Login
Newsletter
Werbung

Sicherheit: Denial of Service in go1.16
Aktuelle Meldungen Distributionen
Name: Denial of Service in go1.16
ID: SUSE-SU-2021:2392-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Module for Development Tools 15-SP2, SUSE Linux Enterprise Module for Development Tools 15-SP3
Datum: Mo, 19. Juli 2021, 21:42
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558
Applikationen: Go

Originalnachricht


SUSE Security Update: Security update for go1.16
______________________________________________________________________________

Announcement ID: SUSE-SU-2021:2392-1
Rating: important
References: #1182345 #1188229
Cross-References: CVE-2021-34558
CVSS scores:
CVE-2021-34558 (SUSE): 5.3
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP2
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for go1.16 fixes the following issues:

go1.16.6 (released 2021-07-12, bsc#1182345) includes a security fix to the
crypto/tls package, as well as bug fixes to the compiler, and the net and
net/http packages.

Security issue fixed:

CVE-2021-34558: Fixed crypto/tls: clients can panic when provided a
certificate of the wrong type for the negotiated parameters (bsc#1188229)

go1.16 release:

* bsc#1188229 go#47143 CVE-2021-34558
* go#47145 security: fix CVE-2021-34558
* go#46999 net: LookupMX behaviour broken
* go#46981 net: TestCVE202133195 fails if /etc/resolv.conf specifies ndots
larger than 3
* go#46769 syscall: TestGroupCleanupUserNamespace test failure on Fedora
* go#46657 runtime: deeply nested struct initialized with non-zero values
* go#44984 net/http: server not setting Content-Length in certain cases


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Module for Development Tools 15-SP3:

zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2021-2392=1

- SUSE Linux Enterprise Module for Development Tools 15-SP2:

zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-2392=1



Package List:

- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le
s390x x86_64):

go1.16-1.16.6-1.20.1
go1.16-doc-1.16.6-1.20.1

- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64
x86_64):

go1.16-race-1.16.6-1.20.1

- SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 ppc64le
s390x x86_64):

go1.16-1.16.6-1.20.1
go1.16-doc-1.16.6-1.20.1

- SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64
x86_64):

go1.16-race-1.16.6-1.20.1


References:

https://www.suse.com/security/cve/CVE-2021-34558.html
https://bugzilla.suse.com/1182345
https://bugzilla.suse.com/1188229
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung