ESB-2017.3202 - [UNIX/Linux][RedHat] go-toolset: Multiple vulnerabilities 2017-12-15

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.3202
Moderate: go-toolset-7 and go-toolset-7-golang security and bug fix update
                             15 December 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           go-toolset
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Access Privileged Data          -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-15042 CVE-2017-15041 

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2017:3463

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Red Hat. It is recommended that administrators
         running go-toolset check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: go-toolset-7 and go-toolset-7-golang security and bug fix update
Advisory ID:       RHSA-2017:3463-01
Product:           Red Hat Developer Tools
Advisory URL:      https://access.redhat.com/errata/RHSA-2017:3463
Issue date:        2017-12-14
CVE Names:         CVE-2017-15041 CVE-2017-15042 
=====================================================================

1. Summary:

An update for go-toolset-7 and go-toolset-7-golang is now available for Red
Hat Developer Tools.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64

3. Description:

Go Toolset provides the Go programming language tools and libraries. Go is
alternatively known as golang.

Security Fix(es):

* An arbitrary command execution flaw was found in the way Go's "go get"
command handled the checkout of source code repositories. A remote attacker
capable of hosting malicious repositories could potentially use this flaw
to cause arbitrary command execution on the client side. (CVE-2017-15041)

* It was found that smtp.PlainAuth authentication scheme in Go did not
verify the TLS requirement properly. A remote man-in-the-middle attacker
could potentially use this flaw to sniff SMTP credentials sent by a Go
application. (CVE-2017-15042)

Bug Fix(es):

* Previously, the enable script for the go-toolset-7 Software Collection
incorrectly set the GOPATH environment variable to a directory that
required root permissions for write operations. As a consequence, the go
compiler terminated unexpectedly when performing certain commands. The
enable script has been changed to handle GOPATH correctly, and the
described problem no longer occurs. (BZ#1512013)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1498867 - CVE-2017-15042 golang: smtp.PlainAuth susceptible to man-in-the-middle password harvesting
1498870 - CVE-2017-15041 golang: arbitrary code execution during "go get" or "go get -d"

6. Package List:

Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7):

Source:
go-toolset-7-1.8-10.el7.src.rpm
go-toolset-7-golang-1.8.5-1.el7.src.rpm

aarch64:
go-toolset-7-1.8-10.el7.aarch64.rpm
go-toolset-7-build-1.8-10.el7.aarch64.rpm
go-toolset-7-dockerfiles-1.8-10.el7.aarch64.rpm
go-toolset-7-golang-1.8.5-1.el7.aarch64.rpm
go-toolset-7-golang-bin-1.8.5-1.el7.aarch64.rpm
go-toolset-7-runtime-1.8-10.el7.aarch64.rpm
go-toolset-7-scldevel-1.8-10.el7.aarch64.rpm

noarch:
go-toolset-7-golang-docs-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-misc-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-src-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-tests-1.8.5-1.el7.noarch.rpm

ppc64le:
go-toolset-7-1.8-10.el7.ppc64le.rpm
go-toolset-7-build-1.8-10.el7.ppc64le.rpm
go-toolset-7-dockerfiles-1.8-10.el7.ppc64le.rpm
go-toolset-7-golang-1.8.5-1.el7.ppc64le.rpm
go-toolset-7-golang-bin-1.8.5-1.el7.ppc64le.rpm
go-toolset-7-runtime-1.8-10.el7.ppc64le.rpm
go-toolset-7-scldevel-1.8-10.el7.ppc64le.rpm

s390x:
go-toolset-7-1.8-10.el7.s390x.rpm
go-toolset-7-build-1.8-10.el7.s390x.rpm
go-toolset-7-dockerfiles-1.8-10.el7.s390x.rpm
go-toolset-7-golang-1.8.5-1.el7.s390x.rpm
go-toolset-7-golang-bin-1.8.5-1.el7.s390x.rpm
go-toolset-7-runtime-1.8-10.el7.s390x.rpm
go-toolset-7-scldevel-1.8-10.el7.s390x.rpm

x86_64:
go-toolset-7-1.8-10.el7.x86_64.rpm
go-toolset-7-build-1.8-10.el7.x86_64.rpm
go-toolset-7-dockerfiles-1.8-10.el7.x86_64.rpm
go-toolset-7-golang-1.8.5-1.el7.x86_64.rpm
go-toolset-7-golang-bin-1.8.5-1.el7.x86_64.rpm
go-toolset-7-golang-race-1.8.5-1.el7.x86_64.rpm
go-toolset-7-runtime-1.8-10.el7.x86_64.rpm
go-toolset-7-scldevel-1.8-10.el7.x86_64.rpm

Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7):

Source:
go-toolset-7-1.8-10.el7.src.rpm
go-toolset-7-golang-1.8.5-1.el7.src.rpm

noarch:
go-toolset-7-golang-docs-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-misc-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-src-1.8.5-1.el7.noarch.rpm
go-toolset-7-golang-tests-1.8.5-1.el7.noarch.rpm

x86_64:
go-toolset-7-1.8-10.el7.x86_64.rpm
go-toolset-7-build-1.8-10.el7.x86_64.rpm
go-toolset-7-dockerfiles-1.8-10.el7.x86_64.rpm
go-toolset-7-golang-1.8.5-1.el7.x86_64.rpm
go-toolset-7-golang-bin-1.8.5-1.el7.x86_64.rpm
go-toolset-7-golang-race-1.8.5-1.el7.x86_64.rpm
go-toolset-7-runtime-1.8-10.el7.x86_64.rpm
go-toolset-7-scldevel-1.8-10.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-15041
https://access.redhat.com/security/cve/CVE-2017-15042
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFaMmHEXlSAg2UNWIIRAtZjAJ9srhfNxYLuSgYYm8Y6qbzwmT4utACgmGNX
yVgtQCnlhldbA+Pwmb1Vly0=
=q+4n
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=SVWd
-----END PGP SIGNATURE-----

« Back to bulletins