svn commit: r554989 - head/security/vuxml
Dmitri Goutnik
dmgk at FreeBSD.org
Thu Nov 12 21:26:35 UTC 2020
Author: dmgk
Date: Thu Nov 12 21:26:34 2020
New Revision: 554989
URL: https://svnweb.freebsd.org/changeset/ports/554989
Log:
security/vuxml: Document lang/go vulnerabilities
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Nov 12 20:42:24 2020 (r554988)
+++ head/security/vuxml/vuln.xml Thu Nov 12 21:26:34 2020 (r554989)
@@ -58,6 +58,54 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="db4b2f27-252a-11eb-865c-00155d646400">
+ <topic>go -- math/big: panic during recursive division of very large numbers; cmd/go: arbitrary code execution at build time through cgo</topic>
+ <affects>
+ <package>
+ <name>go</name>
+ <range><lt>1.15.5,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Go project reports:</p>
+ <blockquote cite="https://github.com/golang/go/issues/42552">
+ <p>A number of math/big.Int methods (Div, Exp, DivMod, Quo, Rem,
+ QuoRem, Mod, ModInverse, ModSqrt, Jacobi, and GCD) can panic
+ when provided crafted large inputs. For the panic to happen,
+ the divisor or modulo argument must be larger than 3168 bits
+ (on 32-bit architectures) or 6336 bits (on 64-bit architectures).
+ Multiple math/big.Rat methods are similarly affected.</p>
+ </blockquote>
+ <blockquote cite="https://github.com/golang/go/issues/42556">
+ <p>The go command may execute arbitrary code at build time when
+ cgo is in use. This may occur when running go get on a malicious
+ package, or any other command that builds untrusted code. This
+ can be caused by a malicious gcc flags specified via a #cgo
+ directive.</p>
+ </blockquote>
+ <blockquote cite="https://github.com/golang/go/issues/42559">
+ <p>The go command may execute arbitrary code at build time when
+ cgo is in use. This may occur when running go get on a malicious
+ package, or any other command that builds untrusted code. This
+ can be caused by malicious unquoted symbol names.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2020-28362</cvename>
+ <url>https://github.com/golang/go/issues/42552</url>
+ <cvename>CVE-2020-28367</cvename>
+ <url>https://github.com/golang/go/issues/42556</url>
+ <cvename>CVE-2020-28366</cvename>
+ <url>https://github.com/golang/go/issues/42559</url>
+ </references>
+ <dates>
+ <discovery>2020-11-09</discovery>
+ <entry>2020-11-12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="50259d8b-243e-11eb-8bae-b42e99975750">
<topic>salt -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-head
mailing list