First published: Tue Jun 28 2022(Updated: )
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. <br>Security Fix(es):<br><li> golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)</li> <li> golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)</li> <li> golang: syscall: faccessat checks wrong group (CVE-2022-29526)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> Update to Go 1.17.10 (BZ#2091077)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/delve | <1.7.2-1.module+el8.6.0+12972+ebab5911 | 1.7.2-1.module+el8.6.0+12972+ebab5911 |
redhat/go-toolset | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/golang | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/delve | <1.7.2-1.module+el8.6.0+12972+ebab5911 | 1.7.2-1.module+el8.6.0+12972+ebab5911 |
redhat/delve-debuginfo | <1.7.2-1.module+el8.6.0+12972+ebab5911 | 1.7.2-1.module+el8.6.0+12972+ebab5911 |
redhat/delve-debugsource | <1.7.2-1.module+el8.6.0+12972+ebab5911 | 1.7.2-1.module+el8.6.0+12972+ebab5911 |
redhat/go-toolset | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/golang | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/golang-bin | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/golang-docs | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/golang-misc | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/golang-race | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/golang-src | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/golang-tests | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/golang-bin | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/go-toolset | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/golang | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/golang-bin | <1.17.10-1.module+el8.6.0+15486+6d4da7db | 1.17.10-1.module+el8.6.0+15486+6d4da7db |
redhat/go-toolset | <1.17.10-1.module+el8.6.0+15486+6d4da7db.aa | 1.17.10-1.module+el8.6.0+15486+6d4da7db.aa |
redhat/golang | <1.17.10-1.module+el8.6.0+15486+6d4da7db.aa | 1.17.10-1.module+el8.6.0+15486+6d4da7db.aa |
redhat/golang-bin | <1.17.10-1.module+el8.6.0+15486+6d4da7db.aa | 1.17.10-1.module+el8.6.0+15486+6d4da7db.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:5337 is classified as critical due to the potential for remote code execution and denial of service.
To fix RHSA-2022:5337, you should update to the patched versions of the affected packages, specifically go-toolset to 1.17.10-1.module+el8.6.0+15486+6d4da7db and delve to 1.7.2-1.module+el8.6.0+12972+ebab5911.
RHSA-2022:5337 addresses CVE-2022-24675, a stack overflow in encoding/pem, and CVE-2022-xxxx, which causes panic due to oversized scalar in crypto/elliptic.
The affected software versions include golang versions prior to 1.17.10 and delve versions prior to 1.7.2.
A system reboot is not typically required after applying the fixes for RHSA-2022:5337, but some services may need to be restarted.