Red Hat Security Advisory 2017-3463-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. Security Fix: An arbitrary command execution flaw was found in the way Go's "go get" command handled the checkout of source code repositories. A remote attacker capable of hosting malicious repositories could potentially use this flaw to cause arbitrary command execution on the client side. It was found that smtp.PlainAuth authentication scheme in Go did not verify the TLS requirement properly. A remote man-in-the-middle attacker could potentially use this flaw to sniff SMTP credentials sent by a Go application.
34fc4cb4409bacd861fabab79b86a4ada6ca60f08cdf7237d43f8b4401e9eae2
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: go-toolset-7 and go-toolset-7-golang security and bug fix update
Advisory ID: RHSA-2017:3463-01
Product: Red Hat Developer Tools
Advisory URL: https://access.redhat.com/errata/RHSA-2017:3463
Issue date: 2017-12-14
CVE Names: CVE-2017-15041 CVE-2017-15042
=====================================================================
1. Summary:
An update for go-toolset-7 and go-toolset-7-golang is now available for Red
Hat Developer Tools.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
3. Description:
Go Toolset provides the Go programming language tools and libraries. Go is
alternatively known as golang.
Security Fix(es):
* An arbitrary command execution flaw was found in the way Go's "go get"
command handled the checkout of source code repositories. A remote attacker
capable of hosting malicious repositories could potentially use this flaw
to cause arbitrary command execution on the client side. (CVE-2017-15041)
* It was found that smtp.PlainAuth authentication scheme in Go did not
verify the TLS requirement properly. A remote man-in-the-middle attacker
could potentially use this flaw to sniff SMTP credentials sent by a Go
application. (CVE-2017-15042)
Bug Fix(es):
* Previously, the enable script for the go-toolset-7 Software Collection
incorrectly set the GOPATH environment variable to a directory that
required root permissions for write operations. As a consequence, the go
compiler terminated unexpectedly when performing certain commands. The
enable script has been changed to handle GOPATH correctly, and the
described problem no longer occurs. (BZ#1512013)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1498867 - CVE-2017-15042 golang: smtp.PlainAuth susceptible to man-in-the-middle password harvesting
1498870 - CVE-2017-15041 golang: arbitrary code execution during "go get" or "go get -d"
6. Package List:
Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7):
Source:
go-toolset-7-1.8-10.el7.src.rpm
go-toolset-7-golang-1.8.5-1.el7.src.rpm
aarch64:
go-toolset-7-1.8-10.el7.aarch64.rpm
go-toolset-7-build-1.8-10.el7.aarch64.rpm
go-toolset-7-dockerfiles-1.8-10.el7.aarch64.rpm
go-toolset-7-golang-1.8.5-1.el7.aarch64.rpm
go-toolset-7-golang-bin-1.8.5-1.el7.aarch64.rpm
go-toolset-7-runtime-1.8-10.el7.aarch64.rpm
go-toolset-7-scldevel-1.8-10.el7.aarch64.rpm
noarch:
go-toolset-7-golang-docs-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-misc-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-src-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-tests-1.8.5-1.el7.noarch.rpm
ppc64le:
go-toolset-7-1.8-10.el7.ppc64le.rpm
go-toolset-7-build-1.8-10.el7.ppc64le.rpm
go-toolset-7-dockerfiles-1.8-10.el7.ppc64le.rpm
go-toolset-7-golang-1.8.5-1.el7.ppc64le.rpm
go-toolset-7-golang-bin-1.8.5-1.el7.ppc64le.rpm
go-toolset-7-runtime-1.8-10.el7.ppc64le.rpm
go-toolset-7-scldevel-1.8-10.el7.ppc64le.rpm
s390x:
go-toolset-7-1.8-10.el7.s390x.rpm
go-toolset-7-build-1.8-10.el7.s390x.rpm
go-toolset-7-dockerfiles-1.8-10.el7.s390x.rpm
go-toolset-7-golang-1.8.5-1.el7.s390x.rpm
go-toolset-7-golang-bin-1.8.5-1.el7.s390x.rpm
go-toolset-7-runtime-1.8-10.el7.s390x.rpm
go-toolset-7-scldevel-1.8-10.el7.s390x.rpm
x86_64:
go-toolset-7-1.8-10.el7.x86_64.rpm
go-toolset-7-build-1.8-10.el7.x86_64.rpm
go-toolset-7-dockerfiles-1.8-10.el7.x86_64.rpm
go-toolset-7-golang-1.8.5-1.el7.x86_64.rpm
go-toolset-7-golang-bin-1.8.5-1.el7.x86_64.rpm
go-toolset-7-golang-race-1.8.5-1.el7.x86_64.rpm
go-toolset-7-runtime-1.8-10.el7.x86_64.rpm
go-toolset-7-scldevel-1.8-10.el7.x86_64.rpm
Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7):
Source:
go-toolset-7-1.8-10.el7.src.rpm
go-toolset-7-golang-1.8.5-1.el7.src.rpm
noarch:
go-toolset-7-golang-docs-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-misc-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-src-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-tests-1.8.5-1.el7.noarch.rpm
x86_64:
go-toolset-7-1.8-10.el7.x86_64.rpm
go-toolset-7-build-1.8-10.el7.x86_64.rpm
go-toolset-7-dockerfiles-1.8-10.el7.x86_64.rpm
go-toolset-7-golang-1.8.5-1.el7.x86_64.rpm
go-toolset-7-golang-bin-1.8.5-1.el7.x86_64.rpm
go-toolset-7-golang-race-1.8.5-1.el7.x86_64.rpm
go-toolset-7-runtime-1.8-10.el7.x86_64.rpm
go-toolset-7-scldevel-1.8-10.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2017-15041
https://access.redhat.com/security/cve/CVE-2017-15042
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFaMmHEXlSAg2UNWIIRAtZjAJ9srhfNxYLuSgYYm8Y6qbzwmT4utACgmGNX
yVgtQCnlhldbA+Pwmb1Vly0=
=q+4n
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce