MGASA-2022-0171

Source
https://advisories.mageia.org/MGASA-2022-0171.html
Import Source
https://advisories.mageia.org/MGASA-2022-0171.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0171
Related
Published
2022-05-12T10:24:45Z
Modified
2022-05-12T09:36:41Z
Summary
Updated golang packages fix security vulnerability
Details

encoding/pem: fix stack overflow in Decode. A large (more than 5 MB) PEM input can cause a stack overflow in Decode, leading the program to crash (CVE-2022-24675)

crypto/elliptic: tolerate all oversized scalars in generic P-256. A crafted scalar input longer than 32 bytes can cause P256().ScalarMult or P256().ScalarBaseMult to panic. Indirect uses through crypto/ecdsa and crypto/tls are unaffected. amd64, arm64, ppc64le, and s390x are unaffected. (CVE-2022-28327)

References
Credits

Affected packages

Mageia:8 / golang

Package

Name
golang
Purl
pkg:rpm/mageia/golang?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.17.9-1.mga8

Ecosystem specific

{
    "section": "core"
}