Go has an infinite loop in several big integer routines that makes Go programs vulnerable to remote denial of service attacks. Programs using HTTPS client authentication or the Go ssh server libraries are both exposed to this vulnerability. Upstream fix: https://go-review.googlesource.com/#/c/21533/ References: http://seclists.org/oss-sec/2016/q2/11
Created golang tracking bugs for this issue: Affects: fedora-all [bug 1324344] Affects: epel-6 [bug 1324345]
golang-1.6.1-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
golang-1.5.4-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
golang-1.5.4-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
This was fixed upstream in versions 1.5.4 and 1.6.1. Upstream bug and release notes: https://github.com/golang/go/issues/15184 https://golang.org/doc/devel/release.html#go1.6 https://golang.org/doc/devel/release.html#go1.5 Upstream bug also notes this related change fixing similar problem for rsa and ecdsa, for which no trigger is known: https://golang.org/cl/21560