MGASA-2023-0109

Source
https://advisories.mageia.org/MGASA-2023-0109.html
Import Source
https://advisories.mageia.org/MGASA-2023-0109.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2023-0109
Related
Published
2023-03-24T05:55:49Z
Modified
2023-03-24T04:42:40Z
Summary
Updated golang packages fix security vulnerability
Details

A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. (CVE-2022-41723) Large handshake records may cause panics in crypto/tls. (CVE-2022-41724) Denial of service from excessive resource consumption in net/http and mime/multipart. (CVE-2022-41725) The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (CVE-2023-24532)

References
Credits

Affected packages

Mageia:8 / golang

Package

Name
golang
Purl
pkg:rpm/mageia/golang?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.7-1.mga8

Ecosystem specific

{
    "section": "core"
}