-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.4324 golang-golang-x-net-dev security update 9 December 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: golang-golang-x-net-dev Publisher: Debian Operating System: Debian GNU/Linux Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-9514 CVE-2019-9512 Reference: ESB-2020.0419 Original Bulletin: https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2485-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Brian May December 09, 2020 https://wiki.debian.org/LTS - - ------------------------------------------------------------------------- Package : golang-golang-x-net-dev Version : 1:0.0+git20161013.8b4af36+dfsg-3+deb9u1 CVE ID : CVE-2019-9512 CVE-2019-9514 The http2 server support in this package was vulnerable to certain types of DOS attacks. CVE-2019-9512 This code was vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. CVE-2019-9514 This code was vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. For Debian 9 stretch, these problems have been fixed in version 1:0.0+git20161013.8b4af36+dfsg-3+deb9u1. We recommend that you upgrade your golang-golang-x-net-dev packages. For the detailed security status of golang-golang-x-net-dev please refer to its security tracker page at: https://security-tracker.debian.org/tracker/golang-golang-x-net-dev Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEKpwfR8DOwu5vyB4TKpJZkldkSvoFAl/P+dIACgkQKpJZkldk Svo42A//XLrZMFKa9pv2kQh+QphGCIVATSxuzlWNzQwjYk9UztXxXbMqbmdvx0Ha +AFFn1X3ZQYboyUmdLWESq4XTgiK+8/EUBqbm39ltG2rZAeAjn74KF7fJ2YPO0Of /sHg6iPmwC8JZ/FXgCnsc2YcXp28qHRYcy3CCEaVnzhtmm7Yi68a+Jy2UlAEjBgT gfdLvVQLkbPU7Z4EE1ZtiOQnvQRO0d6+v668cbX+ZP0L709DstVBAKYGQkyJyQJx 8YbwvxnLXN/s1uU5R3vQTOP1z0pEl9L9M40+7zVAYKHPJ709ubIWPdTKYBYsHwQo 0ir4nE0OgeDadxJaReyhcT+446bqB+U5x1p7hQcDxFc/PSS2lsK26qlP0JP5pgM6 S6QCpob1vRduyWWDHTcqwbnmTWJO75m3sEnrrX214LXSmfukBKYPCLgpR/o5P/UQ 4EdJfuULEDvc1jSM0uKOup4zvANnEGKK9IIRrSbplw2RO9gaThus5uRV6Bm0TBm+ NaAnKXeyJ8iUghXYUCVN5VPpW8Vyrzdn1vCFwR3l9EEiKiwXh1jSlhBS9EJAwiKl g22y4JzXD4Zsmr3+ew+v5IyyBs4Z6OnPOL+wAmYJMj+ZGq98V1g/smb1WZDbzoB/ UJDMWV7Nvl6HhhNMIt8hh27yyNqHcFpM2fWrAv5LOU3ieYhztDc= =7Bfr - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBX9BLy+NLKJtyKPYoAQi3sQ/8DJY2U2YUHHSJZ4iil0IzWxtWAA90Wsny eF7YBBo0TjSADEycs0lSfQGCoFR0471ng/hO3PN3xQt2A7jiqCfpPq8R6FNKgOXS eEEj5bjKozNCtmhSCUHxfdz0wYzkzikaW+duyCcefcpt67unLMbPs33ykK1fRUVh 5QHIOQVZUi19hN96Rn+1C037eRq7Slr4BfXIrae01ByOZnMBOU+O9NqyB59aYAp6 0YqiH93dqKZebZudY5T4+753z7rsr/vct9ksrSPicFTTNUasXzGuFj4G17Tr+Ehh hTlA/qyiGpM+VluYmjwlwqs0jzHJXqRBDxrQv2OhqSQUXgwMCSdBUwYd3VrR+oRE H9RnYrKjoqqd7pnNv6cJtYTfH7B+vH2cYs5MaD7FlwR22SUP1T8RO66enD2mNeai 1Al2t74NOXwEcrFWKYmwldpSm+u32XDyRfQrK+3nG6Il34R8jkRbhDVB6D40ruu+ hB36/UpE0TeIXcGRIhI77R2lH6/a/SQs4zAAQhm0xnDrIH1tFewJVyVvEr7a9NQC +bzBMTWUZV8TSrnlnjyR8yh+9xoEbLx5g4QcP1/6ZOp6mXgXt99vQ9/Co8T071ad x4n4ZPC0pVGO/pbAHV9CUdfkgElGIKJoEp5CPvvJJSsgrwEe/yTLcMhPfwGKzRv5 IRqDHTNt/iQ= =Wp8n -----END PGP SIGNATURE-----
The post ESB-2020.4324 – [Debian] golang-golang-x-net-dev: Denial of service – Remote/unauthenticated appeared first on Malware Devil.
https://malwaredevil.com/2020/12/09/esb-2020-4324-debian-golang-golang-x-net-dev-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-4324-debian-golang-golang-x-net-dev-denial-of-service-remote-unauthenticated
No comments:
Post a Comment