Insufficient Verification of Data Authenticity Affecting go-toolset package, versions <0:1.17.11-1.module+el8.6.0+20703+24a110ad


Severity

Recommended
0.0
high
0
10

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.09% (39th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE8-GOTOOLSET-2948472
  • published13 Jul 2022
  • disclosed26 Jul 2022

Introduced: 13 Jul 2022

CVE-2022-30269  (opens in a new tab)
CWE-345  (opens in a new tab)

How to fix?

Upgrade Oracle:8 go-toolset to version 0:1.17.11-1.module+el8.6.0+20703+24a110ad or higher.
This issue was patched in ELSA-2022-17957.

NVD Description

Note: Versions mentioned in the description apply only to the upstream go-toolset package and not the go-toolset package as distributed by Oracle. See How to fix? for Oracle:8 relevant fixed versions and status.

Motorola ACE1000 RTUs through 2022-05-02 mishandle application integrity. They allow for custom application installation via either STS software, the C toolkit, or the ACE1000 Easy Configurator. In the case of the Easy Configurator, application images (as PLX/DAT/APP/CRC files) are uploaded via the Web UI. In case of the C toolkit, they are transferred and installed using SFTP/SSH. In each case, application images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.

CVSS Scores

version 3.1