Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/ignition@2.14.0-3.rhaos4.11?arch=el8
purl pkg:rpm/redhat/ignition@2.14.0-3.rhaos4.11?arch=el8
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.4
Vulnerabilities affecting this package (6)
Vulnerability Summary Fixed by
VCID-4pue-fbre-zfcf
Aliases:
CVE-2022-23806
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. There are no reported fixed by versions.
VCID-7e1n-pvrt-g3fy
Aliases:
CVE-2022-24921
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. There are no reported fixed by versions.
VCID-835d-4cep-d3ff
Aliases:
CVE-2022-23772
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. There are no reported fixed by versions.
VCID-dsm8-ck8e-wfdh
Aliases:
CVE-2022-24675
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. There are no reported fixed by versions.
VCID-ps89-8u5a-kfc8
Aliases:
CVE-2022-1705
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. There are no reported fixed by versions.
VCID-y131-2ntq-hfdn
Aliases:
CVE-2022-1706
GHSA-hj57-j5cw-2mwp
Ignition config accessible to unprivileged software on VMware ### Impact Unprivileged software in VMware VMs, including software running in unprivileged containers, can retrieve an Ignition config stored in a hypervisor guestinfo variable or OVF environment. If the Ignition config contains secrets, this can result in the compromise of sensitive information. ### Patches Ignition 2.14.0 and later [adds](https://github.com/coreos/ignition/pull/1350) a new systemd service, `ignition-delete-config.service`, that deletes the Ignition config from supported hypervisors (currently VMware and VirtualBox) during the first boot. This ensures that unprivileged software cannot retrieve the Ignition config from the hypervisor. If you have external tooling that requires the Ignition config to remain accessible in VM metadata after provisioning, and your Ignition config does not include sensitive information, you can prevent Ignition 2.14.0 and later from deleting the config by masking `ignition-delete-config.service`. For example: ```json { "ignition": { "version": "3.0.0" }, "systemd": { "units": [ { "name": "ignition-delete-config.service", "mask": true } ] } } ``` ### Workarounds [Avoid storing secrets](https://coreos.github.io/ignition/operator-notes/#secrets) in Ignition configs. In addition to VMware, many cloud platforms allow unprivileged software in a VM to retrieve the Ignition config from a networked cloud metadata service. While platform-specific mitigation is possible, such as firewall rules that prevent access to the metadata service, it's best to store secrets in a dedicated platform such as [Hashicorp Vault](https://www.vaultproject.io/). ### Advice to Linux distributions Linux distributions that ship Ignition should ensure the new `ignition-delete-config.service` is installed and enabled by default. In addition, we recommend shipping a service similar to `ignition-delete-config.service` that runs when existing machines are upgraded, similar to the one in https://github.com/coreos/fedora-coreos-config/pull/1738. Consider giving your users advance notice of this change, and providing instructions for masking `ignition-delete-config.service` on existing nodes if users have tooling that requires the Ignition config to remain accessible in VM metadata. ### References For more information, see #1300 and #1350. ### For more information If you have any questions or comments about this advisory, [open an issue in Ignition](https://github.com/coreos/ignition/issues/new/choose) or email the CoreOS [development mailing list](https://lists.fedoraproject.org/archives/list/coreos@lists.fedoraproject.org/). There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:59:51.978038+00:00 RedHat Importer Affected by VCID-835d-4cep-d3ff https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23772.json 38.0.0
2026-04-01T13:59:39.579004+00:00 RedHat Importer Affected by VCID-4pue-fbre-zfcf https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23806.json 38.0.0
2026-04-01T13:59:29.516740+00:00 RedHat Importer Affected by VCID-7e1n-pvrt-g3fy https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24921.json 38.0.0
2026-04-01T13:58:57.996906+00:00 RedHat Importer Affected by VCID-dsm8-ck8e-wfdh https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24675.json 38.0.0
2026-04-01T13:58:38.910860+00:00 RedHat Importer Affected by VCID-y131-2ntq-hfdn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1706.json 38.0.0
2026-04-01T13:57:54.557702+00:00 RedHat Importer Affected by VCID-ps89-8u5a-kfc8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1705.json 38.0.0