ALT-PU-2016-1849-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-3958
Untrusted search path vulnerability in Go before 1.5.4 and 1.6.x before 1.6.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, related to use of the LoadLibrary function.
- [oss-security] 20160405 CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 Re: CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 Re: CVE request - Go - DLL loading, Big int
- https://github.com/golang/go/issues/14959
- https://github.com/golang/go/issues/14959
- https://go-review.googlesource.com/#/c/21428/
- https://go-review.googlesource.com/#/c/21428/
- [golang-announce] 20160412 [security] Go 1.6.1 and 1.5.4 are released
- [golang-announce] 20160412 [security] Go 1.6.1 and 1.5.4 are released
Modified: 2024-11-21
CVE-2016-3959
The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.
- FEDORA-2016-2940ad5550
- FEDORA-2016-2940ad5550
- FEDORA-2016-59c5e405e3
- FEDORA-2016-59c5e405e3
- FEDORA-2016-2fcfc7670f
- FEDORA-2016-2fcfc7670f
- openSUSE-SU-2016:1331
- openSUSE-SU-2016:1331
- RHSA-2016:1538
- RHSA-2016:1538
- [oss-security] 20160405 CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 Re: CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 Re: CVE request - Go - DLL loading, Big int
- https://go-review.googlesource.com/#/c/21533/
- https://go-review.googlesource.com/#/c/21533/
- [golang-announce] 20160412 [security] Go 1.6.1 and 1.5.4 are released
- [golang-announce] 20160412 [security] Go 1.6.1 and 1.5.4 are released
Modified: 2024-11-21
CVE-2016-5386
The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
- RHSA-2016:1538
- RHSA-2016:1538
- VU#797896
- VU#797896
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1353798
- https://bugzilla.redhat.com/show_bug.cgi?id=1353798
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
- https://httpoxy.org/
- https://httpoxy.org/
- FEDORA-2016-340e361b90
- FEDORA-2016-340e361b90
- FEDORA-2016-ea5e284d34
- FEDORA-2016-ea5e284d34