Date: Thu, 12 Nov 2020 21:26:35 +0000 (UTC) From: Dmitri Goutnik <dmgk@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r554989 - head/security/vuxml Message-ID: <202011122126.0ACLQZVM033345@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: dmgk Date: Thu Nov 12 21:26:34 2020 New Revision: 554989 URL: https://svnweb.freebsd.org/changeset/ports/554989 Log: security/vuxml: Document lang/go vulnerabilities Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Nov 12 20:42:24 2020 (r554988) +++ head/security/vuxml/vuln.xml Thu Nov 12 21:26:34 2020 (r554989) @@ -58,6 +58,54 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="db4b2f27-252a-11eb-865c-00155d646400"> + <topic>go -- math/big: panic during recursive division of very large numbers; cmd/go: arbitrary code execution at build time through cgo</topic> + <affects> + <package> + <name>go</name> + <range><lt>1.15.5,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Go project reports:</p> + <blockquote cite="https://github.com/golang/go/issues/42552"> + <p>A number of math/big.Int methods (Div, Exp, DivMod, Quo, Rem, + QuoRem, Mod, ModInverse, ModSqrt, Jacobi, and GCD) can panic + when provided crafted large inputs. For the panic to happen, + the divisor or modulo argument must be larger than 3168 bits + (on 32-bit architectures) or 6336 bits (on 64-bit architectures). + Multiple math/big.Rat methods are similarly affected.</p> + </blockquote> + <blockquote cite="https://github.com/golang/go/issues/42556"> + <p>The go command may execute arbitrary code at build time when + cgo is in use. This may occur when running go get on a malicious + package, or any other command that builds untrusted code. This + can be caused by a malicious gcc flags specified via a #cgo + directive.</p> + </blockquote> + <blockquote cite="https://github.com/golang/go/issues/42559"> + <p>The go command may execute arbitrary code at build time when + cgo is in use. This may occur when running go get on a malicious + package, or any other command that builds untrusted code. This + can be caused by malicious unquoted symbol names.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2020-28362</cvename> + <url>https://github.com/golang/go/issues/42552</url> + <cvename>CVE-2020-28367</cvename> + <url>https://github.com/golang/go/issues/42556</url> + <cvename>CVE-2020-28366</cvename> + <url>https://github.com/golang/go/issues/42559</url> + </references> + <dates> + <discovery>2020-11-09</discovery> + <entry>2020-11-12</entry> + </dates> + </vuln> + <vuln vid="50259d8b-243e-11eb-8bae-b42e99975750"> <topic>salt -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202011122126.0ACLQZVM033345>