MGASA-2023-0109 - Updated golang packages fix security vulnerability Publication date: 24 Mar 2023 URL: https://advisories.mageia.org/MGASA-2023-0109.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24532 A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. (CVE-2022-41723) Large handshake records may cause panics in crypto/tls. (CVE-2022-41724) Denial of service from excessive resource consumption in net/http and mime/multipart. (CVE-2022-41725) The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (CVE-2023-24532) References: - https://bugs.mageia.org/show_bug.cgi?id=31575 - https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E - https://lists.fedoraproject.org/archives/list/[email protected]/thread/JRXUC3OICW2AVH5PMURCX4EAOCITSPPU/ - https://groups.google.com/g/golang-announce/c/3-TpUx48iQY - https://lists.suse.com/pipermail/sle-security-updates/2023-March/014037.html - https://lists.suse.com/pipermail/sle-security-updates/2023-March/014038.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41724 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41725 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24532 SRPMS: - 8/core/golang-1.19.7-1.mga8