MGASA-2022-0210

Source
https://advisories.mageia.org/MGASA-2022-0210.html
Import Source
https://advisories.mageia.org/MGASA-2022-0210.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0210
Related
Published
2022-05-28T08:56:13Z
Modified
2022-05-28T08:00:14Z
Summary
Updated golang packages fix security vulnerability
Details

The syscall.Faccessat function checks whether the calling process can access a file. Faccessat contains a bug where it checks a file’s group permission bits if the process’s user is a member of the process’s group rather than a member of the file’s group. (CVE-2022-29526)

References
Credits

Affected packages

Mageia:8 / golang

Package

Name
golang
Purl
pkg:rpm/mageia/golang?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.17.10-1.mga8

Ecosystem specific

{
    "section": "core"
}