Login
Newsletter
Werbung

Sicherheit: Denial of Service in go1.15
Aktuelle Meldungen Distributionen
Name: Denial of Service in go1.15
ID: SUSE-SU-2021:2398-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Module for Development Tools 15-SP2, SUSE Linux Enterprise Module for Development Tools 15-SP3
Datum: Mo, 19. Juli 2021, 21:43
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558
Applikationen: Go

Originalnachricht


SUSE Security Update: Security update for go1.15
______________________________________________________________________________

Announcement ID: SUSE-SU-2021:2398-1
Rating: moderate
References: #1175132 #1188229
Cross-References: CVE-2021-34558
CVSS scores:
CVE-2021-34558 (SUSE): 5.3
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP2
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for go1.15 fixes the following issues:

- go1.15.14 (released 2021-07-12) includes a security fix to the
crypto/tls package, as well as bug fixes to the linker, and the net
package. CVE-2021-34558 Refs bsc#1175132 go1.15 release tracking
* bsc#1188229 go#47143 CVE-2021-34558
* go#47144 security: fix CVE-2021-34558
* go#47012 net: LookupMX behaviour broken
* go#46994 net: TestCVE202133195 fails if /etc/resolv.conf specifies
ndots larger than 3
* go#46768 syscall: TestGroupCleanupUserNamespace test failure on Fedora
* go#46684 x/build/cmd/release: linux-armv6l release tests aren't
passing
* go#46656 runtime: deeply nested struct initialized with non-zero values

- Fix extraneous trailing percent character %endif% in spec file.


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Module for Development Tools 15-SP3:

zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2021-2398=1

- SUSE Linux Enterprise Module for Development Tools 15-SP2:

zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-2398=1



Package List:

- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le
s390x x86_64):

go1.15-1.15.14-1.36.1
go1.15-doc-1.15.14-1.36.1

- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64
x86_64):

go1.15-race-1.15.14-1.36.1

- SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 ppc64le
s390x x86_64):

go1.15-1.15.14-1.36.1
go1.15-doc-1.15.14-1.36.1

- SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64
x86_64):

go1.15-race-1.15.14-1.36.1


References:

https://www.suse.com/security/cve/CVE-2021-34558.html
https://bugzilla.suse.com/1175132
https://bugzilla.suse.com/1188229
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung