MGASA-2024-0376

Source
https://advisories.mageia.org/MGASA-2024-0376.html
Import Source
https://advisories.mageia.org/MGASA-2024-0376.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0376
Related
Published
2024-11-27T19:59:10Z
Modified
2024-11-27T19:27:39Z
Summary
Updated golang packages fix security vulnerabilities
Details

Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion. CVE-2024-34155 Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion CVE-2024-34156 Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.CVE-2024-34158

References
Credits

Affected packages

Mageia:9 / golang

Package

Name
golang
Purl
pkg:rpm/mageia/golang?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.22.9-1.mga9

Ecosystem specific

{
    "section": "core"
}