|
Message-ID: <CA+s3sfFMSqi3-5b=4-=gx_nXYye=0oWuWtpwsgEe6mdiq8a_Ew@mail.gmail.com> Date: Mon, 21 Dec 2015 16:07:45 +0000 From: Jason Buberel <jbuberel@...gle.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: CVE request for math/big.Exp OSS-Security, The Go open source project has received notification of an error in the math/big library (https://golang.org/pkg/math/big/). The problem that was identified is similar to CVE-2015-3193 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193>. The vulnerability was introduced in the 1.5 release, and remains present in Go 1.5.1 and 1.5.2. A fix for the issue has been applied to the master branch of the Go repo under CL 17672 <https://go-review.googlesource.com/#/c/17672/>. We will also be releasing Go 1.5.3 to fix this vulnerability. We are requesting a CVE ID in order to coordinate updates with distributions that include binary packages for the Go programming language. We will also announce and request that all Go programs using the math/big package that were compiled with version 1.5, 1.5.1, or 1.5.2 be recompiled with 1.5.3 (when released) due to the static linking nature of the Go toolchain. Regards, jason
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.