3.0.7-22.gita0ff256.fc36
gmailctl: before 0.10.4-3.fc36
git-octopus: before 2.0-0.4.beta.3.fc36.12
git-lfs: before 3.1.2-4.fc36
docker-distribution: before 2.6.2-17.git48294d9.fc36
deepin-gir-generator: before 2.1.0-3.fc36
cri-o: before 1.24.1-2.fc36
clipman: before 1.6.1-3.fc36
cheat: before 4.2.2-4.fc36
caddy: before 2.4.6-3.fc36
butane: before 0.14.0-2.fc36
buildah: before 1.26.1-4.fc36
asciigraph: before 0.5.5-2.fc36
apptainer: before 1.0.2-2.fc36
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2022-ba365d3703
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64269
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-28327
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to integer overflow in the Golang's library crypto/elliptic. A remote attacker can send a specially crafted scalar input longer than 32 bytes to cause P256().ScalarMult or P256().ScalarBaseMult to panic and perform a denial of service attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 36
xe-guest-utilities-latest: before 7.30.0-4.fc36
skopeo: before 1.8.0-9.fc36
singularity: before 3.8.7-2.fc36
runc: before 1.1.1-2.fc36
restic: before 0.12.1-3.fc36
reposurgeon: before 4.32-2.fc36
podman: before 4.1.1-2.fc36
pack: before 0.27.0~rc1-4.fc36
osbuild-composer: before 55-2.fc36
origin: before 3.11.2-6.fc36
oci-seccomp-bpf-hook: before 1.2.5-3.fc36
manifest-tool: before 2.0.3-2.fc36
kompose: before 1.17.0-9.fc36
kata-containers: before 2.3.3-2.fc36.1
ignition: before 2.14.0-2.fc36
gron: before 0.7.1-2.fc36
grafana-pcp: before 3.2.0-3.fc36
grafana: before 7.5.15-3.fc36
gotun: before 0-0.14.gita9dbe4d.fc36
google-guest-agent: before 20201217.02-4.fc36
gomtree: before 0.4.0-11.fc36
golang-starlark: before 0-0.7.20210113gite81fc95.fc36
golang-rsc-pdf: before 0.1.1-10.fc36
golang-github-zyedidia-highlight: before 0-0.6.20200218git291680f.fc36
golang-github-tscholl2-siec: before 0-3.20211128git9bdfc48.fc36
golang-github-tomnomnom-xtermcolor: before 0.1.2-8.fc36
golang-github-sqshq-sampler: before 1.1.0-9.fc36
golang-github-segmentio-ksuid: before 1.0.4-3.fc36
golang-github-rickb777-date: before 1.19.1-2.fc36
golang-github-msprev-fzf-bibtex: before 1.1-5.20220205gitd5df2c6.fc36
golang-github-mozillazg-pinyin: before 0.19.0-4.fc36
golang-github-mbndr-figlet4go: before 0-0.8.20191009gitd6cef5b.fc36
golang-github-lunixbochs-vtclean: before 1.0.0-8.fc36
golang-github-lofanmi-pinyin: before 1.0-4.fc36
golang-github-letsencrypt-pebble: before 2.3.1-5.fc36
golang-github-kalafut-imohash: before 1.0.2-3.fc36
golang-github-heistp-irtt: before 0.9.1-2.fc36
golang-github-google-dap: before 0.4.0-4.fc36
golang-github-elves-elvish: before 0.15.0-4.fc36
golang-github-client9-gospell: before 0-0.11.20190524git90dfc71.fc36
golang-github-chromedp: before 0.8.1-2.fc36
golang-entgo-ent: before 0.10.0-4.fc36
golang-ariga-atlas: before 0.3.6-3.fc36
golang: before 1.18.3-2.fc36
godep: before 62-17.fc36
go-bindata: before 3.0.7-22.gita0ff256.fc36
gmailctl: before 0.10.4-3.fc36
git-octopus: before 2.0-0.4.beta.3.fc36.12
git-lfs: before 3.1.2-4.fc36
docker-distribution: before 2.6.2-17.git48294d9.fc36
deepin-gir-generator: before 2.1.0-3.fc36
cri-o: before 1.24.1-2.fc36
clipman: before 1.6.1-3.fc36
cheat: before 4.2.2-4.fc36
caddy: before 2.4.6-3.fc36
butane: before 0.14.0-2.fc36
buildah: before 1.26.1-4.fc36
asciigraph: before 0.5.5-2.fc36
apptainer: before 1.0.2-2.fc36
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2022-ba365d3703
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62039
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-27191
CWE-ID:
CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error in golang.org/x/crypto/ssh before 0.0.0-20220314234659-1baeb1ce4c0b, as used in Go programming language. A remote attacker can crash a server in certain circumstances involving AddHostKey.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 36
xe-guest-utilities-latest: before 7.30.0-4.fc36
skopeo: before 1.8.0-9.fc36
singularity: before 3.8.7-2.fc36
runc: before 1.1.1-2.fc36
restic: before 0.12.1-3.fc36
reposurgeon: before 4.32-2.fc36
podman: before 4.1.1-2.fc36
pack: before 0.27.0~rc1-4.fc36
osbuild-composer: before 55-2.fc36
origin: before 3.11.2-6.fc36
oci-seccomp-bpf-hook: before 1.2.5-3.fc36
manifest-tool: before 2.0.3-2.fc36
kompose: before 1.17.0-9.fc36
kata-containers: before 2.3.3-2.fc36.1
ignition: before 2.14.0-2.fc36
gron: before 0.7.1-2.fc36
grafana-pcp: before 3.2.0-3.fc36
grafana: before 7.5.15-3.fc36
gotun: before 0-0.14.gita9dbe4d.fc36
google-guest-agent: before 20201217.02-4.fc36
gomtree: before 0.4.0-11.fc36
golang-starlark: before 0-0.7.20210113gite81fc95.fc36
golang-rsc-pdf: before 0.1.1-10.fc36
golang-github-zyedidia-highlight: before 0-0.6.20200218git291680f.fc36
golang-github-tscholl2-siec: before 0-3.20211128git9bdfc48.fc36
golang-github-tomnomnom-xtermcolor: before 0.1.2-8.fc36
golang-github-sqshq-sampler: before 1.1.0-9.fc36
golang-github-segmentio-ksuid: before 1.0.4-3.fc36
golang-github-rickb777-date: before 1.19.1-2.fc36
golang-github-msprev-fzf-bibtex: before 1.1-5.20220205gitd5df2c6.fc36
golang-github-mozillazg-pinyin: before 0.19.0-4.fc36
golang-github-mbndr-figlet4go: before 0-0.8.20191009gitd6cef5b.fc36
golang-github-lunixbochs-vtclean: before 1.0.0-8.fc36
golang-github-lofanmi-pinyin: before 1.0-4.fc36
golang-github-letsencrypt-pebble: before 2.3.1-5.fc36
golang-github-kalafut-imohash: before 1.0.2-3.fc36
golang-github-heistp-irtt: before 0.9.1-2.fc36
golang-github-google-dap: before 0.4.0-4.fc36
golang-github-elves-elvish: before 0.15.0-4.fc36
golang-github-client9-gospell: before 0-0.11.20190524git90dfc71.fc36
golang-github-chromedp: before 0.8.1-2.fc36
golang-entgo-ent: before 0.10.0-4.fc36
golang-ariga-atlas: before 0.3.6-3.fc36
golang: before 1.18.3-2.fc36
godep: before 62-17.fc36
go-bindata: before 3.0.7-22.gita0ff256.fc36
gmailctl: before 0.10.4-3.fc36
git-octopus: before 2.0-0.4.beta.3.fc36.12
git-lfs: before 3.1.2-4.fc36
docker-distribution: before 2.6.2-17.git48294d9.fc36
deepin-gir-generator: before 2.1.0-3.fc36
cri-o: before 1.24.1-2.fc36
clipman: before 1.6.1-3.fc36
cheat: before 4.2.2-4.fc36
caddy: before 2.4.6-3.fc36
butane: before 0.14.0-2.fc36
buildah: before 1.26.1-4.fc36
asciigraph: before 0.5.5-2.fc36
apptainer: before 1.0.2-2.fc36
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2022-ba365d3703
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63173
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-29526
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to the Faccessat function can incorrectly report that a file is accessible, when called with a non-zero flags parameter. An attacker can bypass implemented security restrictions.
Install updates from vendor's repository.
Vulnerable software versionsFedora: 36
xe-guest-utilities-latest: before 7.30.0-4.fc36
skopeo: before 1.8.0-9.fc36
singularity: before 3.8.7-2.fc36
runc: before 1.1.1-2.fc36
restic: before 0.12.1-3.fc36
reposurgeon: before 4.32-2.fc36
podman: before 4.1.1-2.fc36
pack: before 0.27.0~rc1-4.fc36
osbuild-composer: before 55-2.fc36
origin: before 3.11.2-6.fc36
oci-seccomp-bpf-hook: before 1.2.5-3.fc36
manifest-tool: before 2.0.3-2.fc36
kompose: before 1.17.0-9.fc36
kata-containers: before 2.3.3-2.fc36.1
ignition: before 2.14.0-2.fc36
gron: before 0.7.1-2.fc36
grafana-pcp: before 3.2.0-3.fc36
grafana: before 7.5.15-3.fc36
gotun: before 0-0.14.gita9dbe4d.fc36
google-guest-agent: before 20201217.02-4.fc36
gomtree: before 0.4.0-11.fc36
golang-starlark: before 0-0.7.20210113gite81fc95.fc36
golang-rsc-pdf: before 0.1.1-10.fc36
golang-github-zyedidia-highlight: before 0-0.6.20200218git291680f.fc36
golang-github-tscholl2-siec: before 0-3.20211128git9bdfc48.fc36
golang-github-tomnomnom-xtermcolor: before 0.1.2-8.fc36
golang-github-sqshq-sampler: before 1.1.0-9.fc36
golang-github-segmentio-ksuid: before 1.0.4-3.fc36
golang-github-rickb777-date: before 1.19.1-2.fc36
golang-github-msprev-fzf-bibtex: before 1.1-5.20220205gitd5df2c6.fc36
golang-github-mozillazg-pinyin: before 0.19.0-4.fc36
golang-github-mbndr-figlet4go: before 0-0.8.20191009gitd6cef5b.fc36
golang-github-lunixbochs-vtclean: before 1.0.0-8.fc36
golang-github-lofanmi-pinyin: before 1.0-4.fc36
golang-github-letsencrypt-pebble: before 2.3.1-5.fc36
golang-github-kalafut-imohash: before 1.0.2-3.fc36
golang-github-heistp-irtt: before 0.9.1-2.fc36
golang-github-google-dap: before 0.4.0-4.fc36
golang-github-elves-elvish: before 0.15.0-4.fc36
golang-github-client9-gospell: before 0-0.11.20190524git90dfc71.fc36
golang-github-chromedp: before 0.8.1-2.fc36
golang-entgo-ent: before 0.10.0-4.fc36
golang-ariga-atlas: before 0.3.6-3.fc36
golang: before 1.18.3-2.fc36
godep: before 62-17.fc36
go-bindata: before 3.0.7-22.gita0ff256.fc36
gmailctl: before 0.10.4-3.fc36
git-octopus: before 2.0-0.4.beta.3.fc36.12
git-lfs: before 3.1.2-4.fc36
docker-distribution: before 2.6.2-17.git48294d9.fc36
deepin-gir-generator: before 2.1.0-3.fc36
cri-o: before 1.24.1-2.fc36
clipman: before 1.6.1-3.fc36
cheat: before 4.2.2-4.fc36
caddy: before 2.4.6-3.fc36
butane: before 0.14.0-2.fc36
buildah: before 1.26.1-4.fc36
asciigraph: before 0.5.5-2.fc36
apptainer: before 1.0.2-2.fc36
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2022-ba365d3703
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66122
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-30629
CWE-ID:
CWE-330 - Use of Insufficiently Random Values
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker gain access to sensitive information.
The vulnerability exists in crypto/tls implementation when generating TLS tickets age. The newSessionTicketMsgTLS13.ageAdd is always set to "0" instead of a random value.
Install updates from vendor's repository.
Vulnerable software versionsFedora: 36
xe-guest-utilities-latest: before 7.30.0-4.fc36
skopeo: before 1.8.0-9.fc36
singularity: before 3.8.7-2.fc36
runc: before 1.1.1-2.fc36
restic: before 0.12.1-3.fc36
reposurgeon: before 4.32-2.fc36
podman: before 4.1.1-2.fc36
pack: before 0.27.0~rc1-4.fc36
osbuild-composer: before 55-2.fc36
origin: before 3.11.2-6.fc36
oci-seccomp-bpf-hook: before 1.2.5-3.fc36
manifest-tool: before 2.0.3-2.fc36
kompose: before 1.17.0-9.fc36
kata-containers: before 2.3.3-2.fc36.1
ignition: before 2.14.0-2.fc36
gron: before 0.7.1-2.fc36
grafana-pcp: before 3.2.0-3.fc36
grafana: before 7.5.15-3.fc36
gotun: before 0-0.14.gita9dbe4d.fc36
google-guest-agent: before 20201217.02-4.fc36
gomtree: before 0.4.0-11.fc36
golang-starlark: before 0-0.7.20210113gite81fc95.fc36
golang-rsc-pdf: before 0.1.1-10.fc36
golang-github-zyedidia-highlight: before 0-0.6.20200218git291680f.fc36
golang-github-tscholl2-siec: before 0-3.20211128git9bdfc48.fc36
golang-github-tomnomnom-xtermcolor: before 0.1.2-8.fc36
golang-github-sqshq-sampler: before 1.1.0-9.fc36
golang-github-segmentio-ksuid: before 1.0.4-3.fc36
golang-github-rickb777-date: before 1.19.1-2.fc36
golang-github-msprev-fzf-bibtex: before 1.1-5.20220205gitd5df2c6.fc36
golang-github-mozillazg-pinyin: before 0.19.0-4.fc36
golang-github-mbndr-figlet4go: before 0-0.8.20191009gitd6cef5b.fc36
golang-github-lunixbochs-vtclean: before 1.0.0-8.fc36
golang-github-lofanmi-pinyin: before 1.0-4.fc36
golang-github-letsencrypt-pebble: before 2.3.1-5.fc36
golang-github-kalafut-imohash: before 1.0.2-3.fc36
golang-github-heistp-irtt: before 0.9.1-2.fc36
golang-github-google-dap: before 0.4.0-4.fc36
golang-github-elves-elvish: before 0.15.0-4.fc36
golang-github-client9-gospell: before 0-0.11.20190524git90dfc71.fc36
golang-github-chromedp: before 0.8.1-2.fc36
golang-entgo-ent: before 0.10.0-4.fc36
golang-ariga-atlas: before 0.3.6-3.fc36
golang: before 1.18.3-2.fc36
godep: before 62-17.fc36
go-bindata: before 3.0.7-22.gita0ff256.fc36
gmailctl: before 0.10.4-3.fc36
git-octopus: before 2.0-0.4.beta.3.fc36.12
git-lfs: before 3.1.2-4.fc36
docker-distribution: before 2.6.2-17.git48294d9.fc36
deepin-gir-generator: before 2.1.0-3.fc36
cri-o: before 1.24.1-2.fc36
clipman: before 1.6.1-3.fc36
cheat: before 4.2.2-4.fc36
caddy: before 2.4.6-3.fc36
butane: before 0.14.0-2.fc36
buildah: before 1.26.1-4.fc36
asciigraph: before 0.5.5-2.fc36
apptainer: before 1.0.2-2.fc36
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2022-ba365d3703
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.