Описание
ELSA-2020-0329: go-toolset:ol8 security update (MODERATE)
go-toolset [1.12.12-1]
- Update for golang package fixes
[1.12.12-1]
- Bump version to 1.12.12
golang [1.12.12-4.0.1]
- from upstream https://github.com/golang/go/issues/2775
- move arbitrary value 10% to 15% for GC tests, hits 10.48% on our
- infrastructure
- Resolves failing post build tests [Orabug: 30241946]
[1.12.12-4]
- Fix boring/aes_test.go tags
[1.12.12-3]
- Fix tarball
[1.12.12-2]
- Fix stub boring.(Sign/Verify)RSAPKCS1v15 functions
[1.12.12-1]
- Rebase to 1.12.12
- Revert to Sign/Verify operations not expected unhashed inputs
- Remove previously added verbose output
- Better expose openssl errors
[1.12.8-4]
- Reduce number of threads when testing on i686
[1.12.8-3]
- Relax FIPS requirements to unblock OpenShift testing
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
Module go-toolset:ol8 is enabled
go-toolset
1.12.12-2.module+el8.1.0+5478+8384556e
golang
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
golang-bin
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
golang-docs
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
golang-misc
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
golang-src
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
golang-tests
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
Oracle Linux x86_64
Module go-toolset:ol8 is enabled
go-toolset
1.12.12-2.module+el8.1.0+5478+8384556e
golang
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
golang-bin
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
golang-docs
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
golang-misc
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
golang-race
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
golang-src
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
golang-tests
1.12.12-4.0.1.module+el8.1.0+5478+8384556e
Связанные CVE
Связанные уязвимости
Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.