CVE-2022-29526: golang.org/x/sys/unix has Incorrect privilege reporting in syscall
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.36309%
CWE
Published
6/24/2022
Updated
5/20/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| golang.org/x/sys | go | < 0.0.0-20220412211240-33da011f77ad | 0.0.0-20220412211240-33da011f77ad |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The GitHub issue #52313 explicitly identifies a logic error in syscall.Faccessat's group membership check where it uses the process's gid instead of the file's st.Gid. This matches CVE-2022-29526's description of incorrect privilege reporting when flags parameter is non-zero. Both the standard library syscall and golang.org/x/sys/unix implementations are affected as they share the vulnerable code path.