MGASA-2022-0356

Source
https://advisories.mageia.org/MGASA-2022-0356.html
Import Source
https://advisories.mageia.org/MGASA-2022-0356.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0356
Related
Published
2022-10-05T05:23:49Z
Modified
2022-10-05T04:16:19Z
Summary
Updated golang packages fix security vulnerability
Details

In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error. (CVE-2022-27664)

JoinPath and URL.JoinPath do not remove ../ path elements appended to a relative path. For example, JoinPath("https://go.dev", "../go") returns the URL "https://go.dev/../go", despite the JoinPath documentation stating that ../ path elements are removed from the result. (CVE-2022-32190)

References
Credits

Affected packages

Mageia:8 / golang

Package

Name
golang
Purl
pkg:rpm/mageia/golang?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.18.6-1.mga8

Ecosystem specific

{
    "section": "core"
}