Denial of Service in go1.10
ID: | SUSE-SU-2019:1149-1 |
Distribution: | SUSE |
Plattformen: | SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 |
Datum: | Fr, 3. Mai 2019, 23:49 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6486 |
Applikationen: | Go |
Originalnachricht |
|
SUSE Security Update: Security update for go1.10 ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:1149-1 Rating: moderate References: #1121397 #1125768 #974800 Cross-References: CVE-2019-6486 Affected Products: SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 ______________________________________________________________________________ An update that solves one vulnerability and has two fixes is now available. Description: This update for go1.10 fixes the following issues: Security issues fixed: - CVE-2019-6486: A CPU denial of service vulnerability affecting P-521 and P-384 elliptic curves was fixed. Other fixes: - go1.10.8 (released 2019/01/23) security release fixes CVE-2019-6486. - Enable build for %arm (bsc#1125768), with go1.4 as building with gccgo hangs (bsc#974800) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15: zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-1149=1 Package List: - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64): go1.10-1.10.8-1.8.1 go1.10-doc-1.10.8-1.8.1 References: https://www.suse.com/security/cve/CVE-2019-6486.html https://bugzilla.suse.com/1121397 https://bugzilla.suse.com/1125768 https://bugzilla.suse.com/974800 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates |