[GLSA-202209-26] Go: Multiple Vulnerabilities
Multiple vulnerabilities have been discovered in Go, the worst of which could result in denial of service.
Background
Go is an open source programming language that makes it easy to build simple, reliable, and efficient software.
Description
Multiple vulnerabilities have been discovered in Go. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Go users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/go-1.18.6"
In addition, users using Portage 3.0.9 or later should ensure that packages with Go binaries have no vulnerable code statically linked into their binaries by rebuilding the @golang-rebuild set:
# emerge --ask --oneshot --verbose @golang-rebuild
Package | Affected Version |
---|---|
pkg:ebuild/dev-lang/go?distro=gentoo | < 1.18.6 |
Package | Unaffected Version |
---|---|
pkg:ebuild/dev-lang/go?distro=gentoo | >= 1.18.6 |
- ID
- GLSA-202209-26
- Severity
- low
- URL
- https://security.gentoo.org/glsa/202209-26
- Published
-
2022-09-29T00:00:00
(2 years ago) - Modified
-
2022-09-29T00:00:00
(2 years ago) - Rights
- Gentoo Foundation, Inc.
- Other Advisories
-
- ALAS-2022-1635
- ALAS-2023-1825
- ALAS2-2022-1851
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALAS2-2023-2238
- ALPINE:CVE-2022-27664
- ALPINE:CVE-2022-32190
- ALSA-2022:7129
- ALSA-2023:2167
- ALSA-2023:2177
- ALSA-2023:2193
- ALSA-2023:2204
- ALSA-2023:2236
- ALSA-2023:2357
- ALSA-2023:2758
- ALSA-2023:2780
- ALSA-2023:2784
- ALSA-2023:2785
- ALSA-2023:2802
- ALSA-2024:0121
- ELSA-2022-24267
- ELSA-2022-7129
- ELSA-2023-18908
- ELSA-2023-2167
- ELSA-2023-2177
- ELSA-2023-2204
- ELSA-2023-2357
- ELSA-2023-2758
- ELSA-2023-2780
- ELSA-2023-2784
- ELSA-2023-2785
- ELSA-2023-2802
- ELSA-2024-0121
- FEDORA-2022-45097317b4
- FEDORA-2022-67ec8c61d0
- FREEBSD:6FEA7103-2EA4-11ED-B403-3DAE8AC60D3E
- GO-2022-0969
- GO-2022-0988
- MS:CVE-2022-27664
- RHSA-2022:7129
- RHSA-2023:0328
- RHSA-2023:0446
- RHSA-2023:2167
- RHSA-2023:2177
- RHSA-2023:2193
- RHSA-2023:2204
- RHSA-2023:2236
- RHSA-2023:2357
- RHSA-2023:2758
- RHSA-2023:2780
- RHSA-2023:2784
- RHSA-2023:2785
- RHSA-2023:2802
- RHSA-2024:0121
- RLSA-2022:7129
- SUSE-SU-2022:3325-1
- SUSE-SU-2022:3326-1
- SUSE-SU-2023:2183-1
- SUSE-SU-2023:2185-1
- SUSE-SU-2023:2187-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2575-1
- SUSE-SU-2023:2578-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- USN-6038-1
- USN-6038-2
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2022-27664 | CVE-2022-27664 | https://nvd.nist.gov/vuln/detail/CVE-2022-27664 |
CVE | CVE-2022-32190 | CVE-2022-32190 | https://nvd.nist.gov/vuln/detail/CVE-2022-32190 |
Bugzilla | 869002 | Bugzilla #869002 | https://bugs.gentoo.org/show_bug.cgi?id=869002 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |