An update is available for delve, golang, go-toolset. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. Security Fix(es): * golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879) * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Internal linking fails on ppc64le (BZ#2144545) * crypto testcases fail on golang on s390x [Rocky Linux-8] (BZ#2149313)
delve-0:1.8.3-1.module+el8.7.0+1073+99e3b3cd.src.rpm
delve-0:1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
delve-debuginfo-0:1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
delve-debugsource-0:1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm
golang-0:1.18.9-1.module+el8.7.0+1133+56289a01.aarch64.rpm
golang-0:1.18.9-1.module+el8.7.0+1133+56289a01.src.rpm
golang-0:1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
golang-bin-0:1.18.9-1.module+el8.7.0+1133+56289a01.aarch64.rpm
golang-bin-0:1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
golang-docs-0:1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm
golang-misc-0:1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm
golang-race-0:1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
golang-src-0:1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm
golang-tests-0:1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm
go-toolset-0:1.18.9-1.module+el8.7.0+1133+56289a01.aarch64.rpm
go-toolset-0:1.18.9-1.module+el8.7.0+1133+56289a01.src.rpm
go-toolset-0:1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm
No References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715
https://bugzilla.redhat.com/show_bug.cgi?id=2132867
https://bugzilla.redhat.com/show_bug.cgi?id=2132868
https://bugzilla.redhat.com/show_bug.cgi?id=2132872
https://bugzilla.redhat.com/show_bug.cgi?id=2139718
https://bugzilla.redhat.com/show_bug.cgi?id=2149313