MGASA-2021-0537

Source
https://advisories.mageia.org/MGASA-2021-0537.html
Import Source
https://advisories.mageia.org/MGASA-2021-0537.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0537
Related
Published
2021-12-03T18:45:31Z
Modified
2021-12-03T18:15:18Z
Summary
Updated golang packages fix security vulnerability
Details

ImportedSymbols in debug/macho (for Open or OpenFat) in Go before 1.16.10 and 1.17.x before 1.17.3 Accesses a Memory Location After the End of a Buffer, aka an out-of-bounds slice situation. (CVE-2021-41771)

Go before 1.16.10 and 1.17.x before 1.17.3 allows an archive/zip Reader.Open panic via a crafted ZIP archive containing an invalid name or an empty filename field. (CVE-2021-41772)

References
Credits

Affected packages

Mageia:8 / golang

Package

Name
golang
Purl
pkg:rpm/mageia/golang?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.17.3-1.mga8

Ecosystem specific

{
    "section": "core"
}