golang-1.21.13-3.el9_4

エラータID: AXSA:2024-8826:07

Release date: 
Tuesday, September 24, 2024 - 17:13
Subject: 
golang-1.21.13-3.el9_4
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The golang packages provide the Go programming language compiler.

Security Fix(es):

* net/[http:](http:) Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
* go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
CVE-2024-34155
Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.
CVE-2024-34156
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
CVE-2024-34158
Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. golang-1.21.13-3.el9_4.src.rpm
    MD5: e1a18eba7bbf46f1db753903cac7bb09
    SHA-256: 6e7668e6b4c5172e3cd40c30d2d8925ad2b3fbab96d92cbc77a6711bd21379a8
    Size: 25.74 MB

Asianux Server 9 for x86_64
  1. golang-1.21.13-3.el9_4.x86_64.rpm
    MD5: 4d3a33d2a3c80110255e916847fb2ffc
    SHA-256: 8104b126e50acb3489279563eea4a4382714a5874e541bea1231484dd33e6631
    Size: 669.46 kB
  2. golang-bin-1.21.13-3.el9_4.x86_64.rpm
    MD5: 6c8b6aa78e0854fb422a51c310543fcf
    SHA-256: 5e84a395480ea9cf79a7e9241c6409a3658044a04f241544bc008991c23a5c1d
    Size: 55.88 MB
  3. golang-docs-1.21.13-3.el9_4.noarch.rpm
    MD5: b1440c65c8686d65054edfd47f65ce15
    SHA-256: 5e6a0e7127de1b5e39dfd29597c233544b7796427c55e9b67b05b17c5ef07f2b
    Size: 97.27 kB
  4. golang-misc-1.21.13-3.el9_4.noarch.rpm
    MD5: 2b0ca29c5715b628c25717f308814f17
    SHA-256: a2e9aa37f9cdaff520cbe55b4a17b899b6ac5c81b284d117bac1860271d13e52
    Size: 53.20 kB
  5. golang-src-1.21.13-3.el9_4.noarch.rpm
    MD5: 2f1413e1a0677d663c375a25f3ff0439
    SHA-256: 37baa856a73c2ad81001a8c8c2fdcc8d58c983641abb3416a6aeb0c52ce0fd25
    Size: 12.32 MB
  6. golang-tests-1.21.13-3.el9_4.noarch.rpm
    MD5: 376dd12f5fec640165be6327f32104f6
    SHA-256: f58b4cbd944fa14bbea880c2cef84e38b934bda8d14eaba62a4b75dde1bf84a9
    Size: 9.80 MB
  7. go-toolset-1.21.13-3.el9_4.x86_64.rpm
    MD5: 0188d276ffa246cc4b7772d1213c088d
    SHA-256: 9396f0fda70f8daf901c944c5906144a8c0bc93740b202a7c6d459413b1669a3
    Size: 9.69 kB