First published: Wed May 11 2022(Updated: )
A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file's group, affecting system availability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/servicemesh-operator | <0:2.1.5-1.el8 | 0:2.1.5-1.el8 |
redhat/servicemesh-prometheus | <0:2.23.0-9.el8 | 0:2.23.0-9.el8 |
redhat/golang | <0:1.17.12-1.el9_0 | 0:1.17.12-1.el9_0 |
redhat/go-toolset | <0:1.17.12-1.el9_0 | 0:1.17.12-1.el9_0 |
redhat/atomic-openshift-service-idler | <0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8 | 0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8 |
redhat/cri-o | <0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8 | 0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8 |
redhat/openshift | <0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8 | 0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8 |
redhat/openshift-clients | <0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8 | 0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8 |
Golang Go | <1.17.10 | |
Golang Go | >=1.18.0<1.18.2 | |
Linux Linux kernel | ||
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Netapp Beegfs Csi Driver | ||
redhat/go | <1.17.10 | 1.17.10 |
redhat/go | <1.18.2 | 1.18.2 |
go/golang.org/x/sys | <0.0.0-20220412211240-33da011f77ad | 0.0.0-20220412211240-33da011f77ad |
All of | ||
Any of | ||
Golang Go | <1.17.10 | |
Golang Go | >=1.18.0<1.18.2 | |
Linux Linux kernel | ||
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2022-29526 is medium with a CVSS score of 6.2.
CVE-2022-29526 allows a remote attacker to obtain sensitive information in Golang Go.
The affected software for CVE-2022-29526 includes Golang Go versions before 1.17.10 and 1.18.x before 1.18.2, as well as specific Red Hat packages and other related software.
To fix CVE-2022-29526, update Golang Go to version 1.17.10 or 1.18.2 and apply the necessary patches from the vendor for other affected software.
More information about CVE-2022-29526 can be found on the NIST NVD website, the Golang Go GitHub repository, and the Golang-announce Google group.