Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 794784 (CVE-2021-33195, CVE-2021-33196, CVE-2021-33197, CVE-2021-33198) - <dev-lang/go-{1.15.13, 1.16.5}: Multiple vulnerabilities
Summary: <dev-lang/go-{1.15.13, 1.16.5}: Multiple vulnerabilities
Status: IN_PROGRESS
Alias: CVE-2021-33195, CVE-2021-33196, CVE-2021-33197, CVE-2021-33198
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa?]
Keywords:
Depends on:
Blocks:
 
Reported: 2021-06-07 15:54 UTC by Sam James
Modified: 2021-07-26 02:44 UTC (History)
1 user (show)

See Also:
Package list:
dev-lang/go-1.15.13 dev-lang/go-1.16.5
Runtime testing required: ---
nattka: sanity-check-


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester gentoo-dev Security 2021-06-07 15:54:05 UTC
* CVE-2021-33198

Description:
"The SetString and UnmarshalText methods of math/big.Rat may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents. This is issue #45910 and CVE-2021-33198."

* CVE-2021-33197

Description:
"ReverseProxy in net/http/httputil could be made to forward certain hop-by-hop headers, including Connection. In case the target of the ReverseProxy was itself a reverse proxy, this would let an attacker drop arbitrary headers, including those set by the ReverseProxy.Director. This is issue #46313 and CVE-2021-33197."

* CVE-2021-33195

Description: "The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in net, and their respective methods on the Resolver type may return arbitrary values retrieved from DNS which do not follow the established RFC 1035 rules for domain names. If these names are used without further sanitization, for instance unsafely included in HTML, they may allow for injection of unexpected content. Note that LookupTXT may still return arbitrary values that could require sanitization before further use. This is issue #46241 and CVE-2021-33195."

* CVE-2021-33196

Description:
"The NewReader and OpenReader functions in archive/zip can cause a panic or an unrecoverable fatal error when reading an archive that claims to contain a large number of files, regardless of its actual size. This is issue #46242 and CVE-2021-33196."
Comment 1 William Hubbs gentoo-dev 2021-06-07 19:32:41 UTC
I'm fine with starting stabilization.
I will do amd64.

Thanks,

William
Comment 2 Larry the Git Cow gentoo-dev 2021-06-07 19:38:36 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=05e474c5bacc8c07800cc68b48f8b6c5f9cb686d

commit 05e474c5bacc8c07800cc68b48f8b6c5f9cb686d
Author:     William Hubbs <williamh@gentoo.org>
AuthorDate: 2021-06-07 19:37:51 +0000
Commit:     William Hubbs <williamh@gentoo.org>
CommitDate: 2021-06-07 19:38:13 +0000

    dev-lang/go: stabilize 1.15.13 and 1.16.5 on amd64
    
    Bug: https://bugs.gentoo.org/794784
    Package-Manager: Portage-3.0.18, Repoman-3.0.2
    Signed-off-by: William Hubbs <williamh@gentoo.org>

 dev-lang/go/go-1.15.13.ebuild | 2 +-
 dev-lang/go/go-1.16.5.ebuild  | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)
Comment 3 Agostino Sarubbo gentoo-dev 2021-06-08 12:09:46 UTC
x86 stable
Comment 4 Agostino Sarubbo gentoo-dev 2021-06-10 06:27:01 UTC
ppc64 stable
Comment 5 Sam James archtester gentoo-dev Security 2021-06-12 01:21:15 UTC
arm64 done
Comment 6 Sam James archtester gentoo-dev Security 2021-06-12 01:21:18 UTC
arm done

all arches done
Comment 7 John Helmert III gentoo-dev Security 2021-06-12 01:29:57 UTC
Please cleanup, thanks!
Comment 8 Larry the Git Cow gentoo-dev 2021-07-01 16:48:41 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=72ef4756cd6ea690536a66e57f10512e90af9764

commit 72ef4756cd6ea690536a66e57f10512e90af9764
Author:     William Hubbs <williamh@gentoo.org>
AuthorDate: 2021-07-01 16:47:34 +0000
Commit:     William Hubbs <williamh@gentoo.org>
CommitDate: 2021-07-01 16:48:06 +0000

    dev-lang/go: remove vulnerable versions
    
    Bug: https://bugs.gentoo.org/794784
    Package-Manager: Portage-3.0.20, Repoman-3.0.2
    Signed-off-by: William Hubbs <williamh@gentoo.org>

 dev-lang/go/Manifest          |   2 -
 dev-lang/go/go-1.15.12.ebuild | 189 ------------------------------------------
 dev-lang/go/go-1.16.4.ebuild  | 189 ------------------------------------------
 3 files changed, 380 deletions(-)
Comment 9 NATTkA bot gentoo-dev 2021-07-26 02:44:23 UTC
Unable to check for sanity:

> no match for package: dev-lang/go-1.15.13