An update for golang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-1661 Final 1.0 1.0 2022-05-20 Initial 2022-05-20 2022-05-20 openEuler SA Tool V1.0 2022-05-20 golang security update An update for golang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. The Go Programming Language. Security Fix(es): Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.(CVE-2021-44717) encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.(CVE-2022-24675) The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.(CVE-2022-28327) An update for golang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High golang https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1661 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-44717 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-24675 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-28327 https://nvd.nist.gov/vuln/detail/CVE-2021-44717 https://nvd.nist.gov/vuln/detail/CVE-2022-24675 https://nvd.nist.gov/vuln/detail/CVE-2022-28327 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS golang-1.15.7-13.oe1.aarch64.rpm golang-1.15.7-13.oe1.aarch64.rpm golang-1.17.3-3.oe2203.aarch64.rpm golang-devel-1.15.7-13.oe1.noarch.rpm golang-help-1.15.7-13.oe1.noarch.rpm golang-devel-1.15.7-13.oe1.noarch.rpm golang-help-1.15.7-13.oe1.noarch.rpm golang-devel-1.17.3-3.oe2203.noarch.rpm golang-help-1.17.3-3.oe2203.noarch.rpm golang-1.15.7-13.oe1.src.rpm golang-1.15.7-13.oe1.src.rpm golang-1.17.3-3.oe2203.src.rpm golang-1.15.7-13.oe1.x86_64.rpm golang-1.15.7-13.oe1.x86_64.rpm golang-1.17.3-3.oe2203.x86_64.rpm Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion. 2022-05-20 CVE-2021-44717 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS Medium 4.8 AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N golang security update 2022-05-20 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1661 encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data. 2022-05-20 CVE-2022-24675 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H golang security update 2022-05-20 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1661 The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input. 2022-05-20 CVE-2022-28327 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H golang security update 2022-05-20 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1661