Mageia 2023-0169: golang security update
Summary
Angle brackets (<>) were not considered dangerous characters when inserted
into CSS contexts. Templates containing multiple actions separated by a
'/' character could result in unexpectedly closing the CSS context and
allowing for injection of unexpected HMTL, if executed with untrusted
input. (CVE-2023-24539)
Not all valid JavaScript whitespace characters were considered to be
whitespace. Templates containing whitespace characters outside of the
character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that
also contain actions may not be properly sanitized during execution.
(CVE-2023-24540)
Templates containing actions in unquoted HTML attributes (e.g.
"attr={{.}}") executed with empty input could result in output that would
have unexpected results when parsed due to HTML normalization rules. This
may allow injection of arbitrary attributes into tags. (CVE-2023-29400)
References
- https://bugs.mageia.org/show_bug.cgi?id=31886
- https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
- https://lists.suse.com/pipermail/sle-security-updates/2023-May/014738.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24539
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24540
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29400
Resolution
MGASA-2023-0169 - Updated golang packages fix security vulnerability
SRPMS
- 8/core/golang-1.19.9-1.mga8