golang-1.21.13-3.el9_4
エラータID: AXSA:2024-8826:07
The golang packages provide the Go programming language compiler.
Security Fix(es):
* net/[http:](http:) Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
* go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
CVE-2024-34155
Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.
CVE-2024-34156
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
CVE-2024-34158
Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.
Update packages.
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.
N/A
SRPMS
- golang-1.21.13-3.el9_4.src.rpm
MD5: e1a18eba7bbf46f1db753903cac7bb09
SHA-256: 6e7668e6b4c5172e3cd40c30d2d8925ad2b3fbab96d92cbc77a6711bd21379a8
Size: 25.74 MB
Asianux Server 9 for x86_64
- golang-1.21.13-3.el9_4.x86_64.rpm
MD5: 4d3a33d2a3c80110255e916847fb2ffc
SHA-256: 8104b126e50acb3489279563eea4a4382714a5874e541bea1231484dd33e6631
Size: 669.46 kB - golang-bin-1.21.13-3.el9_4.x86_64.rpm
MD5: 6c8b6aa78e0854fb422a51c310543fcf
SHA-256: 5e84a395480ea9cf79a7e9241c6409a3658044a04f241544bc008991c23a5c1d
Size: 55.88 MB - golang-docs-1.21.13-3.el9_4.noarch.rpm
MD5: b1440c65c8686d65054edfd47f65ce15
SHA-256: 5e6a0e7127de1b5e39dfd29597c233544b7796427c55e9b67b05b17c5ef07f2b
Size: 97.27 kB - golang-misc-1.21.13-3.el9_4.noarch.rpm
MD5: 2b0ca29c5715b628c25717f308814f17
SHA-256: a2e9aa37f9cdaff520cbe55b4a17b899b6ac5c81b284d117bac1860271d13e52
Size: 53.20 kB - golang-src-1.21.13-3.el9_4.noarch.rpm
MD5: 2f1413e1a0677d663c375a25f3ff0439
SHA-256: 37baa856a73c2ad81001a8c8c2fdcc8d58c983641abb3416a6aeb0c52ce0fd25
Size: 12.32 MB - golang-tests-1.21.13-3.el9_4.noarch.rpm
MD5: 376dd12f5fec640165be6327f32104f6
SHA-256: f58b4cbd944fa14bbea880c2cef84e38b934bda8d14eaba62a4b75dde1bf84a9
Size: 9.80 MB - go-toolset-1.21.13-3.el9_4.x86_64.rpm
MD5: 0188d276ffa246cc4b7772d1213c088d
SHA-256: 9396f0fda70f8daf901c944c5906144a8c0bc93740b202a7c6d459413b1669a3
Size: 9.69 kB