An update for golang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1661
Final
1.0
1.0
2022-05-20
Initial
2022-05-20
2022-05-20
openEuler SA Tool V1.0
2022-05-20
golang security update
An update for golang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
The Go Programming Language.
Security Fix(es):
Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.(CVE-2021-44717)
encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.(CVE-2022-24675)
The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.(CVE-2022-28327)
An update for golang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
golang
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1661
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-44717
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-24675
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-28327
https://nvd.nist.gov/vuln/detail/CVE-2021-44717
https://nvd.nist.gov/vuln/detail/CVE-2022-24675
https://nvd.nist.gov/vuln/detail/CVE-2022-28327
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
golang-1.15.7-13.oe1.aarch64.rpm
golang-1.15.7-13.oe1.aarch64.rpm
golang-1.17.3-3.oe2203.aarch64.rpm
golang-devel-1.15.7-13.oe1.noarch.rpm
golang-help-1.15.7-13.oe1.noarch.rpm
golang-devel-1.15.7-13.oe1.noarch.rpm
golang-help-1.15.7-13.oe1.noarch.rpm
golang-devel-1.17.3-3.oe2203.noarch.rpm
golang-help-1.17.3-3.oe2203.noarch.rpm
golang-1.15.7-13.oe1.src.rpm
golang-1.15.7-13.oe1.src.rpm
golang-1.17.3-3.oe2203.src.rpm
golang-1.15.7-13.oe1.x86_64.rpm
golang-1.15.7-13.oe1.x86_64.rpm
golang-1.17.3-3.oe2203.x86_64.rpm
Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.
2022-05-20
CVE-2021-44717
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
Medium
4.8
AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
golang security update
2022-05-20
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1661
encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.
2022-05-20
CVE-2022-24675
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
golang security update
2022-05-20
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1661
The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.
2022-05-20
CVE-2022-28327
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
golang security update
2022-05-20
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1661