Bug 1897635 (CVE-2020-28362)
Summary: | CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | admiller, agerstmayr, ahajkova, ailan, alazar, alegrand, alitke, amctagga, amurdaca, anpicker, aoconnor, aos-bugs, aos-storage-staff, asm, bbaude, bbennett, bbreard, bbrownin, bmontgom, bniver, bodavis, cnv-qe-bugs, deparker, dhanak, dsimansk, dwalsh, ecordell, emachado, eparis, erooth, fdeutsch, flucifre, fweimer, gbrown, gmeno, grafana-maint, hchiramm, hvyas, imcleod, jakub, jburrell, jcajka, jcosta, jesusr, jhrozek, jkurik, jligon, jmulligan, jnovy, jokerman, josorior, jpadman, jshaughn, jwendell, jwon, kakkoyun, kconner, kingland, krathod, kverlaen, law, lchilton, lcosic, lemenkov, lgamliel, lsm5, madam, markito, maszulik, matzew, mbenjamin, mfilanov, mfojtik, mgoodwin, mhackett, mheon, miabbott, mloibl, mnewsome, mnovotny, mpolacek, mrajanna, mrogers, msivak, muagarwa, mwringe, nathans, nobody, nstielau, ohudlick, oyahud, pdhamdhe, phoracek, pkrupa, pthomas, puebele, rcernich, renich, rfreiman, rhel8-maint, rhs-bugs, rphillips, rrajasek, rtalur, sausingh, sbatsche, sfeifer, sgott, shurley, sipoyare, sostapov, sponnaga, stirabos, storage-qa-internal, surbania, swshanka, tjelinek, tnielsen, tstellar, tsweeney, twalsh, umohnani, vbatts, vereddy, virt-maint, xiyuan, ypadia |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
See Also: |
https://issues.redhat.com/browse/OSSM-322 https://issues.redhat.com/browse/OSSM-323 https://issues.redhat.com/browse/OSSM-324 https://issues.redhat.com/browse/OSSM-325 https://issues.redhat.com/browse/OSSM-326 https://issues.redhat.com/browse/OSSM-327 https://issues.redhat.com/browse/OSSM-328 https://issues.redhat.com/browse/OSSM-329 https://issues.redhat.com/browse/TRACING-1689 https://issues.redhat.com/browse/TRACING-1690 https://issues.redhat.com/browse/TRACING-1691 https://issues.redhat.com/browse/TRACING-1692 https://issues.redhat.com/browse/TRACING-1693 https://issues.redhat.com/browse/TRACING-1694 https://issues.redhat.com/browse/SRVCOM-1159 https://issues.redhat.com/browse/SRVCOM-1160 https://issues.redhat.com/browse/SRVCOM-1161 |
||
Whiteboard: | |||
Fixed In Version: | go 1.15.5, go 1.14.12 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the math/big package of Go's standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-12-15 22:19:14 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1897636, 1897637, 1898659, 1898660, 1898820, 1898829, 1898835, 1898955, 1899185, 1902915, 1902916, 1902917, 1902918, 1902919, 1902920, 1902921, 1902922, 1902923, 1902924, 1902926, 1902927, 1902928, 1905509, 1905510, 1905511, 1905512, 1905513, 1905514, 1905515, 1905516, 1905517, 1905518, 1905520, 1905521, 1905522, 1905523, 1905524, 1905525, 1905526, 1905527, 1905528, 1905529, 1905530, 1905531, 1905533, 1905534, 1905535, 1905536, 1905537, 1905538, 1905539, 1905540, 1906015, 1906016, 1906017, 1906018, 1906019, 1906020, 1913515, 1914054, 1914055, 1914058, 1914059, 1916004, 1916187, 1916953, 1934654, 1934655, 1934657, 1934658, 1934659, 1934660, 1934661, 1934662, 1934663, 1935187, 1935188, 1935189, 1935190, 1935191, 1935192, 1935200, 1935203 | ||
Bug Blocks: | 1897651 |
Description
Guilherme de Almeida Suckevicz
2020-11-13 17:02:38 UTC
Created golang tracking bugs for this issue: Affects: epel-all [bug 1897637] Affects: fedora-all [bug 1897636] Upstream commit with fix: https://github.com/golang/go/commit/1e1fa5903b760c6714ba17e50bf850b01f49135c This issue has been addressed in the following products: Red Hat Developer Tools Via RHSA-2020:5333 https://access.redhat.com/errata/RHSA-2020:5333 Statement: OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support. Openshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Red Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates. OpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:5493 https://access.redhat.com/errata/RHSA-2020:5493 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-28362 This issue has been addressed in the following products: Openshift Serverless 1 on RHEL 8 Via RHSA-2021:0145 https://access.redhat.com/errata/RHSA-2021:0145 This issue has been addressed in the following products: Openshift Serveless 1.12 Via RHSA-2021:0146 https://access.redhat.com/errata/RHSA-2021:0146 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2021:0038 https://access.redhat.com/errata/RHSA-2021:0038 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2021:0039 https://access.redhat.com/errata/RHSA-2021:0039 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2021:0037 https://access.redhat.com/errata/RHSA-2021:0037 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2021:0568 https://access.redhat.com/errata/RHSA-2021:0568 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2021:0436 https://access.redhat.com/errata/RHSA-2021:0436 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.7 Via RHSA-2020:5633 https://access.redhat.com/errata/RHSA-2020:5633 This issue has been addressed in the following products: RHEL-8-CNV-2.6 Via RHSA-2021:0799 https://access.redhat.com/errata/RHSA-2021:0799 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.7 Via RHSA-2021:1366 https://access.redhat.com/errata/RHSA-2021:1366 This bug will be shipped as part of next z-stream release 4.7.11 on May 19th, as 4.7.10 was dropped. This bug will be shipped as part of next z-stream release 4.7.11 on May 19th, as 4.7.10 was dropped due to a blocker https://bugzilla.redhat.com/show_bug.cgi?id=1958518. This issue has been addressed in the following products: Red Hat OpenShift Container Storage 4.7.0 on RHEL-8 Via RHSA-2021:2041 https://access.redhat.com/errata/RHSA-2021:2041 This issue has been addressed in the following products: Red Hat OpenShift Container Storage 4.7.0 on RHEL-8 Via RHSA-2021:2042 https://access.redhat.com/errata/RHSA-2021:2042 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.7 Via RHSA-2021:1551 https://access.redhat.com/errata/RHSA-2021:1551 This issue has been addressed in the following products: Red Hat OpenShift Jaeger 1.17 Via RHSA-2021:2532 https://access.redhat.com/errata/RHSA-2021:2532 This issue has been addressed in the following products: Red Hat OpenShift Jaeger 1.20 Via RHSA-2021:2543 https://access.redhat.com/errata/RHSA-2021:2543 |