|
Message-ID: <CA+s3sfGjsnd+JiDyx+i9xWX6J4DoK=bQUEn64Z8jP2ava1cLYw@mail.gmail.com> Date: Tue, 05 Apr 2016 17:19:31 +0000 From: Jason Buberel <jbuberel@...gle.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: CVE request - Go - DLL loading, Big int OSS-Security, The Go open source project has identified two security issues that we believe warrant the issuing of a new release: 1. On Windows, Go loads system DLLs by name with LoadLibrary, making it vulnerable to DLL preloading attacks. Notably, if a user launched a Go executable from their Downloads folder and malicious DLLs were in their Downloads folder. This is being address in the following CL: https://golang.org/cl/21428 2. Go has an infinite loop in several big integer routines that makes Go programs vulnerable to remote denial of service attacks. Programs using HTTPS client authentication or the Go ssh server libraries are both exposed to this vulnerability. This is being addressed in the following CL: https://golang.org/cl/21533 We will release two new versions - Go 1.6.1 and 1.5.4 - both of which will address these two issues. Regards, Jason Buberel PM, Go
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.