USN-5725-2

Source
https://ubuntu.com/security/notices/USN-5725-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5725-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5725-2
Related
Published
2023-05-23T13:10:08.473431Z
Modified
2023-05-23T13:10:08.473431Z
Summary
golang-1.13 vulnerability
Details

USN-5725-1 fixed a vulnerability in Go. This update provides the corresponding update for Ubuntu 16.04 LTS.

Original advisory details:

Diederik Loerakker, Jonny Rhea, Raúl Kripalani, and Preston Van Loon discovered that Go incorrectly handled certain inputs. An attacker could possibly use this issue to cause Go applications to hang or crash, resulting in a denial of service.

References

Affected packages

Ubuntu:Pro:16.04:LTS / golang-1.13

Package

Name
golang-1.13
Purl
pkg:deb/ubuntu/golang-1.13?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.13.8-1ubuntu1~16.04.3+esm2

Affected versions

1.*

1.13.8-1ubuntu1~16.04.2
1.13.8-1ubuntu1~16.04.3

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "1.13.8-1ubuntu1~16.04.3+esm2",
            "binary_name": "golang-1.13"
        },
        {
            "binary_version": "1.13.8-1ubuntu1~16.04.3+esm2",
            "binary_name": "golang-1.13-doc"
        },
        {
            "binary_version": "1.13.8-1ubuntu1~16.04.3+esm2",
            "binary_name": "golang-1.13-go"
        },
        {
            "binary_version": "1.13.8-1ubuntu1~16.04.3+esm2",
            "binary_name": "golang-1.13-go-dbgsym"
        },
        {
            "binary_version": "1.13.8-1ubuntu1~16.04.3+esm2",
            "binary_name": "golang-1.13-src"
        }
    ]
}