We have (server environment) go vulnerability on some instances. And source for this vulnerability look like snapd . Do you have any solution for it ?
/snap/snapd/16292/usr/lib/snapd/snapd
go1.13.8 current version / should be 1.17.2 or 1.16.9
Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.
Thank you.Regards
snap refresh All snaps up to date. – Zek Aug 18 '22 at 08:03