openSUSE-SU-2020:2067-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2020:2067-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2020:2067-1
Related
Published
2020-11-27T05:24:15Z
Modified
2020-11-27T05:24:15Z
Summary
Security update for go1.14
Details

This update for go1.14 fixes the following issues:

  • go1.14.12 (released 2020-11-12) includes security fixes to the cmd/go and math/big packages.
    • go#42553 math/big: panic during recursive division of very large numbers (bsc#1178750 CVE-2020-28362)
    • go#42560 cmd/go: arbitrary code can be injected into cgo generated files (bsc#1178752 CVE-2020-28367)
    • go#42557 cmd/go: improper validation of cgo flags can lead to remote code execution at build time (bsc#1178753 CVE-2020-28366)
    • go#42155 time: Location interprets wrong timezone (DST) with slim zoneinfo
    • go#42112 x/net/http2: the first write error on a connection will cause all subsequent write requests to fail blindly
    • go#41991 runtime: macOS-only segfault on 1.14+ with 'split stack overflow'
    • go#41913 net/http: request.Clone doesn't deep copy TransferEncoding
    • go#41703 runtime: macOS syscall.Exec can get SIGILL due to preemption signal
    • go#41386 x/net/http2: connection-level flow control not returned if stream errors, causes server hang

This update was imported from the SUSE:SLE-15:Update update project.

References

Affected packages

openSUSE:Leap 15.2 / go1.14

Package

Name
go1.14
Purl
purl:rpm/suse/go1.14&distro=openSUSE%20Leap%2015.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.14.12-lp152.2.12.1

Ecosystem specific

{
    "binaries": [
        {
            "go1.14-doc": "1.14.12-lp152.2.12.1",
            "go1.14-race": "1.14.12-lp152.2.12.1",
            "go1.14": "1.14.12-lp152.2.12.1"
        }
    ]
}