Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/ignition@2.14.0-1?arch=el9
Typerpm
Namespaceredhat
Nameignition
Version2.14.0-1
Qualifiers
arch el9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-y131-2ntq-hfdn
vulnerability_id VCID-y131-2ntq-hfdn
summary
Ignition config accessible to unprivileged software on VMware
### Impact
Unprivileged software in VMware VMs, including software running in unprivileged containers, can retrieve an Ignition config stored in a hypervisor guestinfo variable or OVF environment.  If the Ignition config contains secrets, this can result in the compromise of sensitive information.

### Patches
Ignition 2.14.0 and later [adds](https://github.com/coreos/ignition/pull/1350) a new systemd service, `ignition-delete-config.service`, that deletes the Ignition config from supported hypervisors (currently VMware and VirtualBox) during the first boot.  This ensures that unprivileged software cannot retrieve the Ignition config from the hypervisor.

If you have external tooling that requires the Ignition config to remain accessible in VM metadata after provisioning, and your Ignition config does not include sensitive information, you can prevent Ignition 2.14.0 and later from deleting the config by masking `ignition-delete-config.service`.  For example:

```json
{
  "ignition": {
    "version": "3.0.0"
  },
  "systemd": {
    "units": [
      {
        "name": "ignition-delete-config.service",
        "mask": true
      }
    ]
  }
}
```

### Workarounds
[Avoid storing secrets](https://coreos.github.io/ignition/operator-notes/#secrets) in Ignition configs. In addition to VMware, many cloud platforms allow unprivileged software in a VM to retrieve the Ignition config from a networked cloud metadata service. While platform-specific mitigation is possible, such as firewall rules that prevent access to the metadata service, it's best to store secrets in a dedicated platform such as [Hashicorp Vault](https://www.vaultproject.io/).

### Advice to Linux distributions
Linux distributions that ship Ignition should ensure the new `ignition-delete-config.service` is installed and enabled by default.

In addition, we recommend shipping a service similar to `ignition-delete-config.service` that runs when existing machines are upgraded, similar to the one in https://github.com/coreos/fedora-coreos-config/pull/1738. Consider giving your users advance notice of this change, and providing instructions for masking `ignition-delete-config.service` on existing nodes if users have tooling that requires the Ignition config to remain accessible in VM metadata.

### References
For more information, see #1300 and #1350.

### For more information
If you have any questions or comments about this advisory, [open an issue in Ignition](https://github.com/coreos/ignition/issues/new/choose) or email the CoreOS [development mailing list](https://lists.fedoraproject.org/archives/list/coreos@lists.fedoraproject.org/).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1706.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1706.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1706
reference_id
reference_type
scores
0
value 0.00592
scoring_system epss
scoring_elements 0.69315
published_at 2026-04-24T12:55:00Z
1
value 0.00592
scoring_system epss
scoring_elements 0.69189
published_at 2026-04-07T12:55:00Z
2
value 0.00592
scoring_system epss
scoring_elements 0.69239
published_at 2026-04-08T12:55:00Z
3
value 0.00592
scoring_system epss
scoring_elements 0.69258
published_at 2026-04-09T12:55:00Z
4
value 0.00592
scoring_system epss
scoring_elements 0.6928
published_at 2026-04-11T12:55:00Z
5
value 0.00592
scoring_system epss
scoring_elements 0.69265
published_at 2026-04-12T12:55:00Z
6
value 0.00592
scoring_system epss
scoring_elements 0.69237
published_at 2026-04-13T12:55:00Z
7
value 0.00592
scoring_system epss
scoring_elements 0.69276
published_at 2026-04-16T12:55:00Z
8
value 0.00592
scoring_system epss
scoring_elements 0.69284
published_at 2026-04-18T12:55:00Z
9
value 0.00592
scoring_system epss
scoring_elements 0.69264
published_at 2026-04-21T12:55:00Z
10
value 0.00592
scoring_system epss
scoring_elements 0.69172
published_at 2026-04-01T12:55:00Z
11
value 0.00592
scoring_system epss
scoring_elements 0.69187
published_at 2026-04-02T12:55:00Z
12
value 0.00592
scoring_system epss
scoring_elements 0.69208
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1706
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/coreos/ignition
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/ignition
4
reference_url https://github.com/coreos/ignition/issues/1300
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/ignition/issues/1300
5
reference_url https://github.com/coreos/ignition/pull/1350
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/ignition/pull/1350
6
reference_url https://github.com/coreos/ignition/security/advisories/GHSA-hj57-j5cw-2mwp
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/ignition/security/advisories/GHSA-hj57-j5cw-2mwp
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014716
reference_id 1014716
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014716
8
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
9
reference_url https://access.redhat.com/errata/RHSA-2022:8126
reference_id RHSA-2022:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8126
fixed_packages
aliases CVE-2022-1706, GHSA-hj57-j5cw-2mwp
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y131-2ntq-hfdn
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.14.0-1%3Farch=el9