|
|
Subscribe / Log in / New account

Mageia alert MGASA-2022-0210 (golang)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2022-0210: Updated golang packages fix security vulnerability
Date:  Sat, 28 May 2022 10:57:10 +0200
Message-ID:  <20220528085710.C07D29FA86@duvel.mageia.org>
Archive-link:  Article

MGASA-2022-0210 - Updated golang packages fix security vulnerability Publication date: 28 May 2022 URL: https://advisories.mageia.org/MGASA-2022-0210.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-29526 Description: The syscall.Faccessat function checks whether the calling process can access a file. Faccessat contains a bug where it checks a file’s group permission bits if the process’s user is a member of the process’s group rather than a member of the file’s group. (CVE-2022-29526) References: - https://bugs.mageia.org/show_bug.cgi?id=30469 - https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU - https://lists.opensuse.org/archives/list/security-announc... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... SRPMS: - 8/core/golang-1.17.10-1.mga8


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds