Bug 2399429
| Summary: | CVE-2025-47906 golang-github-katalix-l2tp: Unexpected paths returned from LookPath in os/exec [fedora-42] | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Jon Moroney <jmoroney> |
| Component: | golang-github-katalix-l2tp | Assignee: | Tom Parkin <tparkin> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 42 | CC: | go-sig, tparkin |
| Target Milestone: | --- | Keywords: | Security, SecurityTracking |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | {"flaws": ["82b592f6-3fef-4109-80a1-8023edc09049"]} | ||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2396546 | ||
|
Description
Jon Moroney
2025-09-26 00:27:12 UTC
It's not clear to me whether this CVE is due to golang-github-katalix-l2tp's use of an older Go which is subject to the upstream Golang vulnerability? In that case would updating the package to use Go 1.25.0 or 1.24.6 be sufficient to address this issue? |