[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2986-1] golang-1.8 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2986-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Sylvain Beucler
April 28, 2022                                https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : golang-1.8
Version        : 1.8.1-1+deb9u5
CVE ID         : CVE-2022-23772 CVE-2022-23806 CVE-2022-24921

Several vulnerabilities were discovered in the Go programming
language. An attacker could trigger a denial-of-service (DoS) or
invalid cryptographic computation.

CVE-2022-23772

    Rat.SetString in math/big has an overflow that can lead to
    Uncontrolled Memory Consumption.

CVE-2022-23806

    Curve.IsOnCurve in crypto/elliptic can incorrectly return true in
    situations with a big.Int value that is not a valid field element.

CVE-2022-24921

    regexp.Compile allows stack exhaustion via a deeply nested
    expression.

For Debian 9 stretch, these problems have been fixed in version
1.8.1-1+deb9u5.

We recommend that you upgrade your golang-1.8 packages.

For the detailed security status of golang-1.8 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/golang-1.8

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=x9M/
-----END PGP SIGNATURE-----


Reply to: