Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 523848 (CVE-2014-7189) - <dev-lang/go-1.3.3: crypto/tls vulnerability (CVE-2014-7189)
Summary: <dev-lang/go-1.3.3: crypto/tls vulnerability (CVE-2014-7189)
Status: RESOLVED FIXED
Alias: CVE-2014-7189
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-09-27 09:25 UTC by Agostino Sarubbo
Modified: 2014-10-17 18:09 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-09-27 09:25:44 UTC
From ${URL} :

>From the Go 1.3.2 release announcement:

"The crpyto/tls fix addresses a security bug that affects programs that use
crypto/tls to implement a TLS server from Go 1.1 onwards. If the server 
enables
TLS client authentication using certificates (this is rare) and explicitly 
sets
SessionTicketsDisabled to true in the tls.Config, then a malicious client can
falsely assert ownership of any client certificate it wishes."

https://groups.google.com/forum/#!msg/golang-nuts/eeOHNw_shwU/OHALUmroA5kJ


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 William Hubbs gentoo-dev 2014-10-07 14:38:53 UTC
sorry about the delay on this; go-1.3.3 is now in the tree.
Do we need to do a fast stable for this? if so, I can stable for amd64,
but we will need to cover arm and x86.
Comment 2 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-10-12 18:56:06 UTC
Arches, please test and mark stable:

=dev-lang/go-1.3.3

target KEYWORDS="amd64 arm x86"
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2014-10-12 19:00:15 UTC
CVE-2014-7189 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7189):
  crpyto/tls in Go 1.1 before 1.3.2, when SessionTicketsDisabled is enabled,
  allows man-in-the-middle attackers to spoof clients via unspecified vectors.
Comment 4 William Hubbs gentoo-dev 2014-10-12 19:30:03 UTC
amd64 done
Comment 5 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-10-12 19:54:07 UTC
x86 stable
Comment 6 Yury German Gentoo Infrastructure gentoo-dev 2014-10-12 20:45:55 UTC
Arches, Thank you for your work
Maintainer(s), please drop the vulnerable version(s).

GLSA Vote: No
Comment 7 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-10-12 20:59:11 UTC
(In reply to Yury German from comment #6)
> Arches, Thank you for your work
> Maintainer(s), please drop the vulnerable version(s).
> 
> GLSA Vote: No

? Arm still in progress

but GLSA vote: no. Anyway
Comment 8 William Hubbs gentoo-dev 2014-10-12 22:37:05 UTC
(In reply to Yury German from comment #6)
> Maintainer(s), please drop the vulnerable version(s).

I plan to as soon as this version is stable on arm.
Comment 9 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-10-17 18:02:52 UTC
arm stable.

Cleanup, please!
Comment 10 William Hubbs gentoo-dev 2014-10-17 18:07:46 UTC
Old versions are removed.
Comment 11 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-10-17 18:09:11 UTC
(In reply to William Hubbs from comment #10)
> Old versions are removed.

Thanks! Closed.