Описание
Security update for go
This go update to version 1.6 fixes the following issues:
Security issues fixed:
- CVE-2016-3959: Infinite loop in several big integer routines (boo#974232)
- CVE-2015-8618: Carry propagation in Int.Exp Montgomery code in math/big library (boo#960151)
Bugs fixed:
- Update to version 1.6:
- On Linux on little-endian 64-bit PowerPC (linux/ppc64le), Go 1.6 now supports cgo with external linking and is roughly feature complete.
- Vendoring support
- HTTP2 transparent support
- fix gc and gccgo incompatibility regarding embedded unexported struct types containing exported fields
- Linux on 64-bit MIPS and Android on 32-bit x86
- enforced rules for sharing Go pointers with C
- new mechanism for template reuse
- performance improvements ... and more! see more in https://tip.golang.org/doc/go1.6
- Updated to version 1.5.2: This release includes bug fixes to the compiler, linker, and the mime/multipart, net, and runtime packages. https://golang.org/doc/devel/release.html#go1.5.minor
- Updated to version 1.5.1: This release includes bug fixes to the go command, the compiler, assembler, and the fmt, net/textproto, net/http, and runtime packages. https://golang.org/doc/devel/release.html#go1.5.minor
- Update to version 1.5:
- install shared stdlib on x86_64
- add go.gdbinit for debug friendly
- Adapt to Leap
- use gcc5-go than go1.4 is the proper requirement for Leap
Список пакетов
openSUSE Leap 42.1
go-1.6.1-14.1
go-doc-1.6.1-14.1
Ссылки
- E-Mail link for openSUSE-SU-2016:1331-1
- SUSE Security Ratings
Описание
The Int.Exp Montgomery code in the math/big library in Go 1.5.x before 1.5.3 mishandles carry propagation and produces incorrect output, which makes it easier for attackers to obtain private RSA keys via unspecified vectors.
Затронутые продукты
openSUSE Leap 42.1:go-1.6.1-14.1
openSUSE Leap 42.1:go-doc-1.6.1-14.1
Ссылки
- CVE-2015-8618
- SUSE Bug 957814
- SUSE Bug 960151
Описание
The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.
Затронутые продукты
openSUSE Leap 42.1:go-1.6.1-14.1
openSUSE Leap 42.1:go-doc-1.6.1-14.1
Ссылки
- CVE-2016-3959
- SUSE Bug 974232