[GLSA-202208-02] Go: Multiple Vulnerabilities
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
Background
Go is an open source programming language that makes it easy to build simple, reliable, and efficient software.
Description
Multiple vulnerabilities have been discovered in Go. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Go users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/go-1.18.5"
In addition, users using Portage 3.0.9 or later should ensure that packages with Go binaries have no vulnerable code statically linked into their binaries by rebuilding the @golang-rebuild set:
# emerge --ask --oneshot --verbose @golang-rebuild
Package | Affected Version |
---|---|
pkg:ebuild/dev-lang/go?distro=gentoo | < 1.18.5 |
Package | Unaffected Version |
---|---|
pkg:ebuild/dev-lang/go?distro=gentoo | >= 1.18.5 |
- ID
- GLSA-202208-02
- Severity
- high
- URL
- https://security.gentoo.org/glsa/202208-02
- Published
-
2022-08-04T00:00:00
(2 years ago) - Modified
-
2022-08-04T00:00:00
(2 years ago) - Rights
- Gentoo Foundation, Inc.
- Other Advisories
-
- ALAS-2021-1471
- ALAS-2021-1512
- ALAS-2021-1527
- ALAS-2021-1538
- ALAS-2022-1583
- ALAS-2022-1635
- ALAS-2023-1685
- ALAS-2023-1731
- ALAS2-2021-1578
- ALAS2-2021-1609
- ALAS2-2021-1657
- ALAS2-2021-1694
- ALAS2-2022-1776
- ALAS2-2022-1807
- ALAS2-2022-1811
- ALAS2-2022-1830
- ALAS2-2022-1846
- ALAS2-2022-1847
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALPINE:CVE-2020-28366
- ALPINE:CVE-2020-28367
- ALPINE:CVE-2021-27918
- ALPINE:CVE-2021-27919
- ALPINE:CVE-2021-29923
- ALPINE:CVE-2021-3114
- ALPINE:CVE-2021-3115
- ALPINE:CVE-2021-31525
- ALPINE:CVE-2021-33195
- ALPINE:CVE-2021-33196
- ALPINE:CVE-2021-33197
- ALPINE:CVE-2021-33198
- ALPINE:CVE-2021-34558
- ALPINE:CVE-2021-36221
- ALPINE:CVE-2021-38297
- ALPINE:CVE-2021-41771
- ALPINE:CVE-2021-41772
- ALPINE:CVE-2021-44716
- ALPINE:CVE-2021-44717
- ALPINE:CVE-2022-1705
- ALPINE:CVE-2022-23772
- ALPINE:CVE-2022-23773
- ALPINE:CVE-2022-23806
- ALPINE:CVE-2022-24675
- ALPINE:CVE-2022-24921
- ALPINE:CVE-2022-27536
- ALPINE:CVE-2022-28131
- ALPINE:CVE-2022-28327
- ALPINE:CVE-2022-29526
- ALPINE:CVE-2022-30629
- ALPINE:CVE-2022-30630
- ALPINE:CVE-2022-30631
- ALPINE:CVE-2022-30632
- ALPINE:CVE-2022-30633
- ALPINE:CVE-2022-30635
- ALPINE:CVE-2022-32148
- ALPINE:CVE-2022-32189
- ALSA-2020:5493
- ALSA-2021:1746
- ALSA-2021:3076
- ALSA-2021:3585
- ALSA-2021:4156
- ALSA-2021:4226
- ALSA-2021:5160
- ALSA-2022:0001
- ALSA-2022:1819
- ALSA-2022:5775
- ALSA-2022:5799
- ALSA-2022:7129
- ALSA-2022:7519
- ALSA-2022:7529
- ALSA-2022:7548
- ALSA-2022:7648
- ALSA-2022:7950
- ALSA-2022:7954
- ALSA-2022:7955
- ALSA-2022:8008
- ALSA-2022:8057
- ALSA-2022:8098
- ALSA-2022:8250
- ALSA-2023:2193
- ALSA-2023:2236
- ALSA-2023:2253
- ALSA-2023:2282
- ALSA-2023:2283
- ALSA-2023:2357
- ALSA-2023:2367
- ALSA-2023:2758
- ALSA-2023:2802
- ALSA-2024:2180
- ASA-202011-16
- ASA-202101-27
- ASA-202106-42
- ASA-202107-42
- DSA-4848-1
- ELSA-2020-5493
- ELSA-2021-1746
- ELSA-2021-3076
- ELSA-2021-3585
- ELSA-2021-4226
- ELSA-2021-5160
- ELSA-2021-9267
- ELSA-2021-9268
- ELSA-2022-0001
- ELSA-2022-14844
- ELSA-2022-14857
- ELSA-2022-17956
- ELSA-2022-1819
- ELSA-2022-20693
- ELSA-2022-20694
- ELSA-2022-23681
- ELSA-2022-24267
- ELSA-2022-5337
- ELSA-2022-5775
- ELSA-2022-5799
- ELSA-2022-7129
- ELSA-2022-7457
- ELSA-2022-7519
- ELSA-2022-7529
- ELSA-2022-7548
- ELSA-2022-7648
- ELSA-2022-7950
- ELSA-2022-7954
- ELSA-2022-7955
- ELSA-2022-8008
- ELSA-2022-8057
- ELSA-2022-8250
- ELSA-2022-9362
- ELSA-2022-9363
- ELSA-2023-2253
- ELSA-2023-2282
- ELSA-2023-2283
- ELSA-2023-2357
- ELSA-2023-2367
- ELSA-2023-2758
- ELSA-2023-2802
- ELSA-2024-2180
- ELSA-2024-2988
- FEDORA-2020-864922e78a
- FEDORA-2020-e971480183
- FEDORA-2021-07e4d20196
- FEDORA-2021-1bfb61f77c
- FEDORA-2021-25c0011e78
- FEDORA-2021-29943703de
- FEDORA-2021-2b2dd1b5a7
- FEDORA-2021-2ef35beebf
- FEDORA-2021-38b51d9fd3
- FEDORA-2021-3a55403080
- FEDORA-2021-47d259d3cf
- FEDORA-2021-54f88bebd4
- FEDORA-2021-6a3024b3fd
- FEDORA-2021-6ac9b98f9e
- FEDORA-2021-6fdc5ea304
- FEDORA-2021-a50122f73b
- FEDORA-2021-c35235c250
- FEDORA-2021-e435a8bb88
- FEDORA-2021-e71b05ba7b
- FEDORA-2021-ee3c072cd0
- FEDORA-2021-ffa749f7f7
- FEDORA-2022-13ad572b5a
- FEDORA-2022-17d004ed71
- FEDORA-2022-1f829990f0
- FEDORA-2022-30c5ed5625
- FEDORA-2022-3969b64d4b
- FEDORA-2022-3e1ade35db
- FEDORA-2022-4a48180f3f
- FEDORA-2022-4b5537c44c
- FEDORA-2022-5038c3236c
- FEDORA-2022-53e0f427dd
- FEDORA-2022-53f0c619c5
- FEDORA-2022-5ef0bd9a27
- FEDORA-2022-6716cd0da2
- FEDORA-2022-6e6b59a682
- FEDORA-2022-739c7a0058
- FEDORA-2022-741325e9a0
- FEDORA-2022-8bf5635efc
- FEDORA-2022-9986fbb3d7
- FEDORA-2022-9a9a638d09
- FEDORA-2022-a49babed75
- FEDORA-2022-b0bd0219ff
- FEDORA-2022-ba365d3703
- FEDORA-2022-c0f780ecf1
- FEDORA-2022-c6ae206be7
- FEDORA-2022-e46e6e8317
- FEDORA-2022-e674d52438
- FEDORA-2022-ea8f4e232d
- FEDORA-2022-fae3ecee19
- FEDORA-2022-ffe7dba2cb
- FEDORA-2023-e8c27ba884
- FEDORA-2024-80e062d21a
- FEDORA-2024-9cc0e0c63e
- FEDORA-2024-d652859efb
- FREEBSD:079B3641-C4BD-11EB-A22A-693F0544AE52
- FREEBSD:096AB080-907C-11EC-BB14-002324B2FBA8
- FREEBSD:15888C7E-E659-11EC-B7FE-10C37B4AC2EA
- FREEBSD:4FCE9635-28C0-11EC-9BA8-002324B2FBA8
- FREEBSD:61BCE714-CA0C-11EC-9CFC-10C37B4AC2EA
- FREEBSD:6A4805D5-5AAF-11EB-A21D-79F5BC5EF6A9
- FREEBSD:720505FE-593F-11EC-9BA8-002324B2FBA8
- FREEBSD:72709326-81F7-11EB-950A-00155D646401
- FREEBSD:7F242313-AEA5-11EB-8151-67F74CF7C704
- FREEBSD:7F8D5435-125A-11ED-9A69-10C37B4AC2EA
- FREEBSD:880552C4-F63F-11EB-9D56-7186043316E9
- FREEBSD:930DEF19-3E05-11EC-9BA8-002324B2FBA8
- FREEBSD:A1360138-D446-11EC-8EA1-10C37B4AC2EA
- FREEBSD:A4F2416C-02A0-11ED-B817-10C37B4AC2EA
- FREEBSD:C365536D-E3CF-11EB-9D8D-B37B683944C2
- FREEBSD:DB4B2F27-252A-11EB-865C-00155D646400
- FREEBSD:E2AF876F-A7C8-11EC-9A2A-002324B2FBA8
- GO-2021-0067
- GO-2021-0068
- GO-2021-0234
- GO-2021-0235
- GO-2021-0239
- GO-2021-0240
- GO-2021-0241
- GO-2021-0242
- GO-2021-0243
- GO-2021-0245
- GO-2021-0263
- GO-2021-0264
- GO-2021-0317
- GO-2021-0319
- GO-2021-0347
- GO-2022-0236
- GO-2022-0247
- GO-2022-0288
- GO-2022-0289
- GO-2022-0318
- GO-2022-0433
- GO-2022-0434
- GO-2022-0435
- GO-2022-0475
- GO-2022-0476
- GO-2022-0493
- GO-2022-0520
- GO-2022-0521
- GO-2022-0522
- GO-2022-0523
- GO-2022-0524
- GO-2022-0525
- GO-2022-0526
- GO-2022-0527
- GO-2022-0531
- GO-2022-0537
- MS:CVE-2020-28366
- MS:CVE-2020-28367
- MS:CVE-2021-27918
- MS:CVE-2021-29923
- MS:CVE-2021-3114
- MS:CVE-2021-31525
- MS:CVE-2021-34558
- MS:CVE-2021-36221
- MS:CVE-2021-38297
- MS:CVE-2021-41771
- MS:CVE-2021-41772
- MS:CVE-2021-44716
- MS:CVE-2022-1705
- MS:CVE-2022-23772
- MS:CVE-2022-23773
- MS:CVE-2022-24675
- MS:CVE-2022-24921
- MS:CVE-2022-28131
- MS:CVE-2022-28327
- MS:CVE-2022-29526
- MS:CVE-2022-30629
- MS:CVE-2022-30630
- MS:CVE-2022-30631
- MS:CVE-2022-30632
- MS:CVE-2022-30633
- MS:CVE-2022-30635
- MS:CVE-2022-32148
- MS:CVE-2022-32189
- openSUSE-SU-2020:2047-1
- openSUSE-SU-2020:2067-1
- openSUSE-SU-2020:2139-1
- openSUSE-SU-2021:0190-1
- openSUSE-SU-2021:0192-1
- openSUSE-SU-2021:0194-1
- openSUSE-SU-2021:0480-1
- openSUSE-SU-2021:0904-1
- openSUSE-SU-2021:0950-1
- openSUSE-SU-2021:1078-1
- openSUSE-SU-2021:1079-1
- openSUSE-SU-2021:1199-1
- openSUSE-SU-2021:1207-1
- openSUSE-SU-2021:1420-1
- openSUSE-SU-2021:1539-1
- openSUSE-SU-2021:1626-1
- openSUSE-SU-2021:2186-1
- openSUSE-SU-2021:2214-1
- openSUSE-SU-2021:2392-1
- openSUSE-SU-2021:2398-1
- openSUSE-SU-2021:2787-1
- openSUSE-SU-2021:2788-1
- openSUSE-SU-2021:3487-1
- openSUSE-SU-2021:3488-1
- openSUSE-SU-2021:3833-1
- openSUSE-SU-2021:3834-1
- openSUSE-SU-2021:4169-1
- openSUSE-SU-2021:4186-1
- openSUSE-SU-2022:0723-1
- openSUSE-SU-2022:0724-1
- openSUSE-SU-2023:0018-1
- RHSA-2020:5493
- RHSA-2021:1746
- RHSA-2021:3076
- RHSA-2021:3585
- RHSA-2021:4156
- RHSA-2021:4226
- RHSA-2021:5160
- RHSA-2022:0001
- RHSA-2022:1819
- RHSA-2022:5337
- RHSA-2022:5775
- RHSA-2022:5799
- RHSA-2022:7129
- RHSA-2022:7457
- RHSA-2022:7519
- RHSA-2022:7529
- RHSA-2022:7548
- RHSA-2022:7648
- RHSA-2022:7950
- RHSA-2022:7954
- RHSA-2022:7955
- RHSA-2022:8008
- RHSA-2022:8057
- RHSA-2022:8098
- RHSA-2022:8250
- RHSA-2023:0328
- RHSA-2023:0446
- RHSA-2023:2193
- RHSA-2023:2236
- RHSA-2023:2253
- RHSA-2023:2282
- RHSA-2023:2283
- RHSA-2023:2357
- RHSA-2023:2367
- RHSA-2023:2758
- RHSA-2023:2802
- RHSA-2024:2180
- RHSA-2024:2988
- RLSA-2022:1819
- RLSA-2022:5337
- RLSA-2022:5775
- RLSA-2022:7129
- RLSA-2022:7457
- RLSA-2022:7519
- RLSA-2022:7529
- RLSA-2022:7548
- RLSA-2022:7648
- RLSA-2022:7950
- RLSA-2022:8057
- RLSA-2022:8098
- RLSA-2022:8250
- SUSE-SU-2020:3368-1
- SUSE-SU-2020:3369-1
- SUSE-SU-2021:0222-1
- SUSE-SU-2021:0223-1
- SUSE-SU-2021:0937-1
- SUSE-SU-2021:0938-1
- SUSE-SU-2021:2082-1
- SUSE-SU-2021:2085-1
- SUSE-SU-2021:2186-1
- SUSE-SU-2021:2214-1
- SUSE-SU-2021:2392-1
- SUSE-SU-2021:2398-1
- SUSE-SU-2021:2787-1
- SUSE-SU-2021:2788-1
- SUSE-SU-2021:3487-1
- SUSE-SU-2021:3488-1
- SUSE-SU-2021:3833-1
- SUSE-SU-2021:3834-1
- SUSE-SU-2021:4169-1
- SUSE-SU-2021:4186-1
- SUSE-SU-2022:0723-1
- SUSE-SU-2022:0724-1
- SUSE-SU-2022:1164-1
- SUSE-SU-2022:1167-1
- SUSE-SU-2022:1410-1
- SUSE-SU-2022:1411-1
- SUSE-SU-2022:1729-1
- SUSE-SU-2022:1829-1
- SUSE-SU-2022:1862-1
- SUSE-SU-2022:2004-1
- SUSE-SU-2022:2005-1
- SUSE-SU-2022:2671-1
- SUSE-SU-2022:2672-1
- SUSE-SU-2022:3338-1
- SUSE-SU-2023:0600-1
- SUSE-SU-2023:0601-1
- SUSE-SU-2023:0602-1
- SUSE-SU-2023:0603-1
- SUSE-SU-2023:2312-1
- USN-6038-1
- USN-6038-2
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |