drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in go1.15
Name: |
Denial of Service in go1.15 |
|
ID: |
SUSE-SU-2021:2398-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Module for Development Tools 15-SP2, SUSE Linux Enterprise Module for Development Tools 15-SP3 |
|
Datum: |
Mo, 19. Juli 2021, 21:43 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558 |
|
Applikationen: |
Go |
|
Originalnachricht |
SUSE Security Update: Security update for go1.15 ______________________________________________________________________________
Announcement ID: SUSE-SU-2021:2398-1 Rating: moderate References: #1175132 #1188229 Cross-References: CVE-2021-34558 CVSS scores: CVE-2021-34558 (SUSE): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products: SUSE Linux Enterprise Module for Development Tools 15-SP3 SUSE Linux Enterprise Module for Development Tools 15-SP2 ______________________________________________________________________________
An update that solves one vulnerability and has one errata is now available.
Description:
This update for go1.15 fixes the following issues:
- go1.15.14 (released 2021-07-12) includes a security fix to the crypto/tls package, as well as bug fixes to the linker, and the net package. CVE-2021-34558 Refs bsc#1175132 go1.15 release tracking * bsc#1188229 go#47143 CVE-2021-34558 * go#47144 security: fix CVE-2021-34558 * go#47012 net: LookupMX behaviour broken * go#46994 net: TestCVE202133195 fails if /etc/resolv.conf specifies ndots larger than 3 * go#46768 syscall: TestGroupCleanupUserNamespace test failure on Fedora * go#46684 x/build/cmd/release: linux-armv6l release tests aren't passing * go#46656 runtime: deeply nested struct initialized with non-zero values
- Fix extraneous trailing percent character %endif% in spec file.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2021-2398=1
- SUSE Linux Enterprise Module for Development Tools 15-SP2:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-2398=1
Package List:
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
go1.15-1.15.14-1.36.1 go1.15-doc-1.15.14-1.36.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 x86_64):
go1.15-race-1.15.14-1.36.1
- SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 ppc64le s390x x86_64):
go1.15-1.15.14-1.36.1 go1.15-doc-1.15.14-1.36.1
- SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 x86_64):
go1.15-race-1.15.14-1.36.1
References:
https://www.suse.com/security/cve/CVE-2021-34558.html https://bugzilla.suse.com/1175132 https://bugzilla.suse.com/1188229
|
|
|
|