Insufficient Verification of Data Authenticity Affecting golang package, versions <0:1.17.11-1.0.1.module+el8.6.0+20703+24a110ad


Severity

Recommended
0.0
high
0
10

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.1% (44th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE8-GOLANG-2948467
  • published13 Jul 2022
  • disclosed26 Jul 2022

Introduced: 13 Jul 2022

CVE-2022-30269  (opens in a new tab)
CWE-345  (opens in a new tab)

How to fix?

Upgrade Oracle:8 golang to version 0:1.17.11-1.0.1.module+el8.6.0+20703+24a110ad or higher.
This issue was patched in ELSA-2022-17957.

NVD Description

Note: Versions mentioned in the description apply only to the upstream golang package and not the golang package as distributed by Oracle. See How to fix? for Oracle:8 relevant fixed versions and status.

Motorola ACE1000 RTUs through 2022-05-02 mishandle application integrity. They allow for custom application installation via either STS software, the C toolkit, or the ACE1000 Easy Configurator. In the case of the Easy Configurator, application images (as PLX/DAT/APP/CRC files) are uploaded via the Web UI. In case of the C toolkit, they are transferred and installed using SFTP/SSH. In each case, application images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.

CVSS Base Scores

version 3.1