Mageia 2023-0109: golang security update
Summary
A maliciously crafted HTTP/2 stream could cause excessive CPU consumption
in the HPACK decoder, sufficient to cause a denial of service from a small
number of small requests. (CVE-2022-41723)
Large handshake records may cause panics in crypto/tls. (CVE-2022-41724)
Denial of service from excessive resource consumption in net/http and
mime/multipart. (CVE-2022-41725)
The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an
incorrect result if called with some specific unreduced scalars(CVE-2023-24532)
References
- https://bugs.mageia.org/show_bug.cgi?id=31575
- https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/JRXUC3OICW2AVH5PMURCX4EAOCITSPPU/
- https://groups.google.com/g/golang-announce/c/3-TpUx48iQY
- https://lists.suse.com/pipermail/sle-security-updates/2023-March/014037.html
- https://lists.suse.com/pipermail/sle-security-updates/2023-March/014038.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41724
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41725
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24532
Resolution
MGASA-2023-0109 - Updated golang packages fix security vulnerability
SRPMS
- 8/core/golang-1.19.7-1.mga8