Описание
Security update for go1.15
This update for go1.15 fixes the following issues:
- go1.15.5 (released 2020-11-12) includes security fixes to the cmd/go and math/big packages.
- go#42553 math/big: panic during recursive division of very large numbers (bsc#1178750 CVE-2020-28362)
- go#42560 cmd/go: arbitrary code can be injected into cgo generated files (bsc#1178752 CVE-2020-28367)
- go#42557 cmd/go: improper validation of cgo flags can lead to remote code execution at build time (bsc#1178753 CVE-2020-28366)
- go#42169 cmd/compile, runtime, reflect: pointers to go:notinheap types must be stored indirectly in interfaces
- go#42151 cmd/cgo: opaque struct pointers are broken since Go 1.15.3
- go#42138 time: Location interprets wrong timezone (DST) with slim zoneinfo
- go#42113 x/net/http2: the first write error on a connection will cause all subsequent write requests to fail blindly
- go#41914 net/http: request.Clone doesn't deep copy TransferEncoding
- go#41704 runtime: macOS syscall.Exec can get SIGILL due to preemption signal
- go#41463 compress/flate: deflatefast produces corrupted output
- go#41387 x/net/http2: connection-level flow control not returned if stream errors, causes server hang
- go#40974 cmd/link: sectionForAddress(0xA9D67F) address not in any section file
Список пакетов
openSUSE Leap 15.2
go1.15-1.15.5-lp152.2.1
go1.15-doc-1.15.5-lp152.2.1
go1.15-race-1.15.5-lp152.2.1
Ссылки
- E-Mail link for openSUSE-SU-2020:2139-1
- SUSE Security Ratings
- SUSE Bug 1175132
- SUSE Bug 1178750
- SUSE Bug 1178752
- SUSE Bug 1178753
- SUSE CVE CVE-2020-28362 page
- SUSE CVE CVE-2020-28366 page
- SUSE CVE CVE-2020-28367 page
Описание
Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.
Затронутые продукты
openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1
openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1
openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1
Ссылки
- CVE-2020-28362
- SUSE Bug 1178750
Описание
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.
Затронутые продукты
openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1
openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1
openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1
Ссылки
- CVE-2020-28366
- SUSE Bug 1178753
Описание
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.
Затронутые продукты
openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1
openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1
openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1
Ссылки
- CVE-2020-28367
- SUSE Bug 1178752