Updated golang packages fix security vulnerability
Publication date: 24 Mar 2023Modification date: 24 Mar 2023
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-41723 , CVE-2022-41724 , CVE-2022-41725 , CVE-2023-24532
Description
A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. (CVE-2022-41723) Large handshake records may cause panics in crypto/tls. (CVE-2022-41724) Denial of service from excessive resource consumption in net/http and mime/multipart. (CVE-2022-41725) The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (CVE-2023-24532)
References
- https://bugs.mageia.org/show_bug.cgi?id=31575
- https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/JRXUC3OICW2AVH5PMURCX4EAOCITSPPU/
- https://groups.google.com/g/golang-announce/c/3-TpUx48iQY
- https://lists.suse.com/pipermail/sle-security-updates/2023-March/014037.html
- https://lists.suse.com/pipermail/sle-security-updates/2023-March/014038.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41724
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41725
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24532
SRPMS
8/core
- golang-1.19.7-1.mga8