MGASA-2024-0217

Source
https://advisories.mageia.org/MGASA-2024-0217.html
Import Source
https://advisories.mageia.org/MGASA-2024-0217.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0217
Related
Published
2024-06-14T01:31:37Z
Modified
2024-06-14T01:06:30Z
Summary
Updated golang packages fix security vulnerabilities
Details

The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors. (CVE-2024-24789) The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms. (CVE-2024-24790)

References
Credits

Affected packages

Mageia:9 / golang

Package

Name
golang
Purl
pkg:rpm/mageia/golang?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.21.11-1.mga9

Ecosystem specific

{
    "section": "core"
}