-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: go-toolset-1.13-golang security and bug fix update
Advisory ID:       RHSA-2020:4214-01
Product:           Red Hat Developer Tools
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:4214
Issue date:        2020-10-08
CVE Names:         CVE-2020-14040 CVE-2020-15586 CVE-2020-16845 
====================================================================
1. Summary:

An update for go-toolset-1.13 and go-toolset-1.13-golang is now available
for Red Hat Developer Tools.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64le, s390x, x86_64
Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64

3. Description:

Go Toolset provides the Go programming language tools and libraries. Go is
alternatively known as golang.

Security Fix(es):

* golang.org/x/text: possibility to trigger an infinite loop in
encoding/unicode could lead to crash (CVE-2020-14040)

* golang: data race in certain net/http servers including ReverseProxy can
lead to DoS (CVE-2020-15586)

* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes
from invalid inputs (CVE-2020-16845)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* net/http, x/net/http2: http server shutdown doesn't gracefully shut down
HTTP2 connections (BZ#1879236)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
1856953 - CVE-2020-15586 golang: data race in certain net/http servers including ReverseProxy can lead to DoS
1867099 - CVE-2020-16845 golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs

6. Package List:

Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7):

Source:
go-toolset-1.13-1.13.15-1.el7.src.rpm
go-toolset-1.13-golang-1.13.15-3.el7.src.rpm

noarch:
go-toolset-1.13-golang-docs-1.13.15-3.el7.noarch.rpm

ppc64le:
go-toolset-1.13-1.13.15-1.el7.ppc64le.rpm
go-toolset-1.13-build-1.13.15-1.el7.ppc64le.rpm
go-toolset-1.13-golang-1.13.15-3.el7.ppc64le.rpm
go-toolset-1.13-golang-bin-1.13.15-3.el7.ppc64le.rpm
go-toolset-1.13-golang-misc-1.13.15-3.el7.ppc64le.rpm
go-toolset-1.13-golang-src-1.13.15-3.el7.ppc64le.rpm
go-toolset-1.13-golang-tests-1.13.15-3.el7.ppc64le.rpm
go-toolset-1.13-runtime-1.13.15-1.el7.ppc64le.rpm

s390x:
go-toolset-1.13-1.13.15-1.el7.s390x.rpm
go-toolset-1.13-build-1.13.15-1.el7.s390x.rpm
go-toolset-1.13-golang-1.13.15-3.el7.s390x.rpm
go-toolset-1.13-golang-bin-1.13.15-3.el7.s390x.rpm
go-toolset-1.13-golang-misc-1.13.15-3.el7.s390x.rpm
go-toolset-1.13-golang-src-1.13.15-3.el7.s390x.rpm
go-toolset-1.13-golang-tests-1.13.15-3.el7.s390x.rpm
go-toolset-1.13-runtime-1.13.15-1.el7.s390x.rpm

x86_64:
go-toolset-1.13-1.13.15-1.el7.x86_64.rpm
go-toolset-1.13-build-1.13.15-1.el7.x86_64.rpm
go-toolset-1.13-golang-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-golang-bin-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-golang-misc-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-golang-race-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-golang-src-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-golang-tests-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-runtime-1.13.15-1.el7.x86_64.rpm

Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7):

Source:
go-toolset-1.13-1.13.15-1.el7.src.rpm
go-toolset-1.13-golang-1.13.15-3.el7.src.rpm

noarch:
go-toolset-1.13-golang-docs-1.13.15-3.el7.noarch.rpm

x86_64:
go-toolset-1.13-1.13.15-1.el7.x86_64.rpm
go-toolset-1.13-build-1.13.15-1.el7.x86_64.rpm
go-toolset-1.13-golang-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-golang-bin-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-golang-misc-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-golang-race-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-golang-src-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-golang-tests-1.13.15-3.el7.x86_64.rpm
go-toolset-1.13-runtime-1.13.15-1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-14040
https://access.redhat.com/security/cve/CVE-2020-15586
https://access.redhat.com/security/cve/CVE-2020-16845
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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Fge/
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-4214:01 Moderate: go-toolset-1.13-golang security and bug

An update for go-toolset-1.13 and go-toolset-1.13-golang is now available for Red Hat Developer Tools

Summary

Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* net/http, x/net/http2: http server shutdown doesn't gracefully shut down HTTP2 connections (BZ#1879236)



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2020-14040 https://access.redhat.com/security/cve/CVE-2020-15586 https://access.redhat.com/security/cve/CVE-2020-16845 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7):
Source: go-toolset-1.13-1.13.15-1.el7.src.rpm go-toolset-1.13-golang-1.13.15-3.el7.src.rpm
noarch: go-toolset-1.13-golang-docs-1.13.15-3.el7.noarch.rpm
ppc64le: go-toolset-1.13-1.13.15-1.el7.ppc64le.rpm go-toolset-1.13-build-1.13.15-1.el7.ppc64le.rpm go-toolset-1.13-golang-1.13.15-3.el7.ppc64le.rpm go-toolset-1.13-golang-bin-1.13.15-3.el7.ppc64le.rpm go-toolset-1.13-golang-misc-1.13.15-3.el7.ppc64le.rpm go-toolset-1.13-golang-src-1.13.15-3.el7.ppc64le.rpm go-toolset-1.13-golang-tests-1.13.15-3.el7.ppc64le.rpm go-toolset-1.13-runtime-1.13.15-1.el7.ppc64le.rpm
s390x: go-toolset-1.13-1.13.15-1.el7.s390x.rpm go-toolset-1.13-build-1.13.15-1.el7.s390x.rpm go-toolset-1.13-golang-1.13.15-3.el7.s390x.rpm go-toolset-1.13-golang-bin-1.13.15-3.el7.s390x.rpm go-toolset-1.13-golang-misc-1.13.15-3.el7.s390x.rpm go-toolset-1.13-golang-src-1.13.15-3.el7.s390x.rpm go-toolset-1.13-golang-tests-1.13.15-3.el7.s390x.rpm go-toolset-1.13-runtime-1.13.15-1.el7.s390x.rpm
x86_64: go-toolset-1.13-1.13.15-1.el7.x86_64.rpm go-toolset-1.13-build-1.13.15-1.el7.x86_64.rpm go-toolset-1.13-golang-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-golang-bin-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-golang-misc-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-golang-race-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-golang-src-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-golang-tests-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-runtime-1.13.15-1.el7.x86_64.rpm
Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7):
Source: go-toolset-1.13-1.13.15-1.el7.src.rpm go-toolset-1.13-golang-1.13.15-3.el7.src.rpm
noarch: go-toolset-1.13-golang-docs-1.13.15-3.el7.noarch.rpm
x86_64: go-toolset-1.13-1.13.15-1.el7.x86_64.rpm go-toolset-1.13-build-1.13.15-1.el7.x86_64.rpm go-toolset-1.13-golang-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-golang-bin-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-golang-misc-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-golang-race-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-golang-src-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-golang-tests-1.13.15-3.el7.x86_64.rpm go-toolset-1.13-runtime-1.13.15-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:4214-01
Product: Red Hat Developer Tools
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4214
Issued Date: : 2020-10-08
CVE Names: CVE-2020-14040 CVE-2020-15586 CVE-2020-16845

Topic

An update for go-toolset-1.13 and go-toolset-1.13-golang is now availablefor Red Hat Developer Tools.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64le, s390x, x86_64

Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64


Bugs Fixed

1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash

1856953 - CVE-2020-15586 golang: data race in certain net/http servers including ReverseProxy can lead to DoS

1867099 - CVE-2020-16845 golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs


Related News