{"id":"MGASA-2023-0227","summary":"Updated golang packages fix security vulnerability","details":"Code injection via go command with cgo in cmd/go (CVE-2023-29402)\nIgnoring setuid/setgid bits. (CVE-2023-29403)\nArbitrary code execution (CVE-2023-29404)\nArbitrary code execution (CVE-2023-29405)\n","modified":"2026-04-16T00:09:21.152847732Z","published":"2023-07-07T05:54:45Z","upstream":["CVE-2023-29402","CVE-2023-29403","CVE-2023-29404","CVE-2023-29405"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2023-0227.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=32052"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/q5135a9d924"}],"affected":[{"package":{"name":"golang","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/golang?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.19.10-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0227.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}