Search for packages
| purl | pkg:alpm/archlinux/go@2:1.16.7-1 |
| Next non-vulnerable version | 2:1.17-1 |
| Latest non-vulnerable version | 2:1.24.3-1 |
| Risk | 4.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4ndn-vpw4-17gz
Aliases: CVE-2020-29510 |
go: encoding/xml: XML directives instability |
Affected by 0 other vulnerabilities. |
|
VCID-63v8-dt23-9ue7
Aliases: CVE-2021-29923 |
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-qway-uy4e-vucf
Aliases: CVE-2020-29511 |
go: encoding/xml: XML element instability |
Affected by 0 other vulnerabilities. |
|
VCID-w8xe-6aaj-aycr
Aliases: CVE-2020-29509 GHSA-xhqq-x44f-9fgg |
Authentication Bypass in github.com/russellhaering/gosaml2 ### Impact Given a valid SAML Response, it may be possible for an attacker to mutate the XML document in such a way that gosaml2 will trust a different portion of the document than was signed. Depending on the implementation of the Service Provider this enables a variety of attacks, including users accessing accounts other than the one to which they authenticated in the Identity Provider, or full authentication bypass. ### Patches Service Providers utilizing gosaml2 should upgrade to v0.6.0 or greater. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-qn4v-xah4-fya7 | Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. |
CVE-2021-36221
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:27:17.356794+00:00 | Arch Linux Importer | Fixing | VCID-qn4v-xah4-fya7 | https://security.archlinux.org/AVG-2259 | 38.0.0 |
| 2026-04-01T18:26:37.120175+00:00 | Arch Linux Importer | Affected by | VCID-w8xe-6aaj-aycr | https://security.archlinux.org/AVG-1357 | 38.0.0 |
| 2026-04-01T18:26:37.094109+00:00 | Arch Linux Importer | Affected by | VCID-4ndn-vpw4-17gz | https://security.archlinux.org/AVG-1357 | 38.0.0 |
| 2026-04-01T18:26:37.034360+00:00 | Arch Linux Importer | Affected by | VCID-qway-uy4e-vucf | https://security.archlinux.org/AVG-1357 | 38.0.0 |
| 2026-04-01T18:26:37.003611+00:00 | Arch Linux Importer | Affected by | VCID-63v8-dt23-9ue7 | https://security.archlinux.org/AVG-1357 | 38.0.0 |