Incorrect Authorization Affecting golang-src package, versions <0:1.17.7-1.module+el8.6.0+14297+32a15e19
Threat Intelligence
EPSS
0.1% (42nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-GOLANGSRC-2400163
- published 12 Feb 2022
- disclosed 11 Feb 2022
How to fix?
Upgrade Centos:8
golang-src
to version 0:1.17.7-1.module+el8.6.0+14297+32a15e19 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream golang-src
package and not the golang-src
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
cmd/go in Go before 1.16.14 and 1.17.x before 1.17.7 can misinterpret branch names that falsely appear to be version tags. This can lead to incorrect access control if an actor is supposed to be able to create branches but not tags.
References
- https://access.redhat.com/security/cve/CVE-2022-23773
- https://access.redhat.com/errata/RHSA-2022:1819
- https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ
- https://security.gentoo.org/glsa/202208-02
- https://security.netapp.com/advisory/ntap-20220225-0006/
- https://www.oracle.com/security-alerts/cpujul2022.html
CVSS Scores
version 3.1