Your message dated Tue, 20 Jan 2026 18:03:58 +0000
with message-id <[email protected]>
and subject line Bug#1122179: Removed package(s) from unstable
has caused the Debian Bug report #1011741,
regarding golang-github-hashicorp-go-getter: Multiple Vulnerabilities In 
go-getter library (CVE-2022-26945 CVE-2022-30321 CVE-2022-30322 CVE-2022-30323)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1011741: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011741
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: golang-github-hashicorp-go-getter
Version: 1.4.1-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team 
<[email protected]>

Hi,

The following vulnerabilities were published for 
golang-github-hashicorp-go-getter.

CVE-2022-26945[0]:
| HashiCorp go-getter before 2.0.2 allows Command Injection.


CVE-2022-30321[1]:
| HashiCorp go-getter through 2.0.2 does not safely perform downloads
| (issue 1 of 3).


CVE-2022-30322[2]:
| HashiCorp go-getter through 2.0.2 does not safely perform downloads
| (issue 2 of 3).


CVE-2022-30323[3]:
| HashiCorp go-getter through 2.0.2 does not safely perform downloads
| (issue 3 of 3).


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-26945
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26945
[1] https://security-tracker.debian.org/tracker/CVE-2022-30321
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30321
[2] https://security-tracker.debian.org/tracker/CVE-2022-30322
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30322
[3] https://security-tracker.debian.org/tracker/CVE-2022-30323
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30323

Please adjust the affected versions in the BTS as needed.

These vulnerabilities were fixed in go-getter 1.6.1 and 2.1.0.

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.17.0-2-amd64 (SMP w/6 CPU threads; PREEMPT)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Version: 1.4.1-1+rm

Dear submitter,

as the package golang-github-hashicorp-go-getter has just been removed from the 
Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/1122179

The version of this package that was in Debian prior to this removal
can still be found using https://snapshot.debian.org/.

Please note that the changes have been done on the master archive and
will not propagate to any mirrors until the next dinstall run at the
earliest.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
[email protected].

Debian distribution maintenance software
pp.
Thorsten Alteholz (the ftpmaster behind the curtain)

--- End Message ---

Reply via email to