Bug 1324343 (CVE-2016-3959) - CVE-2016-3959 golang: infinite loop in several big integer routines
Summary: CVE-2016-3959 golang: infinite loop in several big integer routines
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-3959
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1324344 1324345 1330039 1330040
Blocks: 1324346
TreeView+ depends on / blocked
 
Reported: 2016-04-06 06:36 UTC by Andrej Nemec
Modified: 2019-09-29 13:46 UTC (History)
28 users (show)

Fixed In Version: golang 1.5.4, golang 1.6.1
Clone Of:
Environment:
Last Closed: 2016-11-04 02:16:16 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2016-04-06 06:36:49 UTC
Go has an infinite loop in several big integer routines that makes Go
programs vulnerable to remote denial of service attacks.  Programs using
HTTPS client authentication or the Go ssh server libraries are both exposed
to this vulnerability.

Upstream fix:

https://go-review.googlesource.com/#/c/21533/

References:

http://seclists.org/oss-sec/2016/q2/11

Comment 1 Andrej Nemec 2016-04-06 06:37:17 UTC
Created golang tracking bugs for this issue:

Affects: fedora-all [bug 1324344]
Affects: epel-6 [bug 1324345]

Comment 2 Fedora Update System 2016-04-17 23:41:25 UTC
golang-1.6.1-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.

Comment 4 Fedora Update System 2016-04-25 22:21:33 UTC
golang-1.5.4-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.

Comment 5 Fedora Update System 2016-04-25 23:53:59 UTC
golang-1.5.4-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.

Comment 8 Tomas Hoger 2016-10-05 07:38:26 UTC
This was fixed upstream in versions 1.5.4 and 1.6.1.  Upstream bug and release notes:

https://github.com/golang/go/issues/15184
https://golang.org/doc/devel/release.html#go1.6
https://golang.org/doc/devel/release.html#go1.5

Upstream bug also notes this related change fixing similar problem for rsa and ecdsa, for which no trigger is known:

https://golang.org/cl/21560


Note You need to log in before you can comment on or make changes to this bug.