Mageia 2019-0066: golang security update
Summary
Remote code execution in go get, when executed with the -u flag
(CVE-2018-16873).
An arbitrary filesystem write in go get, which could lead to code execution
(CVE-2018-16874).
Denial of Service in the crypto/x509 package during certificate chain
validation (CVE-2018-16875).
Go before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows
attackers to cause a denial of service (CPU consumption) or possibly conduct
ECDH private key recovery attacks (CVE-2019-6486).
References
- https://bugs.mageia.org/show_bug.cgi?id=24014
- - https://www.debian.org/security/2019/dsa-4380
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16873
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16874
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16875
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6486
Resolution
MGASA-2019-0066 - Updated golang packages fix security vulnerability
SRPMS
- 6/core/golang-1.11.5-1.mga6