SB2019020203 - Debian update for golang-1.7
Published: February 2, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 vulnerabilities.
1) OS command execution (CVE-ID: CVE-2018-7187)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.The weakness exists in the "go get" implementation due to insufficient validation of the import path (get/vcs.go only checks for "://" anywhere in the string) when the -insecure command-line option is used. A remote attacker can trick the victim into visiting a specially crafted website, inject OS commands and execute arbitrary code.
2) Resource exhaustion (CVE-ID: CVE-2019-6486)
The vulnerability allows a remote attacker to cause DoS condition.
The vulnerability exists in the crypto/elliptic implementations of the P-521 and P-384 elliptic curves due to insufficient validation of user-supplied input. A remote attacker can submit specially crafted inputs via TLS handshakes, X.509 certificates, JWT tokens, ECDH shares or ECDSA signatures, consume excessive amounts of CPU and cause the service to crash.
Remediation
Install update from vendor's website.