[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2985-1] golang-1.7 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2985-1                [email protected]
https://www.debian.org/lts/security/                      Sylvain Beucler
April 28, 2022                                https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : golang-1.7
Version        : 1.7.4-2+deb9u5
CVE ID         : CVE-2022-23772 CVE-2022-23806 CVE-2022-24921

Several vulnerabilities were discovered in the Go programming
language. An attacker could trigger a denial-of-service (DoS) or
invalid cryptographic computation.

CVE-2022-23772

    Rat.SetString in math/big has an overflow that can lead to
    Uncontrolled Memory Consumption.

CVE-2022-23806

    Curve.IsOnCurve in crypto/elliptic can incorrectly return true in
    situations with a big.Int value that is not a valid field element.

CVE-2022-24921

    regexp.Compile allows stack exhaustion via a deeply nested
    expression.

For Debian 9 stretch, these problems have been fixed in version
1.7.4-2+deb9u5.

We recommend that you upgrade your golang-1.7 packages.

For the detailed security status of golang-1.7 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/golang-1.7

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE1vEOfV7HXWKqBieIDTl9HeUlXjAFAmJqZJAACgkQDTl9HeUl
XjCcHA//f8cBsHoKq1JlXA4nbOHOSsMZkmL906wk35wNmvysZwJA+0hACmwtHpNC
FM4Z5SOTjMnk+s6AAIpICkmsRokbiCGI9F+1BVItirk/x+hsejn3q8MTLzIe65Xx
2IMtorqEYRN9fEI7AlzHn5cA162iKg52z75dYltAUYKvDore8cOIalxV4RiDENZQ
DbizSKGQwDizWEj1M/zZH/6YQF8AmRdqnocvTrHpM8dqr2d+9Rh7QqcSkjNOWuy1
UQicDckrfS2pE/sYzoEetGSDqNqENtzGJEsmmOaJYR3/u9XF2Nv8h++2PtQ4DgTz
ChZOMkqOtOEBrjq4HniQ3R8TH6FWfLuSJJ6ZHlaD2gE2kf9pnu3UrhiDHN3isqMQ
idUR3NuUOU3A+gR7WS1Vlm4cPWqDSr9NmE59jKwABuU++whTFmdkyjnsL9YRh7qj
3z/i8mPKH3MZdiUdBlRNrLDpIAI515Z4iqbYGol5c0dazyzjM4P7stqlo4gFNyA+
5AlFdWKHM2okNY7YW8QP5feruYNoPy0t/ObkKayLPxCl1hzZqDKlSEipyt718U01
a6d1opmj/ZIzu0WgywOPMlYUHXWVEPzy9+uBLJBKpF1ogxSIQvT9m6cL388UCNPk
lequecm0JuFuayGKAMNQXqvWZyjylj55rts4a7iQ9Cpdss9751I=
=2KX3
-----END PGP SIGNATURE-----


Reply to: