Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-39320 (GCVE-0-2023-39320)
Vulnerability from cvelistv5
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Go toolchain | cmd/go |
Version: 1.21.0-0 ≤ |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:02:06.849Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://go.dev/issue/62198"
},
{
"tags": [
"x_transferred"
],
"url": "https://go.dev/cl/526158"
},
{
"tags": [
"x_transferred"
],
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"tags": [
"x_transferred"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2042"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20231020-0004/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-39320",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-26T17:28:10.391044Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-26T17:28:41.807Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "cmd/go",
"product": "cmd/go",
"vendor": "Go toolchain",
"versions": [
{
"lessThan": "1.21.1",
"status": "affected",
"version": "1.21.0-0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
],
"descriptions": [
{
"lang": "en",
"value": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-25T11:10:00.880Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/issue/62198"
},
{
"url": "https://go.dev/cl/526158"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2042"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0004/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"title": "Arbitrary code execution via go.mod toolchain directive in cmd/go"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2023-39320",
"datePublished": "2023-09-08T16:13:26.609Z",
"dateReserved": "2023-07-27T17:05:55.186Z",
"dateUpdated": "2025-02-13T17:02:48.022Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-39320\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2023-09-08T17:15:27.977\",\"lastModified\":\"2024-11-21T08:15:09.017\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \\\"go\\\" command was executed within the module. This applies to modules downloaded using the \\\"go\\\" command from the module proxy, as well as modules downloaded directly using VCS software.\"},{\"lang\":\"es\",\"value\":\"La directiva de cadena de herramientas go.mod, introducida en Go 1.21, se puede aprovechar para ejecutar scripts y binarios relativos a la ra\u00edz del m\u00f3dulo cuando el comando \\\"go\\\" se ejecut\u00f3 dentro del m\u00f3dulo. Esto se aplica a los m\u00f3dulos descargados utilizando el comando \\\"go\\\" desde el proxy del m\u00f3dulo, as\u00ed como a los m\u00f3dulos descargados directamente mediante el software VCS.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.21.0\",\"versionEndExcluding\":\"1.21.1\",\"matchCriteriaId\":\"958E1BA0-2840-47E9-A790-79C10164C68C\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/526158\",\"source\":\"security@golang.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://go.dev/issue/62198\",\"source\":\"security@golang.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ\",\"source\":\"security@golang.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2023-2042\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202311-09\",\"source\":\"security@golang.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20231020-0004/\",\"source\":\"security@golang.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://go.dev/cl/526158\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://go.dev/issue/62198\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2023-2042\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202311-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20231020-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://go.dev/issue/62198\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://go.dev/cl/526158\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://pkg.go.dev/vuln/GO-2023-2042\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20231020-0004/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202311-09\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T18:02:06.849Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-39320\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-26T17:28:10.391044Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-26T17:28:25.941Z\"}}], \"cna\": {\"title\": \"Arbitrary code execution via go.mod toolchain directive in cmd/go\", \"credits\": [{\"lang\": \"en\", \"value\": \"Juho Nurminen of Mattermost\"}], \"affected\": [{\"vendor\": \"Go toolchain\", \"product\": \"cmd/go\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.21.0-0\", \"lessThan\": \"1.21.1\", \"versionType\": \"semver\"}], \"packageName\": \"cmd/go\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://go.dev/issue/62198\"}, {\"url\": \"https://go.dev/cl/526158\"}, {\"url\": \"https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2023-2042\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20231020-0004/\"}, {\"url\": \"https://security.gentoo.org/glsa/202311-09\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \\\"go\\\" command was executed within the module. This applies to modules downloaded using the \\\"go\\\" command from the module proxy, as well as modules downloaded directly using VCS software.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2023-11-25T11:10:00.880Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-39320\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T17:02:48.022Z\", \"dateReserved\": \"2023-07-27T17:05:55.186Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2023-09-08T16:13:26.609Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
fkie_cve-2023-39320
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| security@golang.org | https://go.dev/cl/526158 | Patch | |
| security@golang.org | https://go.dev/issue/62198 | Issue Tracking | |
| security@golang.org | https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ | Release Notes | |
| security@golang.org | https://pkg.go.dev/vuln/GO-2023-2042 | Vendor Advisory | |
| security@golang.org | https://security.gentoo.org/glsa/202311-09 | ||
| security@golang.org | https://security.netapp.com/advisory/ntap-20231020-0004/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://go.dev/cl/526158 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://go.dev/issue/62198 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ | Release Notes | |
| af854a3a-2127-422b-91ae-364da2661108 | https://pkg.go.dev/vuln/GO-2023-2042 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202311-09 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20231020-0004/ | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "958E1BA0-2840-47E9-A790-79C10164C68C",
"versionEndExcluding": "1.21.1",
"versionStartIncluding": "1.21.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software."
},
{
"lang": "es",
"value": "La directiva de cadena de herramientas go.mod, introducida en Go 1.21, se puede aprovechar para ejecutar scripts y binarios relativos a la ra\u00edz del m\u00f3dulo cuando el comando \"go\" se ejecut\u00f3 dentro del m\u00f3dulo. Esto se aplica a los m\u00f3dulos descargados utilizando el comando \"go\" desde el proxy del m\u00f3dulo, as\u00ed como a los m\u00f3dulos descargados directamente mediante el software VCS."
}
],
"id": "CVE-2023-39320",
"lastModified": "2024-11-21T08:15:09.017",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-09-08T17:15:27.977",
"references": [
{
"source": "security@golang.org",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/526158"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking"
],
"url": "https://go.dev/issue/62198"
},
{
"source": "security@golang.org",
"tags": [
"Release Notes"
],
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2042"
},
{
"source": "security@golang.org",
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20231020-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/526158"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://go.dev/issue/62198"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2042"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20231020-0004/"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2024-AVI-0878
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.2.x antérieures à 9.2.3 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.1.x antérieures à 9.1.6 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.3.x antérieures à 9.3.1 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.208 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.205 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2403.x antérieures à 9.2.2403.108 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Entreprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.208",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.205",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2403.x ant\u00e9rieures \u00e0 9.2.2403.108",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2017-14159",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14159"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2020-36230",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
},
{
"name": "CVE-2024-45733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45733"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2020-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
},
{
"name": "CVE-2024-45731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45731"
},
{
"name": "CVE-2019-13057",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13057"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-29401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29401"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2015-3276",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3276"
},
{
"name": "CVE-2020-36225",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
},
{
"name": "CVE-2024-45739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45739"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2020-36224",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2021-27212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27212"
},
{
"name": "CVE-2020-36228",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
},
{
"name": "CVE-2020-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2020-15719",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15719"
},
{
"name": "CVE-2024-45740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45740"
},
{
"name": "CVE-2024-45736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45736"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-39320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
},
{
"name": "CVE-2017-17740",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17740"
},
{
"name": "CVE-2024-45741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45741"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2020-36223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-45737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45737"
},
{
"name": "CVE-2020-36229",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-45732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45732"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-45735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45735"
},
{
"name": "CVE-2023-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50658"
},
{
"name": "CVE-2023-47108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47108"
},
{
"name": "CVE-2023-26125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26125"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-45738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45738"
},
{
"name": "CVE-2020-36226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
},
{
"name": "CVE-2020-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2022-42969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42969"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2019-13565",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-45734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45734"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
}
],
"initial_release_date": "2024-10-15T00:00:00",
"last_revision_date": "2024-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0878",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1008",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1008"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1005",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1005"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1006",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1006"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1002",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1002"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1003",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1003"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1007",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1007"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1004",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1004"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1010",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1010"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1011",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1011"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1012",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1012"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1009",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1009"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1001",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1001"
}
]
}
CERTFR-2024-AVI-0646
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Storage Protect | Storage Protect Plus Server versions 10.1.x antérieures à 10.1.16.2 | ||
| IBM | WebSphere | WebSphere Application Server Liberty versions antérieures à 24.0.0.5 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier openssl.base versions antérieures à 3.0.13.1000 | ||
| IBM | WebSphere | WebSphere Application Server versions 8.5.x antérieures à 8.5.5.25 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 avec un fichier openssl.base versions antérieures à 1.1.1.2400 ou 3.0.13.1000 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.x antérieures à 9.0.5.20 | ||
| IBM | N/A | Sterling Control Center versions 6.3.0 antérieures à 6.3.0.0 iFix06 | ||
| IBM | N/A | Sterling Control Center versions 6.2.1 antérieures à 6.2.1.0 iFix13 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 avec un fichier openssl.base versions antérieures à 1.1.1.2400 ou 3.0.13.1000 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.0.x antérieures à 7.5.0 UP9 IF01 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Storage Protect Plus Server versions 10.1.x ant\u00e9rieures \u00e0 10.1.16.2",
"product": {
"name": "Storage Protect",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server Liberty versions ant\u00e9rieures \u00e0 24.0.0.5 ",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un fichier openssl.base versions ant\u00e9rieures \u00e0 3.0.13.1000",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.25",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 avec un fichier openssl.base versions ant\u00e9rieures \u00e0 1.1.1.2400 ou 3.0.13.1000",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.0.x ant\u00e9rieures \u00e0 9.0.5.20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.0 ant\u00e9rieures \u00e0 6.3.0.0 iFix06",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.2.1 ant\u00e9rieures \u00e0 6.2.1.0 iFix13",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 avec un fichier openssl.base versions ant\u00e9rieures \u00e0 1.1.1.2400 ou 3.0.13.1000",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0.x ant\u00e9rieures \u00e0 7.5.0 UP9 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2024-27059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27059"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2024-26897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
},
{
"name": "CVE-2021-47055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47055"
},
{
"name": "CVE-2024-35154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35154"
},
{
"name": "CVE-2020-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2021-47185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47185"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2024-23650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23650"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2024-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3652"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26643"
},
{
"name": "CVE-2024-26779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-32021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32021"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
},
{
"name": "CVE-2024-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2024-27048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27048"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2023-39320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2021-47171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47171"
},
{
"name": "CVE-2024-26743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26743"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2024-32004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32004"
},
{
"name": "CVE-2021-47118",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47118"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-32020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32020"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2019-20372",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20372"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-32487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2021-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47153"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2024-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2357"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-26919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26919"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-1394",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1394"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2024-32465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32465"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2021-46934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26693"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-26872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26872"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2024-26744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26744"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2022-48669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48669"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2024-26694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26694"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2018-25091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25091"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
}
],
"initial_release_date": "2024-08-02T00:00:00",
"last_revision_date": "2024-08-02T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0646",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7161679",
"url": "https://www.ibm.com/support/pages/node/7161679"
},
{
"published_at": "2024-07-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7161667",
"url": "https://www.ibm.com/support/pages/node/7161667"
},
{
"published_at": "2024-07-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7161954",
"url": "https://www.ibm.com/support/pages/node/7161954"
},
{
"published_at": "2024-07-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7162032",
"url": "https://www.ibm.com/support/pages/node/7162032"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160144",
"url": "https://www.ibm.com/support/pages/node/7160144"
},
{
"published_at": "2024-07-31",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7162077",
"url": "https://www.ibm.com/support/pages/node/7162077"
}
]
}
CERTFR-2025-AVI-0283
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu Greenplum. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum Platform Extension Framework versions antérieures à 6.11.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 6.29.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum Platform Extension Framework versions ant\u00e9rieures \u00e0 6.11.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.29.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3792"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2023-39320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2022-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2018-1282",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1282"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
}
],
"initial_release_date": "2025-04-08T00:00:00",
"last_revision_date": "2025-04-10T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0283",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-08T00:00:00.000000"
},
{
"description": "Correction d\u0027une erreur dans le r\u00e9sum\u00e9",
"revision_date": "2025-04-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu Greenplum. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu Greenplum",
"vendor_advisories": [
{
"published_at": "2025-04-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 25580",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25580"
},
{
"published_at": "2025-04-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 25581",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25581"
}
]
}
suse-su-2023:4469-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.21-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.21-openssl fixes the following issues:\n\nUpdate to version 1.21.4.1 cut from the go1.21-openssl-fips\nbranch at the revision tagged go1.21.4-1-openssl-fips.\n\n* Update to go1.21.4\n\n\ngo1.21.4 (released 2023-11-07) includes security fixes to the\npath/filepath package, as well as bug fixes to the linker, the\nruntime, the compiler, and the go/types, net/http, and\nruntime/cgo packages.\n\n* security: fix CVE-2023-45283 CVE-2023-45284 path/filepath: insecure parsing of Windows paths (bsc#1216943, bsc#1216944)\n* spec: update unification rules\n* cmd/compile: internal compiler error: expected struct value to have type struct\n* cmd/link: split text sections for arm 32-bit\n* runtime: MADV_COLLAPSE causes production performance issues on Linux\n* go/types, x/tools/go/ssa: panic: type param without replacement encountered\n* cmd/compile: -buildmode=c-archive produces code not suitable for use in a shared object on arm64\n* net/http: http2 page fails on firefox/safari if pushing resources\n\n\nInitial package go1.21-openssl version 1.21.3.1 cut from the\ngo1.21-openssl-fips branch at the revision tagged\ngo1.21.3-1-openssl-fips. (jsc#SLE-18320)\n\n* Go upstream merged branch dev.boringcrypto in go1.19+.\n* In go1.x enable BoringCrypto via GOEXPERIMENT=boringcrypto.\n* In go1.x-openssl enable FIPS mode (or boring mode as the\n package is named) either via an environment variable\n GOLANG_FIPS=1 or by virtue of booting the host in FIPS mode.\n* When the operating system is operating in FIPS mode, Go\n applications which import crypto/tls/fipsonly limit operations\n to the FIPS ciphersuite.\n* go1.x-openssl is delivered as two large patches to go1.x\n applying necessary modifications from the golang-fips/go GitHub\n project for the Go crypto library to use OpenSSL as the\n external cryptographic library in a FIPS compliant way.\n* go1.x-openssl modifies the crypto/* packages to use OpenSSL for\n cryptographic operations.\n* go1.x-openssl uses dlopen() to call into OpenSSL.\n* SUSE RPM packaging introduces a fourth version digit go1.x.y.z\n corresponding to the golang-fips/go patchset tagged revision.\n* Patchset improvements can be updated independently of upstream\n Go maintenance releases.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4469,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4469,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4469,openSUSE-SLE-15.4-2023-4469,openSUSE-SLE-15.5-2023-4469",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4469-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4469-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234469-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4469-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html"
},
{
"category": "self",
"summary": "SUSE Bug 1212475",
"url": "https://bugzilla.suse.com/1212475"
},
{
"category": "self",
"summary": "SUSE Bug 1212667",
"url": "https://bugzilla.suse.com/1212667"
},
{
"category": "self",
"summary": "SUSE Bug 1212669",
"url": "https://bugzilla.suse.com/1212669"
},
{
"category": "self",
"summary": "SUSE Bug 1215084",
"url": "https://bugzilla.suse.com/1215084"
},
{
"category": "self",
"summary": "SUSE Bug 1215085",
"url": "https://bugzilla.suse.com/1215085"
},
{
"category": "self",
"summary": "SUSE Bug 1215086",
"url": "https://bugzilla.suse.com/1215086"
},
{
"category": "self",
"summary": "SUSE Bug 1215087",
"url": "https://bugzilla.suse.com/1215087"
},
{
"category": "self",
"summary": "SUSE Bug 1215090",
"url": "https://bugzilla.suse.com/1215090"
},
{
"category": "self",
"summary": "SUSE Bug 1215985",
"url": "https://bugzilla.suse.com/1215985"
},
{
"category": "self",
"summary": "SUSE Bug 1216109",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "self",
"summary": "SUSE Bug 1216943",
"url": "https://bugzilla.suse.com/1216943"
},
{
"category": "self",
"summary": "SUSE Bug 1216944",
"url": "https://bugzilla.suse.com/1216944"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39318 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39319 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39320 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39321 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39322 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39325 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-44487 page",
"url": "https://www.suse.com/security/cve/CVE-2023-44487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45283 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45284 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45284/"
}
],
"title": "Security update for go1.21-openssl",
"tracking": {
"current_release_date": "2023-11-16T17:59:49Z",
"generator": {
"date": "2023-11-16T17:59:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4469-1",
"initial_release_date": "2023-11-16T17:59:49Z",
"revision_history": [
{
"date": "2023-11-16T17:59:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"product": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"product_id": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"product": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"product_id": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"product": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"product_id": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.i586",
"product": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.i586",
"product_id": "go1.21-openssl-1.21.4.1-150000.1.5.1.i586"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.i586",
"product": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.i586",
"product_id": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"product": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"product_id": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"product": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"product_id": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"product": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"product_id": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"product": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"product_id": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"product": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"product_id": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"product": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"product_id": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"product": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"product_id": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"product": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"product_id": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"product": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"product_id": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39318"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39318",
"url": "https://www.suse.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "SUSE Bug 1215084 for CVE-2023-39318",
"url": "https://bugzilla.suse.com/1215084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "moderate"
}
],
"title": "CVE-2023-39318"
},
{
"cve": "CVE-2023-39319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39319"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39319",
"url": "https://www.suse.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "SUSE Bug 1215085 for CVE-2023-39319",
"url": "https://bugzilla.suse.com/1215085"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "moderate"
}
],
"title": "CVE-2023-39319"
},
{
"cve": "CVE-2023-39320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39320"
}
],
"notes": [
{
"category": "general",
"text": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39320",
"url": "https://www.suse.com/security/cve/CVE-2023-39320"
},
{
"category": "external",
"summary": "SUSE Bug 1215086 for CVE-2023-39320",
"url": "https://bugzilla.suse.com/1215086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-39320"
},
{
"cve": "CVE-2023-39321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39321"
}
],
"notes": [
{
"category": "general",
"text": "Processing an incomplete post-handshake message for a QUIC connection can cause a panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39321",
"url": "https://www.suse.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "SUSE Bug 1215087 for CVE-2023-39321",
"url": "https://bugzilla.suse.com/1215087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-39321"
},
{
"cve": "CVE-2023-39322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39322"
}
],
"notes": [
{
"category": "general",
"text": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39322",
"url": "https://www.suse.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "SUSE Bug 1215087 for CVE-2023-39322",
"url": "https://bugzilla.suse.com/1215087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-39322"
},
{
"cve": "CVE-2023-39323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39323"
}
],
"notes": [
{
"category": "general",
"text": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39323",
"url": "https://www.suse.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "SUSE Bug 1215985 for CVE-2023-39323",
"url": "https://bugzilla.suse.com/1215985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-39323"
},
{
"cve": "CVE-2023-39325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39325"
}
],
"notes": [
{
"category": "general",
"text": "A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39325",
"url": "https://www.suse.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "SUSE Bug 1216109 for CVE-2023-39325",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "external",
"summary": "SUSE Bug 1230323 for CVE-2023-39325",
"url": "https://bugzilla.suse.com/1230323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-39325"
},
{
"cve": "CVE-2023-44487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-44487"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-44487",
"url": "https://www.suse.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "SUSE Bug 1216109 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "external",
"summary": "SUSE Bug 1216123 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216123"
},
{
"category": "external",
"summary": "SUSE Bug 1216169 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216169"
},
{
"category": "external",
"summary": "SUSE Bug 1216171 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216171"
},
{
"category": "external",
"summary": "SUSE Bug 1216174 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216174"
},
{
"category": "external",
"summary": "SUSE Bug 1216176 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216176"
},
{
"category": "external",
"summary": "SUSE Bug 1216181 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216181"
},
{
"category": "external",
"summary": "SUSE Bug 1216182 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216182"
},
{
"category": "external",
"summary": "SUSE Bug 1216190 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45283"
}
],
"notes": [
{
"category": "general",
"text": "The filepath package does not recognize paths with a \\??\\ prefix as special. On Windows, a path beginning with \\??\\ is a Root Local Device path equivalent to a path beginning with \\\\?\\. Paths with a \\??\\ prefix may be used to access arbitrary locations on the system. For example, the path \\??\\c:\\x is equivalent to the more common path c:\\x. Before fix, Clean could convert a rooted path such as \\a\\..\\??\\b into the root local device path \\??\\b. Clean will now convert this to .\\??\\b. Similarly, Join(\\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \\??\\b. Join will now convert this to \\.\\??\\b. In addition, with fix, IsAbs now correctly reports paths beginning with \\??\\ as absolute, and VolumeName correctly reports the \\??\\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \\?, resulting in filepath.Clean(\\?\\c:) returning \\?\\c: rather than \\?\\c:\\ (among other effects). The previous behavior has been restored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45283",
"url": "https://www.suse.com/security/cve/CVE-2023-45283"
},
{
"category": "external",
"summary": "SUSE Bug 1216943 for CVE-2023-45283",
"url": "https://bugzilla.suse.com/1216943"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "moderate"
}
],
"title": "CVE-2023-45283"
},
{
"cve": "CVE-2023-45284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45284"
}
],
"notes": [
{
"category": "general",
"text": "On Windows, The IsLocal function does not correctly detect reserved device names in some cases. Reserved names followed by spaces, such as \"COM1 \", and reserved names \"COM\" and \"LPT\" followed by superscript 1, 2, or 3, are incorrectly reported as local. With fix, IsLocal now correctly reports these names as non-local.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45284",
"url": "https://www.suse.com/security/cve/CVE-2023-45284"
},
{
"category": "external",
"summary": "SUSE Bug 1216944 for CVE-2023-45284",
"url": "https://bugzilla.suse.com/1216944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "moderate"
}
],
"title": "CVE-2023-45284"
}
]
}
suse-su-2023:3701-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.21",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.21 fixes the following issues:\n\nUpdate to go1.21.1 (bsc#1212475).\n\n- CVE-2023-39318: Fixed improper handling of HTML-like comments within script contexts in html/template (bsc#1215084).\n- CVE-2023-39319: Fixed improper handling of special tags within script contexts in html/template (bsc#1215085).\n- CVE-2023-39320: Fixed arbitrary execution in go.mod toolchain directive (bsc#1215086).\n- CVE-2023-39321, CVE-2023-39322: Fixed a panic when processing post-handshake message on QUIC connections in crypto/tls (bsc#1215087).\n\nThe following non-security bug was fixed:\n\n- Add missing directory pprof html asset directory to package (bsc#1215090).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-3701,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3701,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3701,openSUSE-SLE-15.4-2023-3701,openSUSE-SLE-15.5-2023-3701",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3701-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:3701-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233701-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:3701-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-September/031567.html"
},
{
"category": "self",
"summary": "SUSE Bug 1212475",
"url": "https://bugzilla.suse.com/1212475"
},
{
"category": "self",
"summary": "SUSE Bug 1215084",
"url": "https://bugzilla.suse.com/1215084"
},
{
"category": "self",
"summary": "SUSE Bug 1215085",
"url": "https://bugzilla.suse.com/1215085"
},
{
"category": "self",
"summary": "SUSE Bug 1215086",
"url": "https://bugzilla.suse.com/1215086"
},
{
"category": "self",
"summary": "SUSE Bug 1215087",
"url": "https://bugzilla.suse.com/1215087"
},
{
"category": "self",
"summary": "SUSE Bug 1215090",
"url": "https://bugzilla.suse.com/1215090"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39318 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39319 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39320 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39321 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39322 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39322/"
}
],
"title": "Security update for go1.21",
"tracking": {
"current_release_date": "2023-09-20T09:19:18Z",
"generator": {
"date": "2023-09-20T09:19:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:3701-1",
"initial_release_date": "2023-09-20T09:19:18Z",
"revision_history": [
{
"date": "2023-09-20T09:19:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.1-150000.1.6.1.aarch64",
"product": {
"name": "go1.21-1.21.1-150000.1.6.1.aarch64",
"product_id": "go1.21-1.21.1-150000.1.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"product": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"product_id": "go1.21-doc-1.21.1-150000.1.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.1-150000.1.6.1.aarch64",
"product": {
"name": "go1.21-race-1.21.1-150000.1.6.1.aarch64",
"product_id": "go1.21-race-1.21.1-150000.1.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.1-150000.1.6.1.i586",
"product": {
"name": "go1.21-1.21.1-150000.1.6.1.i586",
"product_id": "go1.21-1.21.1-150000.1.6.1.i586"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.1-150000.1.6.1.i586",
"product": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.i586",
"product_id": "go1.21-doc-1.21.1-150000.1.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.1-150000.1.6.1.ppc64le",
"product": {
"name": "go1.21-1.21.1-150000.1.6.1.ppc64le",
"product_id": "go1.21-1.21.1-150000.1.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"product": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"product_id": "go1.21-doc-1.21.1-150000.1.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"product": {
"name": "go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"product_id": "go1.21-race-1.21.1-150000.1.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.1-150000.1.6.1.s390x",
"product": {
"name": "go1.21-1.21.1-150000.1.6.1.s390x",
"product_id": "go1.21-1.21.1-150000.1.6.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.1-150000.1.6.1.s390x",
"product": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.s390x",
"product_id": "go1.21-doc-1.21.1-150000.1.6.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.1-150000.1.6.1.s390x",
"product": {
"name": "go1.21-race-1.21.1-150000.1.6.1.s390x",
"product_id": "go1.21-race-1.21.1-150000.1.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.1-150000.1.6.1.x86_64",
"product": {
"name": "go1.21-1.21.1-150000.1.6.1.x86_64",
"product_id": "go1.21-1.21.1-150000.1.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"product": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"product_id": "go1.21-doc-1.21.1-150000.1.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.1-150000.1.6.1.x86_64",
"product": {
"name": "go1.21-race-1.21.1-150000.1.6.1.x86_64",
"product_id": "go1.21-race-1.21.1-150000.1.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-150000.1.6.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-150000.1.6.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-150000.1.6.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.21-race-1.21.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39318"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39318",
"url": "https://www.suse.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "SUSE Bug 1215084 for CVE-2023-39318",
"url": "https://bugzilla.suse.com/1215084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-20T09:19:18Z",
"details": "moderate"
}
],
"title": "CVE-2023-39318"
},
{
"cve": "CVE-2023-39319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39319"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39319",
"url": "https://www.suse.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "SUSE Bug 1215085 for CVE-2023-39319",
"url": "https://bugzilla.suse.com/1215085"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-20T09:19:18Z",
"details": "moderate"
}
],
"title": "CVE-2023-39319"
},
{
"cve": "CVE-2023-39320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39320"
}
],
"notes": [
{
"category": "general",
"text": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39320",
"url": "https://www.suse.com/security/cve/CVE-2023-39320"
},
{
"category": "external",
"summary": "SUSE Bug 1215086 for CVE-2023-39320",
"url": "https://bugzilla.suse.com/1215086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-20T09:19:18Z",
"details": "important"
}
],
"title": "CVE-2023-39320"
},
{
"cve": "CVE-2023-39321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39321"
}
],
"notes": [
{
"category": "general",
"text": "Processing an incomplete post-handshake message for a QUIC connection can cause a panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39321",
"url": "https://www.suse.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "SUSE Bug 1215087 for CVE-2023-39321",
"url": "https://bugzilla.suse.com/1215087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-20T09:19:18Z",
"details": "important"
}
],
"title": "CVE-2023-39321"
},
{
"cve": "CVE-2023-39322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39322"
}
],
"notes": [
{
"category": "general",
"text": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39322",
"url": "https://www.suse.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "SUSE Bug 1215087 for CVE-2023-39322",
"url": "https://bugzilla.suse.com/1215087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.1-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-09-20T09:19:18Z",
"details": "important"
}
],
"title": "CVE-2023-39322"
}
]
}
opensuse-su-2023:0360-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.21",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update introduces go1.21, including fixes for the following issues:\n\n- go1.21.3 (released 2023-10-10) includes a security fix to the\n net/http package.\n Refs boo#1212475 go1.21 release tracking\n CVE-2023-39325 CVE-2023-44487\n * go#63427 go#63417 boo#1216109 security: fix CVE-2023-39325 CVE-2023-44487 net/http: rapid stream resets can cause excessive work\n\n- go1.21.2 (released 2023-10-05) includes one security fixes to the\n cmd/go package, as well as bug fixes to the compiler, the go\n command, the linker, the runtime, and the runtime/metrics\n package.\n Refs boo#1212475 go1.21 release tracking\n CVE-2023-39323\n * go#63214 go#63211 boo#1215985 security: fix CVE-2023-39323 cmd/go: line directives allows arbitrary execution during build\n * go#62464 runtime: \u0027traceback did not unwind completely\u0027\n * go#62478 runtime/metrics: /gc/scan* metrics return zero\n * go#62505 plugin: variable not initialized properly\n * go#62506 cmd/compile: internal compiler error: InvertFlags should never make it to codegen v100 = InvertFlags v123\n * go#62509 runtime: scheduler change causes Delve\u0027s function call injection to fail intermittently\n * go#62537 runtime: \u0027fatal: morestack on g0\u0027 with PGO enabled on arm64\n * go#62598 cmd/link: issues with Apple\u0027s new linker in Xcode 15 beta\n * go#62668 cmd/compile: slow to compile 17,000 line switch statement?\n * go#62711 cmd/go: TestScript/gotoolchain_path fails if golang.org/dl/go1.21.1 is installed in the user\u0027s $PATH\n\n- go1.21.1 (released 2023-09-06) includes four security fixes to\n the cmd/go, crypto/tls, and html/template packages, as well as\n bug fixes to the compiler, the go command, the linker, the\n runtime, and the context, crypto/tls, encoding/gob, encoding/xml,\n go/types, net/http, os, and path/filepath packages.\n Refs boo#1212475 go1.21 release tracking\n CVE-2023-39318 CVE-2023-39319 CVE-2023-39320 CVE-2023-39321 CVE-2023-39322\n * go#62290 go#62266 boo#1215087 security: fix CVE-2023-39321 CVE-2023-39322 crypto/tls: panic when processing partial post-handshake message in QUICConn.HandleData\n * go#62394 go#62198 boo#1215086 security: fix CVE-2023-39320 cmd/go: go.mod toolchain directive allows arbitrary execution\n * go#62396 go#62196 boo#1215084 security: fix CVE-2023-39318 html/template: improper handling of HTML-like comments within script contexts\n * go#62398 go#62197 boo#1215085 security: fix CVE-2023-39319 html/template: improper handling of special tags within script contexts\n * go#61743 go/types: interface.Complete panics for interfaces with duplicate methods\n * go#61781 cmd/compile: internal compiler error: \u0027f\u0027: value .autotmp_1 (nil) incorrectly live at entry\n * go#61818 cmd/go: panic: runtime error: index out of range [-1] in collectDepsErrors\n * go#61821 runtime/internal/wasitest: TestTCPEcho is racy\n * go#61868 path/filepath: Clean on some invalid Windows paths can lose .. components\n * go#61904 net/http: go 1.20.6 host validation breaks setting Host to a unix socket address\n * go#61905 cmd/go: go get/mod tidy panics with internal error: net token acquired but not released\n * go#61909 cmd/compile: internal compiler error: missed typecheck\n * go#61910 os: ReadDir fails on file systems without File ID support on Windows\n * go#61927 cmd/distpack: release archives don\u0027t include directory members\n * go#61930 spec, go/types, types2: restore Go 1.20 unification when compiling for Go 1.20\n * go#61932 go/types, types2: index out of range panic in Checker.arguments\n * go#61958 cmd/compile: write barrier code is sometimes preemptible when compiled with -N\n * go#61959 go/types, types2: panic: infinite recursion in unification with go1.21.0\n * go#61964 os: ReadDir(\\\\.\\pipe\\) fails with go1.21 on Windows\n * go#61967 crypto/tls: add GODEBUG to control max RSA key size\n * go#61987 runtime: simple programs crash on linux/386 with go1.21 when build with -gcflags=\u0027all=-N -l\u0027\n * go#62019 runtime: execution halts with goroutines stuck in runtime.gopark (protocol error E08 during memory read for packet)\n * go#62046 runtime/trace: segfault in runtime.fpTracebackPCs during deferred call after recovering from panic\n * go#62051 encoding/xml: incompatible changes in the Go 1.21.0\n * go#62057 cmd/compile: internal compiler error: \u0027F\u0027: func F, startMem[b1] has different values\n * go#62071 cmd/api: make non-importable\n * go#62140 cmd/link: slice bounds out of range\n * go#62143 hash/crc32: panic on arm64 with go1.21.0 when indexing slice\n * go#62144 cmd/go: locating GOROOT fails when the go command is run from the cross-compiled bin subdirectory\n * go#62154 encoding/gob: panic decoding into local type, received remote type\n * go#62189 context: misuse of sync.Cond in ExampleAfterFunc_cond\n * go#62204 maps: segfault in Clone\n * go#62205 cmd/compile: backward incompatible change in Go 1.21 type inference with channels\n * go#62222 cmd/go: \u0027go test -o\u0027 may fail with ETXTBSY when running the compiled test\n * go#62328 net/http: http client regression building with js/wasm and running on Chrome: net::ERR_H2_OR_QUIC_REQUIRED\n * go#62329 runtime: MADV_HUGEPAGE causes stalls when allocating memory\n\n- go1.21 (released 2023-08-08) is a major release of Go.\n go1.21.x minor releases will be provided through August 2024.\n https://github.com/golang/go/wiki/Go-Release-Cycle\n go1.21 arrives six months after go1.20. Most of its changes are\n in the implementation of the toolchain, runtime, and libraries.\n As always, the release maintains the Go 1 promise of\n compatibility. We expect almost all Go programs to continue to\n compile and run as before.\n Refs boo#1212475 go1.21 release tracking\n * Go 1.21 introduces a small change to the numbering of\n releases. In the past, we used Go 1.N to refer to both the\n overall Go language version and release family as well as the\n first release in that family. Starting in Go 1.21, the first\n release is now Go 1.N.0. Today we are releasing both the Go\n 1.21 language and its initial implementation, the Go 1.21.0\n release. These notes refer to \u0027Go 1.21\u0027; tools like go version\n will report \u0027go1.21.0\u0027 (until you upgrade to Go 1.21.1). See\n \u0027Go versions\u0027 in the \u0027Go Toolchains\u0027 documentation for details\n about the new version numbering.\n * Language change: Go 1.21 adds three new built-ins to the\n language.\n * Language change: The new functions min and max compute the\n smallest (or largest, for max) value of a fixed number of given\n arguments. See the language spec for details.\n * Language change: The new function clear deletes all elements\n from a map or zeroes all elements of a slice. See the language\n spec for details.\n * Package initialization order is now specified more\n precisely. This may change the behavior of some programs that\n rely on a specific initialization ordering that was not\n expressed by explicit imports. The behavior of such programs\n was not well defined by the spec in past releases. The new rule\n provides an unambiguous definition.\n * Multiple improvements that increase the power and precision of\n type inference have been made.\n * A (possibly partially instantiated generic) function may now be\n called with arguments that are themselves (possibly partially\n instantiated) generic functions.\n * Type inference now also considers methods when a value is\n assigned to an interface: type arguments for type parameters\n used in method signatures may be inferred from the\n corresponding parameter types of matching methods.\n * Similarly, since a type argument must implement all the methods\n of its corresponding constraint, the methods of the type\n argument and constraint are matched which may lead to the\n inference of additional type arguments.\n * If multiple untyped constant arguments of different kinds (such\n as an untyped int and an untyped floating-point constant) are\n passed to parameters with the same (not otherwise specified)\n type parameter type, instead of an error, now type inference\n determines the type using the same approach as an operator with\n untyped constant operands. This change brings the types\n inferred from untyped constant arguments in line with the types\n of constant expressions.\n * Type inference is now precise when matching corresponding types\n in assignments\n * The description of type inference in the language spec has been\n clarified.\n * Go 1.21 includes a preview of a language change we are\n considering for a future version of Go: making for loop\n variables per-iteration instead of per-loop, to avoid\n accidental sharing bugs. For details about how to try that\n language change, see the LoopvarExperiment wiki page.\n * Go 1.21 now defines that if a goroutine is panicking and\n recover was called directly by a deferred function, the return\n value of recover is guaranteed not to be nil. To ensure this,\n calling panic with a nil interface value (or an untyped nil)\n causes a run-time panic of type *runtime.PanicNilError.\n To support programs written for older versions of Go, nil\n panics can be re-enabled by setting GODEBUG=panicnil=1. This\n setting is enabled automatically when compiling a program whose\n main package is in a module with that declares go 1.20 or\n earlier.\n * Go 1.21 adds improved support for backwards compatibility and\n forwards compatibility in the Go toolchain.\n * To improve backwards compatibility, Go 1.21 formalizes Go\u0027s use\n of the GODEBUG environment variable to control the default\n behavior for changes that are non-breaking according to the\n compatibility policy but nonetheless may cause existing\n programs to break. (For example, programs that depend on buggy\n behavior may break when a bug is fixed, but bug fixes are not\n considered breaking changes.) When Go must make this kind of\n behavior change, it now chooses between the old and new\n behavior based on the go line in the workspace\u0027s go.work file\n or else the main module\u0027s go.mod file. Upgrading to a new Go\n toolchain but leaving the go line set to its original (older)\n Go version preserves the behavior of the older toolchain. With\n this compatibility support, the latest Go toolchain should\n always be the best, most secure, implementation of an older\n version of Go. See \u0027Go, Backwards Compatibility, and GODEBUG\u0027\n for details.\n * To improve forwards compatibility, Go 1.21 now reads the go\n line in a go.work or go.mod file as a strict minimum\n requirement: go 1.21.0 means that the workspace or module\n cannot be used with Go 1.20 or with Go 1.21rc1. This allows\n projects that depend on fixes made in later versions of Go to\n ensure that they are not used with earlier versions. It also\n gives better error reporting for projects that make use of new\n Go features: when the problem is that a newer Go version is\n needed, that problem is reported clearly, instead of attempting\n to build the code and instead printing errors about unresolved\n imports or syntax errors.\n * To make these new stricter version requirements easier to\n manage, the go command can now invoke not just the toolchain\n bundled in its own release but also other Go toolchain versions\n found in the PATH or downloaded on demand. If a go.mod or\n go.work go line declares a minimum requirement on a newer\n version of Go, the go command will find and run that version\n automatically. The new toolchain directive sets a suggested\n minimum toolchain to use, which may be newer than the strict go\n minimum. See \u0027Go Toolchains\u0027 for details.\n * go command: The -pgo build flag now defaults to -pgo=auto, and\n the restriction of specifying a single main package on the\n command line is now removed. If a file named default.pgo is\n present in the main package\u0027s directory, the go command will\n use it to enable profile-guided optimization for building the\n corresponding program.\n * go command: The -C dir flag must now be the first flag on the\n command-line when used.\n * go command: The new go test option -fullpath prints full path\n names in test log messages, rather than just base names.\n * go command: The go test -c flag now supports writing test\n binaries for multiple packages, each to pkg.test where pkg is\n the package name. It is an error if more than one test package\n being compiled has a given package name.]\n * go command: The go test -o flag now accepts a directory\n argument, in which case test binaries are written to that\n directory instead of the current directory.\n * cgo: In files that import \u0027C\u0027, the Go toolchain now correctly\n reports errors for attempts to declare Go methods on C types.\n * runtime: When printing very deep stacks, the runtime now prints\n the first 50 (innermost) frames followed by the bottom 50\n (outermost) frames, rather than just printing the first 100\n frames. This makes it easier to see how deeply recursive stacks\n started, and is especially valuable for debugging stack\n overflows.\n * runtime: On Linux platforms that support transparent huge\n pages, the Go runtime now manages which parts of the heap may\n be backed by huge pages more explicitly. This leads to better\n utilization of memory: small heaps should see less memory used\n (up to 50% in pathological cases) while large heaps should see\n fewer broken huge pages for dense parts of the heap, improving\n CPU usage and latency by up to 1%.\n * runtime: As a result of runtime-internal garbage collection\n tuning, applications may see up to a 40% reduction in\n application tail latency and a small decrease in memory\n use. Some applications may also observe a small loss in\n throughput. The memory use decrease should be proportional to\n the loss in throughput, such that the previous release\u0027s\n throughput/memory tradeoff may be recovered (with little change\n to latency) by increasing GOGC and/or GOMEMLIMIT slightly.\n * runtime: Calls from C to Go on threads created in C require\n some setup to prepare for Go execution. On Unix platforms, this\n setup is now preserved across multiple calls from the same\n thread. This significantly reduces the overhead of subsequent C\n to Go calls from ~1-3 microseconds per call to ~100-200\n nanoseconds per call.\n * compiler: Profile-guide optimization (PGO), added as a preview\n in Go 1.20, is now ready for general use. PGO enables\n additional optimizations on code identified as hot by profiles\n of production workloads. As mentioned in the Go command\n section, PGO is enabled by default for binaries that contain a\n default.pgo profile in the main package directory. Performance\n improvements vary depending on application behavior, with most\n programs from a representative set of Go programs seeing\n between 2 and 7% improvement from enabling PGO. See the PGO\n user guide for detailed documentation.\n * compiler: PGO builds can now devirtualize some interface method\n calls, adding a concrete call to the most common callee. This\n enables further optimization, such as inlining the callee.\n * compiler: Go 1.21 improves build speed by up to 6%, largely\n thanks to building the compiler itself with PGO.\n * assembler: On amd64, frameless nosplit assembly functions are\n no longer automatically marked as NOFRAME. Instead, the NOFRAME\n attribute must be explicitly specified if desired, which is\n already the behavior on other architectures supporting frame\n pointers. With this, the runtime now maintains the frame\n pointers for stack transitions.\n * assembler: The verifier that checks for incorrect uses of R15\n when dynamic linking on amd64 has been improved.\n * linker: On windows/amd64, the linker (with help from the\n compiler) now emits SEH unwinding data by default, which\n improves the integration of Go applications with Windows\n debuggers and other tools.\n * linker: In Go 1.21 the linker (with help from the compiler) is\n now capable of deleting dead (unreferenced) global map\n variables, if the number of entries in the variable initializer\n is sufficiently large, and if the initializer expressions are\n side-effect free.\n * core library: The new log/slog package provides structured\n logging with levels. Structured logging emits key-value pairs\n to enable fast, accurate processing of large amounts of log\n data. The package supports integration with popular log\n analysis tools and services.\n * core library: The new testing/slogtest package can help to\n validate slog.Handler implementations.\n * core library: The new slices package provides many common\n operations on slices, using generic functions that work with\n slices of any element type.\n * core library: The new maps package provides several common\n operations on maps, using generic functions that work with maps\n of any key or element type.\n * core library: The new cmp package defines the type constraint\n Ordered and two new generic functions Less and Compare that are\n useful with ordered types.\n * Minor changes to the library: As always, there are various\n minor changes and updates to the library, made with the Go 1\n promise of compatibility in mind. There are also various\n performance improvements, not enumerated here.\n * archive/tar: The implementation of the io/fs.FileInfo interface\n returned by Header.FileInfo now implements a String method that\n calls io/fs.FormatFileInfo.\n * archive/zip: The implementation of the io/fs.FileInfo interface\n returned by FileHeader.FileInfo now implements a String method\n that calls io/fs.FormatFileInfo.\n * archive/zip: The implementation of the io/fs.DirEntry interface\n returned by the io/fs.ReadDirFile.ReadDir method of the\n io/fs.File returned by Reader.Open now implements a String\n method that calls io/fs.FormatDirEntry.\n * bytes: The Buffer type has two new methods: Available and\n AvailableBuffer. These may be used along with the Write method\n to append directly to the Buffer.\n * context: The new WithoutCancel function returns a copy of a\n context that is not canceled when the original context is\n canceled.\n * context: The new WithDeadlineCause and WithTimeoutCause\n functions provide a way to set a context cancellation cause\n when a deadline or timer expires. The cause may be retrieved\n with the Cause function.\n * context: The new AfterFunc function registers a function to run\n after a context has been cancelled.\n * context: An optimization means that the results of calling\n Background and TODO and converting them to a shared type can be\n considered equal. In previous releases they were always\n different. Comparing Context values for equality has never been\n well-defined, so this is not considered to be an incompatible\n change.\n * crypto/ecdsa: PublicKey.Equal and PrivateKey.Equal now execute\n in constant time.\n * crypto/elliptic: All of the Curve methods have been deprecated,\n along with GenerateKey, Marshal, and Unmarshal. For ECDH\n operations, the new crypto/ecdh package should be used\n instead. For lower-level operations, use third-party modules\n such as filippo.io/nistec.\n * crypto/rand: The crypto/rand package now uses the getrandom\n system call on NetBSD 10.0 and later.\n * crypto/rsa: The performance of private RSA operations\n (decryption and signing) is now better than Go 1.19 for\n GOARCH=amd64 and GOARCH=arm64. It had regressed in Go 1.20.\n * crypto/rsa: Due to the addition of private fields to\n PrecomputedValues, PrivateKey.Precompute must be called for\n optimal performance even if deserializing (for example from\n JSON) a previously-precomputed private key.\n * crypto/rsa: PublicKey.Equal and PrivateKey.Equal now execute in\n constant time.\n * crypto/rsa: The GenerateMultiPrimeKey function and the\n PrecomputedValues.CRTValues field have been\n deprecated. PrecomputedValues.CRTValues will still be populated\n when PrivateKey.Precompute is called, but the values will not\n be used during decryption operations.\n * crypto/sha256: SHA-224 and SHA-256 operations now use native\n instructions when available when GOARCH=amd64, providing a\n performance improvement on the order of 3-4x.\n * crypto/tls: Servers now skip verifying client certificates\n (including not running Config.VerifyPeerCertificate) for\n resumed connections, besides checking the expiration time. This\n makes session tickets larger when client certificates are in\n use. Clients were already skipping verification on resumption,\n but now check the expiration time even if\n Config.InsecureSkipVerify is set.\n * crypto/tls: Applications can now control the content of session\n tickets.\n * crypto/tls: The new SessionState type describes a resumable\n session.\n * crypto/tls: The SessionState.Bytes method and ParseSessionState\n function serialize and deserialize a SessionState.\n * crypto/tls: The Config.WrapSession and Config.UnwrapSession\n hooks convert a SessionState to and from a ticket on the server\n side.\n * crypto/tls: The Config.EncryptTicket and Config.DecryptTicket\n methods provide a default implementation of WrapSession and\n UnwrapSession.\n * crypto/tls: The ClientSessionState.ResumptionState method and\n NewResumptionState function may be used by a ClientSessionCache\n implementation to store and resume sessions on the client side.\n * crypto/tls: To reduce the potential for session tickets to be\n used as a tracking mechanism across connections, the server now\n issues new tickets on every resumption (if they are supported\n and not disabled) and tickets don\u0027t bear an identifier for the\n key that encrypted them anymore. If passing a large number of\n keys to Conn.SetSessionTicketKeys, this might lead to a\n noticeable performance cost.\n * crypto/tls: Both clients and servers now implement the Extended\n Master Secret extension (RFC 7627). The deprecation of\n ConnectionState.TLSUnique has been reverted, and is now set for\n resumed connections that support Extended Master Secret.\n * crypto/tls: The new QUICConn type provides support for QUIC\n implementations, including 0-RTT support. Note that this is not\n itself a QUIC implementation, and 0-RTT is still not supported\n in TLS.\n * crypto/tls: The new VersionName function returns the name for a\n TLS version number.\n * crypto/tls: The TLS alert codes sent from the server for client\n authentication failures have been improved. Previously, these\n failures always resulted in a \u0027bad certificate\u0027 alert. Now,\n certain failures will result in more appropriate alert codes,\n as defined by RFC 5246 and RFC 8446:\n * crypto/tls: For TLS 1.3 connections, if the server is\n configured to require client authentication using\n RequireAnyClientCert or RequireAndVerifyClientCert, and the\n client does not provide any certificate, the server will now\n return the \u0027certificate required\u0027 alert.\n * crypto/tls: If the client provides a certificate that is not\n signed by the set of trusted certificate authorities configured\n on the server, the server will return the \u0027unknown certificate\n authority\u0027 alert.\n * crypto/tls: If the client provides a certificate that is either\n expired or not yet valid, the server will return the \u0027expired\n certificate\u0027 alert.\n * crypto/tls: In all other scenarios related to client\n authentication failures, the server still returns \u0027bad\n certificate\u0027.\n * crypto/x509: RevocationList.RevokedCertificates has been\n deprecated and replaced with the new RevokedCertificateEntries\n field, which is a slice of RevocationListEntry.\n RevocationListEntry contains all of the fields in\n pkix.RevokedCertificate, as well as the revocation reason code.\n * crypto/x509: Name constraints are now correctly enforced on\n non-leaf certificates, and not on the certificates where they\n are expressed.\n * debug/elf: The new File.DynValue method may be used to retrieve\n the numeric values listed with a given dynamic tag.\n * debug/elf: The constant flags permitted in a DT_FLAGS_1 dynamic\n tag are now defined with type DynFlag1. These tags have names\n starting with DF_1.\n * debug/elf: The package now defines the constant COMPRESS_ZSTD.\n * debug/elf: The package now defines the constant\n R_PPC64_REL24_P9NOTOC.\n * debug/pe: Attempts to read from a section containing\n uninitialized data using Section.Data or the reader returned by\n Section.Open now return an error.\n * embed: The io/fs.File returned by FS.Open now has a ReadAt\n method that implements io.ReaderAt.\n * embed: Calling FS.Open.Stat will return a type that now\n implements a String method that calls io/fs.FormatFileInfo.\n * errors: The new ErrUnsupported error provides a standardized\n way to indicate that a requested operation may not be performed\n because it is unsupported. For example, a call to os.Link when\n using a file system that does not support hard links.\n * flag: The new BoolFunc function and FlagSet.BoolFunc method\n define a flag that does not require an argument and calls a\n function when the flag is used. This is similar to Func but for\n a boolean flag.\n * flag: A flag definition (via Bool, BoolVar, Int, IntVar, etc.)\n will panic if Set has already been called on a flag with the\n same name. This change is intended to detect cases where\n changes in initialization order cause flag operations to occur\n in a different order than expected. In many cases the fix to\n this problem is to introduce a explicit package dependence to\n correctly order the definition before any Set operations.\n * go/ast: The new IsGenerated predicate reports whether a file\n syntax tree contains the special comment that conventionally\n indicates that the file was generated by a tool.\n * go/ast: The new File.GoVersion field records the minimum Go\n version required by any //go:build or // +build directives.\n * go/build: The package now parses build directives (comments\n that start with //go:) in file headers (before the package\n declaration). These directives are available in the new Package\n fields Directives, TestDirectives, and XTestDirectives.\n * go/build/constraint: The new GoVersion function returns the\n minimum Go version implied by a build expression.\n * go/token: The new File.Lines method returns the file\u0027s\n line-number table in the same form as accepted by\n File.SetLines.\n * go/types: The new Package.GoVersion method returns the Go\n language version used to check the package.\n * hash/maphash: The hash/maphash package now has a pure Go\n implementation, selectable with the purego build tag.\n * html/template: The new error ErrJSTemplate is returned when an\n action appears in a JavaScript template literal. Previously an\n unexported error was returned.\n * io/fs: The new FormatFileInfo function returns a formatted\n version of a FileInfo. The new FormatDirEntry function returns\n a formatted version of a DirEntry. The implementation of\n DirEntry returned by ReadDir now implements a String method\n that calls FormatDirEntry, and the same is true for the\n DirEntry value passed to WalkDirFunc.\n * math/big: The new Int.Float64 method returns the nearest\n floating-point value to a multi-precision integer, along with\n an indication of any rounding that occurred.\n * net: On Linux, the net package can now use Multipath TCP when\n the kernel supports it. It is not used by default. To use\n Multipath TCP when available on a client, call the\n Dialer.SetMultipathTCP method before calling the Dialer.Dial or\n Dialer.DialContext methods. To use Multipath TCP when available\n on a server, call the ListenConfig.SetMultipathTCP method\n before calling the ListenConfig.Listen method. Specify the\n network as \u0027tcp\u0027 or \u0027tcp4\u0027 or \u0027tcp6\u0027 as usual. If Multipath TCP\n is not supported by the kernel or the remote host, the\n connection will silently fall back to TCP. To test whether a\n particular connection is using Multipath TCP, use the\n TCPConn.MultipathTCP method.\n * net: In a future Go release we may enable Multipath TCP by\n default on systems that support it.\n * net/http: The new ResponseController.EnableFullDuplex method\n allows server handlers to concurrently read from an HTTP/1\n request body while writing the response. Normally, the HTTP/1\n server automatically consumes any remaining request body before\n starting to write the response, to avoid deadlocking clients\n which attempt to write a complete request before reading the\n response. The EnableFullDuplex method disables this behavior.\n * net/http: The new ErrSchemeMismatch error is returned by Client\n and Transport when the server responds to an HTTPS request with\n an HTTP response.\n * net/http: The net/http package now supports\n errors.ErrUnsupported, in that the expression\n errors.Is(http.ErrNotSupported, errors.ErrUnsupported) will\n return true.\n * os: Programs may now pass an empty time.Time value to the\n Chtimes function to leave either the access time or the\n modification time unchanged.\n * os: On Windows the File.Chdir method now changes the current\n directory to the file, rather than always returning an error.\n * os: On Unix systems, if a non-blocking descriptor is passed to\n NewFile, calling the File.Fd method will now return a\n non-blocking descriptor. Previously the descriptor was\n converted to blocking mode.\n * os: On Windows calling Truncate on a non-existent file used to\n create an empty file. It now returns an error indicating that\n the file does not exist.\n * os: On Windows calling TempDir now uses GetTempPath2W when\n available, instead of GetTempPathW. The new behavior is a\n security hardening measure that prevents temporary files\n created by processes running as SYSTEM to be accessed by\n non-SYSTEM processes.\n * os: On Windows the os package now supports working with files\n whose names, stored as UTF-16, can\u0027t be represented as valid\n UTF-8.\n * os: On Windows Lstat now resolves symbolic links for paths\n ending with a path separator, consistent with its behavior on\n POSIX platforms.\n * os: The implementation of the io/fs.DirEntry interface returned\n by the ReadDir function and the File.ReadDir method now\n implements a String method that calls io/fs.FormatDirEntry.\n * os: The implementation of the io/fs.FS interface returned by\n the DirFS function now implements the io/fs.ReadFileFS and the\n io/fs.ReadDirFS interfaces.\n * path/filepath: The implementation of the io/fs.DirEntry\n interface passed to the function argument of WalkDir now\n implements a String method that calls io/fs.FormatDirEntry.\n * reflect: In Go 1.21, ValueOf no longer forces its argument to\n be allocated on the heap, allowing a Value\u0027s content to be\n allocated on the stack. Most operations on a Value also allow\n the underlying value to be stack allocated.\n * reflect: The new Value method Value.Clear clears the contents\n of a map or zeros the contents of a slice. This corresponds to\n the new clear built-in added to the language.\n * reflect: The SliceHeader and StringHeader types are now\n deprecated. In new code prefer unsafe.Slice, unsafe.SliceData,\n unsafe.String, or unsafe.StringData.\n * regexp: Regexp now defines MarshalText and UnmarshalText\n methods. These implement encoding.TextMarshaler and\n encoding.TextUnmarshaler and will be used by packages such as\n encoding/json.\n * runtime: Textual stack traces produced by Go programs, such as\n those produced when crashing, calling runtime.Stack, or\n collecting a goroutine profile with debug=2, now include the\n IDs of the goroutines that created each goroutine in the stack\n trace.\n * runtime: Crashing Go applications can now opt-in to Windows\n Error Reporting (WER) by setting the environment variable\n GOTRACEBACK=wer or calling debug.SetTraceback(\u0027wer\u0027) before the\n crash. Other than enabling WER, the runtime will behave as with\n GOTRACEBACK=crash. On non-Windows systems, GOTRACEBACK=wer is\n ignored.\n * runtime: GODEBUG=cgocheck=2, a thorough checker of cgo pointer\n passing rules, is no longer available as a debug\n option. Instead, it is available as an experiment using\n GOEXPERIMENT=cgocheck2. In particular this means that this mode\n has to be selected at build time instead of startup time.\n * runtime: GODEBUG=cgocheck=1 is still available (and is still\n the default).\n * runtime: A new type Pinner has been added to the runtime\n package. Pinners may be used to \u0027pin\u0027 Go memory such that it\n may be used more freely by non-Go code. For instance, passing\n Go values that reference pinned Go memory to C code is now\n allowed. Previously, passing any such nested reference was\n disallowed by the cgo pointer passing rules. See the docs for\n more details.\n * runtime/metrics: A few previously-internal GC metrics, such as\n live heap size, are now available. GOGC and GOMEMLIMIT are also\n now available as metrics.\n * runtime/trace: Collecting traces on amd64 and arm64 now incurs\n a substantially smaller CPU cost: up to a 10x improvement over\n the previous release.\n * runtime/trace: Traces now contain explicit stop-the-world\n events for every reason the Go runtime might stop-the-world,\n not just garbage collection.\n * sync: The new OnceFunc, OnceValue, and OnceValues functions\n capture a common use of Once to lazily initialize a value on\n first use.\n * syscall: On Windows the Fchdir function now changes the current\n directory to its argument, rather than always returning an\n error.\n * syscall: On FreeBSD SysProcAttr has a new field Jail that may\n be used to put the newly created process in a jailed\n environment.\n * syscall: On Windows the syscall package now supports working\n with files whose names, stored as UTF-16, can\u0027t be represented\n as valid UTF-8. The UTF16ToString and UTF16FromString functions\n now convert between UTF-16 data and WTF-8 strings. This is\n backward compatible as WTF-8 is a superset of the UTF-8 format\n that was used in earlier releases.\n * syscall: Several error values match the new\n errors.ErrUnsupported, such that errors.Is(err,\n errors.ErrUnsupported) returns true.\n ENOSYS\n ENOTSUP\n EOPNOTSUPP\n EPLAN9 (Plan 9 only)\n ERROR_CALL_NOT_IMPLEMENTED (Windows only)\n ERROR_NOT_SUPPORTED (Windows only)\n EWINDOWS (Windows only)\n * testing: The new -test.fullpath option will print full path\n names in test log messages, rather than just base names.\n * testing: The new Testing function reports whether the program\n is a test created by go test.\n * testing/fstest: Calling Open.Stat will return a type that now\n implements a String method that calls io/fs.FormatFileInfo.\n * unicode: The unicode package and associated support throughout\n the system has been upgraded to Unicode 15.0.0.\n * Darwin port: As announced in the Go 1.20 release notes, Go 1.21\n requires macOS 10.15 Catalina or later; support for previous\n versions has been discontinued.\n * Windows port: As announced in the Go 1.20 release notes, Go\n 1.21 requires at least Windows 10 or Windows Server 2016;\n support for previous versions has been discontinued.\n * WebAssembly port: The new go:wasmimport directive can now be\n used in Go programs to import functions from the WebAssembly\n host.\n * WebAssembly port: The Go scheduler now interacts much more\n efficiently with the JavaScript event loop, especially in\n applications that block frequently on asynchronous events.\n * WebAssembly System Interface port: Go 1.21 adds an experimental\n port to the WebAssembly System Interface (WASI), Preview 1\n (GOOS=wasip1, GOARCH=wasm).\n * WebAssembly System Interface port: As a result of the addition\n of the new GOOS value \u0027wasip1\u0027, Go files named *_wasip1.go will\n now be ignored by Go tools except when that GOOS value is being\n used. If you have existing filenames matching that pattern, you\n will need to rename them.\n * ppc64/ppc64le port: On Linux, GOPPC64=power10 now generates\n PC-relative instructions, prefixed instructions, and other new\n Power10 instructions. On AIX, GOPPC64=power10 generates Power10\n instructions, but does not generate PC-relative instructions.\n * ppc64/ppc64le port: When building position-independent binaries\n for GOPPC64=power10 GOOS=linux GOARCH=ppc64le, users can expect\n reduced binary sizes in most cases, in some cases\n 3.5%. Position-independent binaries are built for ppc64le with\n the following -buildmode values: c-archive, c-shared, shared,\n pie, plugin.\n * loong64 port: The linux/loong64 port now supports\n -buildmode=c-archive, -buildmode=c-shared and -buildmode=pie.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2023-360",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2023_0360-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2023:0360-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2023:0360-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/"
},
{
"category": "self",
"summary": "SUSE Bug 1212475",
"url": "https://bugzilla.suse.com/1212475"
},
{
"category": "self",
"summary": "SUSE Bug 1212667",
"url": "https://bugzilla.suse.com/1212667"
},
{
"category": "self",
"summary": "SUSE Bug 1212669",
"url": "https://bugzilla.suse.com/1212669"
},
{
"category": "self",
"summary": "SUSE Bug 1215084",
"url": "https://bugzilla.suse.com/1215084"
},
{
"category": "self",
"summary": "SUSE Bug 1215085",
"url": "https://bugzilla.suse.com/1215085"
},
{
"category": "self",
"summary": "SUSE Bug 1215086",
"url": "https://bugzilla.suse.com/1215086"
},
{
"category": "self",
"summary": "SUSE Bug 1215087",
"url": "https://bugzilla.suse.com/1215087"
},
{
"category": "self",
"summary": "SUSE Bug 1215090",
"url": "https://bugzilla.suse.com/1215090"
},
{
"category": "self",
"summary": "SUSE Bug 1215985",
"url": "https://bugzilla.suse.com/1215985"
},
{
"category": "self",
"summary": "SUSE Bug 1216109",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39318 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39319 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39320 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39321 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39322 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39325 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-44487 page",
"url": "https://www.suse.com/security/cve/CVE-2023-44487/"
}
],
"title": "Security update for go1.21",
"tracking": {
"current_release_date": "2023-11-09T08:51:37Z",
"generator": {
"date": "2023-11-09T08:51:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2023:0360-1",
"initial_release_date": "2023-11-09T08:51:37Z",
"revision_history": [
{
"date": "2023-11-09T08:51:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go-1.21-41.1.x86_64",
"product": {
"name": "go-1.21-41.1.x86_64",
"product_id": "go-1.21-41.1.x86_64"
}
},
{
"category": "product_version",
"name": "go-doc-1.21-41.1.x86_64",
"product": {
"name": "go-doc-1.21-41.1.x86_64",
"product_id": "go-doc-1.21-41.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-1.21.3-2.1.x86_64",
"product": {
"name": "go1.21-1.21.3-2.1.x86_64",
"product_id": "go1.21-1.21.3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.3-2.1.x86_64",
"product": {
"name": "go1.21-doc-1.21.3-2.1.x86_64",
"product_id": "go1.21-doc-1.21.3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12",
"product": {
"name": "SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-1.21-41.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:go-1.21-41.1.x86_64"
},
"product_reference": "go-1.21-41.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-doc-1.21-41.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:go-doc-1.21-41.1.x86_64"
},
"product_reference": "go-doc-1.21-41.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.3-2.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64"
},
"product_reference": "go1.21-1.21.3-2.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.3-2.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.3-2.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39318"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39318",
"url": "https://www.suse.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "SUSE Bug 1215084 for CVE-2023-39318",
"url": "https://bugzilla.suse.com/1215084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "moderate"
}
],
"title": "CVE-2023-39318"
},
{
"cve": "CVE-2023-39319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39319"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39319",
"url": "https://www.suse.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "SUSE Bug 1215085 for CVE-2023-39319",
"url": "https://bugzilla.suse.com/1215085"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "moderate"
}
],
"title": "CVE-2023-39319"
},
{
"cve": "CVE-2023-39320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39320"
}
],
"notes": [
{
"category": "general",
"text": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39320",
"url": "https://www.suse.com/security/cve/CVE-2023-39320"
},
{
"category": "external",
"summary": "SUSE Bug 1215086 for CVE-2023-39320",
"url": "https://bugzilla.suse.com/1215086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-39320"
},
{
"cve": "CVE-2023-39321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39321"
}
],
"notes": [
{
"category": "general",
"text": "Processing an incomplete post-handshake message for a QUIC connection can cause a panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39321",
"url": "https://www.suse.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "SUSE Bug 1215087 for CVE-2023-39321",
"url": "https://bugzilla.suse.com/1215087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-39321"
},
{
"cve": "CVE-2023-39322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39322"
}
],
"notes": [
{
"category": "general",
"text": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39322",
"url": "https://www.suse.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "SUSE Bug 1215087 for CVE-2023-39322",
"url": "https://bugzilla.suse.com/1215087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-39322"
},
{
"cve": "CVE-2023-39323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39323"
}
],
"notes": [
{
"category": "general",
"text": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39323",
"url": "https://www.suse.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "SUSE Bug 1215985 for CVE-2023-39323",
"url": "https://bugzilla.suse.com/1215985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-39323"
},
{
"cve": "CVE-2023-39325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39325"
}
],
"notes": [
{
"category": "general",
"text": "A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39325",
"url": "https://www.suse.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "SUSE Bug 1216109 for CVE-2023-39325",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "external",
"summary": "SUSE Bug 1230323 for CVE-2023-39325",
"url": "https://bugzilla.suse.com/1230323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-39325"
},
{
"cve": "CVE-2023-44487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-44487"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-44487",
"url": "https://www.suse.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "SUSE Bug 1216109 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "external",
"summary": "SUSE Bug 1216123 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216123"
},
{
"category": "external",
"summary": "SUSE Bug 1216169 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216169"
},
{
"category": "external",
"summary": "SUSE Bug 1216171 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216171"
},
{
"category": "external",
"summary": "SUSE Bug 1216174 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216174"
},
{
"category": "external",
"summary": "SUSE Bug 1216176 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216176"
},
{
"category": "external",
"summary": "SUSE Bug 1216181 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216181"
},
{
"category": "external",
"summary": "SUSE Bug 1216182 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216182"
},
{
"category": "external",
"summary": "SUSE Bug 1216190 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-44487"
}
]
}
opensuse-su-2024:13217-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.21-1.21.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.21-1.21.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13217",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13217-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39318 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39319 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39320 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39321 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39321/"
}
],
"title": "go1.21-1.21.1-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13217-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.1-1.1.aarch64",
"product": {
"name": "go1.21-1.21.1-1.1.aarch64",
"product_id": "go1.21-1.21.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.1-1.1.aarch64",
"product": {
"name": "go1.21-doc-1.21.1-1.1.aarch64",
"product_id": "go1.21-doc-1.21.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-libstd-1.21.1-1.1.aarch64",
"product": {
"name": "go1.21-libstd-1.21.1-1.1.aarch64",
"product_id": "go1.21-libstd-1.21.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.1-1.1.aarch64",
"product": {
"name": "go1.21-race-1.21.1-1.1.aarch64",
"product_id": "go1.21-race-1.21.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.1-1.1.ppc64le",
"product": {
"name": "go1.21-1.21.1-1.1.ppc64le",
"product_id": "go1.21-1.21.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.1-1.1.ppc64le",
"product": {
"name": "go1.21-doc-1.21.1-1.1.ppc64le",
"product_id": "go1.21-doc-1.21.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-libstd-1.21.1-1.1.ppc64le",
"product": {
"name": "go1.21-libstd-1.21.1-1.1.ppc64le",
"product_id": "go1.21-libstd-1.21.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.1-1.1.ppc64le",
"product": {
"name": "go1.21-race-1.21.1-1.1.ppc64le",
"product_id": "go1.21-race-1.21.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.1-1.1.s390x",
"product": {
"name": "go1.21-1.21.1-1.1.s390x",
"product_id": "go1.21-1.21.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.1-1.1.s390x",
"product": {
"name": "go1.21-doc-1.21.1-1.1.s390x",
"product_id": "go1.21-doc-1.21.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-libstd-1.21.1-1.1.s390x",
"product": {
"name": "go1.21-libstd-1.21.1-1.1.s390x",
"product_id": "go1.21-libstd-1.21.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.1-1.1.s390x",
"product": {
"name": "go1.21-race-1.21.1-1.1.s390x",
"product_id": "go1.21-race-1.21.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.1-1.1.x86_64",
"product": {
"name": "go1.21-1.21.1-1.1.x86_64",
"product_id": "go1.21-1.21.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.1-1.1.x86_64",
"product": {
"name": "go1.21-doc-1.21.1-1.1.x86_64",
"product_id": "go1.21-doc-1.21.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-libstd-1.21.1-1.1.x86_64",
"product": {
"name": "go1.21-libstd-1.21.1-1.1.x86_64",
"product_id": "go1.21-libstd-1.21.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.1-1.1.x86_64",
"product": {
"name": "go1.21-race-1.21.1-1.1.x86_64",
"product_id": "go1.21-race-1.21.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64"
},
"product_reference": "go1.21-1.21.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le"
},
"product_reference": "go1.21-1.21.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x"
},
"product_reference": "go1.21-1.21.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64"
},
"product_reference": "go1.21-1.21.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64"
},
"product_reference": "go1.21-doc-1.21.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le"
},
"product_reference": "go1.21-doc-1.21.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x"
},
"product_reference": "go1.21-doc-1.21.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-libstd-1.21.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64"
},
"product_reference": "go1.21-libstd-1.21.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-libstd-1.21.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le"
},
"product_reference": "go1.21-libstd-1.21.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-libstd-1.21.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x"
},
"product_reference": "go1.21-libstd-1.21.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-libstd-1.21.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64"
},
"product_reference": "go1.21-libstd-1.21.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64"
},
"product_reference": "go1.21-race-1.21.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le"
},
"product_reference": "go1.21-race-1.21.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x"
},
"product_reference": "go1.21-race-1.21.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
},
"product_reference": "go1.21-race-1.21.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39318"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39318",
"url": "https://www.suse.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "SUSE Bug 1215084 for CVE-2023-39318",
"url": "https://bugzilla.suse.com/1215084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-39318"
},
{
"cve": "CVE-2023-39319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39319"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39319",
"url": "https://www.suse.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "SUSE Bug 1215085 for CVE-2023-39319",
"url": "https://bugzilla.suse.com/1215085"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-39319"
},
{
"cve": "CVE-2023-39320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39320"
}
],
"notes": [
{
"category": "general",
"text": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39320",
"url": "https://www.suse.com/security/cve/CVE-2023-39320"
},
{
"category": "external",
"summary": "SUSE Bug 1215086 for CVE-2023-39320",
"url": "https://bugzilla.suse.com/1215086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-39320"
},
{
"cve": "CVE-2023-39321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39321"
}
],
"notes": [
{
"category": "general",
"text": "Processing an incomplete post-handshake message for a QUIC connection can cause a panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39321",
"url": "https://www.suse.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "SUSE Bug 1215087 for CVE-2023-39321",
"url": "https://bugzilla.suse.com/1215087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-39321"
}
]
}
ghsa-rxv8-v965-v333
Vulnerability from github
The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.
{
"affected": [],
"aliases": [
"CVE-2023-39320"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-09-08T17:15:27Z",
"severity": "CRITICAL"
},
"details": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software.",
"id": "GHSA-rxv8-v965-v333",
"modified": "2023-11-04T03:30:18Z",
"published": "2023-09-08T18:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39320"
},
{
"type": "WEB",
"url": "https://go.dev/cl/526158"
},
{
"type": "WEB",
"url": "https://go.dev/issue/62198"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2023-2042"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20231020-0004"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
wid-sec-w-2023-2280
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren, Code auszuf\u00fchren oder einen Denial of Service zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2280 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2280.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2280 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2280"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7763 vom 2023-12-13",
"url": "https://access.redhat.com/errata/RHSA-2023:7763"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7766 vom 2023-12-13",
"url": "https://access.redhat.com/errata/RHSA-2023:7766"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7765 vom 2023-12-13",
"url": "https://access.redhat.com/errata/RHSA-2023:7765"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7762 vom 2023-12-13",
"url": "https://access.redhat.com/errata/RHSA-2023:7762"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7764 vom 2023-12-13",
"url": "https://access.redhat.com/errata/RHSA-2023:7764"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6574-1 vom 2024-01-11",
"url": "https://ubuntu.com/security/notices/USN-6574-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0121 vom 2024-01-10",
"url": "https://access.redhat.com/errata/RHSA-2024:0121"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-7765 vom 2023-12-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-7765.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-7763 vom 2023-12-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-7763.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-7766 vom 2023-12-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-7766.html"
},
{
"category": "external",
"summary": "Golang Announce vom 2023-09-06",
"url": "https://groups.google.com/g/golang-announce/c/Fm51GRLNRvM"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:3701-1 vom 2023-09-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016236.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:3700-1 vom 2023-09-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:3840-1 vom 2023-09-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016353.html"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-004 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox%C2%AE-Security-Bulletin-XRX24-004-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5974 vom 2023-10-21",
"url": "https://access.redhat.com/errata/RHSA-2023:5974"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6031 vom 2023-10-24",
"url": "https://access.redhat.com/errata/RHSA-2023:6031"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6119 vom 2023-10-26",
"url": "https://access.redhat.com/errata/RHSA-2023:6119"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6122 vom 2023-10-26",
"url": "https://access.redhat.com/errata/RHSA-2023:6122"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6115 vom 2023-10-26",
"url": "https://access.redhat.com/errata/RHSA-2023:6115"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6145 vom 2023-10-27",
"url": "https://access.redhat.com/errata/RHSA-2023:6145"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5947 vom 2023-10-26",
"url": "https://access.redhat.com/errata/RHSA-2023:5947"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6148 vom 2023-10-27",
"url": "https://access.redhat.com/errata/RHSA-2023:6148"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2023-B951076A0F vom 2023-10-27",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-b951076a0f"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6161 vom 2023-10-30",
"url": "https://access.redhat.com/errata/RHSA-2023:6161"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6202 vom 2023-10-31",
"url": "https://access.redhat.com/errata/RHSA-2023:6202"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6200 vom 2023-10-31",
"url": "https://access.redhat.com/errata/RHSA-2023:6200"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5009 vom 2023-11-01",
"url": "https://access.redhat.com/errata/RHSA-2023:5009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6154 vom 2023-11-01",
"url": "https://access.redhat.com/errata/RHSA-2023:6154"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:4469-1 vom 2023-11-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2023-1C906D04EE vom 2023-11-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-1c906d04ee"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202311-09 vom 2023-11-25",
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7517 vom 2023-11-28",
"url": "https://access.redhat.com/errata/RHSA-2023:7517"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1901 vom 2024-04-18",
"url": "https://access.redhat.com/errata/RHSA-2024:1901"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2098 vom 2024-04-30",
"url": "https://linux.oracle.com/errata/ELSA-2024-2098.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2160 vom 2024-04-30",
"url": "https://access.redhat.com/errata/RHSA-2024:2160"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2988 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3352 vom 2024-05-23",
"url": "https://access.redhat.com/errata/RHSA-2024:3352"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-2988.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3467 vom 2024-05-29",
"url": "https://access.redhat.com/errata/RHSA-2024:3467"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7161954 vom 2024-07-30",
"url": "https://www.ibm.com/support/pages/node/7161954"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7162077 vom 2024-07-31",
"url": "https://www.ibm.com/support/pages/node/7162077"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7061-1 vom 2024-10-10",
"url": "https://ubuntu.com/security/notices/USN-7061-1"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1012 vom 2024-10-14",
"url": "https://advisory.splunk.com//advisories/SVD-2024-1012"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7109-1 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7109-1"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-14T23:00:00.000+00:00",
"generator": {
"date": "2024-11-15T09:19:48.016+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2023-2280",
"initial_release_date": "2023-09-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-09-20T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-09-27T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-10-22T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-23T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-25T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-26T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-29T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-10-30T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-31T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-11-16T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-11-23T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-11-26T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2023-11-27T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-12-12T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-12-14T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-01-10T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-04-17T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-23T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-10T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "29"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.21.1",
"product": {
"name": "Golang Go \u003c1.21.1",
"product_id": "T029752"
}
},
{
"category": "product_version",
"name": "1.21.1",
"product": {
"name": "Golang Go 1.21.1",
"product_id": "T029752-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.21.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.20.8",
"product": {
"name": "Golang Go \u003c1.20.8",
"product_id": "T029753"
}
},
{
"category": "product_version",
"name": "1.20.8",
"product": {
"name": "Golang Go 1.20.8",
"product_id": "T029753-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.20.8"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.16.2",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.16.2",
"product_id": "T036379"
}
},
{
"category": "product_version",
"name": "10.1.16.2",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.16.2",
"product_id": "T036379-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.16.2"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "16.2",
"product": {
"name": "Red Hat OpenStack 16.2",
"product_id": "T023999",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2"
}
}
}
],
"category": "product_name",
"name": "OpenStack"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.3.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.3.1",
"product_id": "T038314"
}
},
{
"category": "product_version",
"name": "9.3.1",
"product": {
"name": "Splunk Splunk Enterprise 9.3.1",
"product_id": "T038314-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.3.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.3",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.3",
"product_id": "T038315"
}
},
{
"category": "product_version",
"name": "9.2.3",
"product": {
"name": "Splunk Splunk Enterprise 9.2.3",
"product_id": "T038315-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.6",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.6",
"product_id": "T038316"
}
},
{
"category": "product_version",
"name": "9.1.6",
"product": {
"name": "Splunk Splunk Enterprise 9.1.6",
"product_id": "T038316-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.6"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T015631",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
},
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39318",
"notes": [
{
"category": "description",
"text": "In Golang Go existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden im html/template Package nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"67646",
"T038314",
"T015632",
"T036379",
"T038315",
"T012167",
"T015631",
"T038316",
"T004914",
"74185",
"T023999",
"T002207",
"T000126",
"T029753",
"T029752"
]
},
"release_date": "2023-09-06T22:00:00.000+00:00",
"title": "CVE-2023-39318"
},
{
"cve": "CVE-2023-39319",
"notes": [
{
"category": "description",
"text": "In Golang Go existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden im html/template Package nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"67646",
"T038314",
"T015632",
"T036379",
"T038315",
"T012167",
"T015631",
"T038316",
"T004914",
"74185",
"T023999",
"T002207",
"T000126",
"T029753",
"T029752"
]
},
"release_date": "2023-09-06T22:00:00.000+00:00",
"title": "CVE-2023-39319"
},
{
"cve": "CVE-2023-39320",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Golang Go. Ein Angreifer kann diese Schwachstelle ausnutzen, um Skripte und Bin\u00e4rdateien relativ zur Wurzel des Moduls auszuf\u00fchren, wenn der \"go\"-Befehl innerhalb des Moduls ausgef\u00fchrt wird. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"67646",
"T038314",
"T015632",
"T036379",
"T038315",
"T012167",
"T015631",
"T038316",
"T004914",
"74185",
"T023999",
"T002207",
"T000126",
"T029752"
]
},
"release_date": "2023-09-06T22:00:00.000+00:00",
"title": "CVE-2023-39320"
},
{
"cve": "CVE-2023-39321",
"notes": [
{
"category": "description",
"text": "In Golang Go existieren mehrere Schwachstellen. Die Verarbeitung einer unvollst\u00e4ndigen Post-Handshake-Nachricht f\u00fcr eine QUIC-Verbindung f\u00fchrt zu einer Fehlfunktion. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T038314",
"T015632",
"T036379",
"T038315",
"T012167",
"T015631",
"T038316",
"T004914",
"74185",
"T023999",
"T002207",
"T000126",
"T029753",
"T029752"
]
},
"release_date": "2023-09-06T22:00:00.000+00:00",
"title": "CVE-2023-39321"
},
{
"cve": "CVE-2023-39322",
"notes": [
{
"category": "description",
"text": "In Golang Go existieren mehrere Schwachstellen. Die Verarbeitung einer unvollst\u00e4ndigen Post-Handshake-Nachricht f\u00fcr eine QUIC-Verbindung f\u00fchrt zu einer Fehlfunktion. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T038314",
"T015632",
"T036379",
"T038315",
"T012167",
"T015631",
"T038316",
"T004914",
"74185",
"T023999",
"T002207",
"T000126",
"T029753",
"T029752"
]
},
"release_date": "2023-09-06T22:00:00.000+00:00",
"title": "CVE-2023-39322"
}
]
}
WID-SEC-W-2023-2280
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren, Code auszuf\u00fchren oder einen Denial of Service zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2280 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2280.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2280 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2280"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7763 vom 2023-12-13",
"url": "https://access.redhat.com/errata/RHSA-2023:7763"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7766 vom 2023-12-13",
"url": "https://access.redhat.com/errata/RHSA-2023:7766"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7765 vom 2023-12-13",
"url": "https://access.redhat.com/errata/RHSA-2023:7765"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7762 vom 2023-12-13",
"url": "https://access.redhat.com/errata/RHSA-2023:7762"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7764 vom 2023-12-13",
"url": "https://access.redhat.com/errata/RHSA-2023:7764"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6574-1 vom 2024-01-11",
"url": "https://ubuntu.com/security/notices/USN-6574-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0121 vom 2024-01-10",
"url": "https://access.redhat.com/errata/RHSA-2024:0121"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-7765 vom 2023-12-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-7765.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-7763 vom 2023-12-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-7763.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-7766 vom 2023-12-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-7766.html"
},
{
"category": "external",
"summary": "Golang Announce vom 2023-09-06",
"url": "https://groups.google.com/g/golang-announce/c/Fm51GRLNRvM"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:3701-1 vom 2023-09-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016236.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:3700-1 vom 2023-09-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:3840-1 vom 2023-09-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016353.html"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-004 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox%C2%AE-Security-Bulletin-XRX24-004-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5974 vom 2023-10-21",
"url": "https://access.redhat.com/errata/RHSA-2023:5974"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6031 vom 2023-10-24",
"url": "https://access.redhat.com/errata/RHSA-2023:6031"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6119 vom 2023-10-26",
"url": "https://access.redhat.com/errata/RHSA-2023:6119"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6122 vom 2023-10-26",
"url": "https://access.redhat.com/errata/RHSA-2023:6122"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6115 vom 2023-10-26",
"url": "https://access.redhat.com/errata/RHSA-2023:6115"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6145 vom 2023-10-27",
"url": "https://access.redhat.com/errata/RHSA-2023:6145"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5947 vom 2023-10-26",
"url": "https://access.redhat.com/errata/RHSA-2023:5947"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6148 vom 2023-10-27",
"url": "https://access.redhat.com/errata/RHSA-2023:6148"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2023-B951076A0F vom 2023-10-27",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-b951076a0f"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6161 vom 2023-10-30",
"url": "https://access.redhat.com/errata/RHSA-2023:6161"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6202 vom 2023-10-31",
"url": "https://access.redhat.com/errata/RHSA-2023:6202"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6200 vom 2023-10-31",
"url": "https://access.redhat.com/errata/RHSA-2023:6200"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5009 vom 2023-11-01",
"url": "https://access.redhat.com/errata/RHSA-2023:5009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6154 vom 2023-11-01",
"url": "https://access.redhat.com/errata/RHSA-2023:6154"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:4469-1 vom 2023-11-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2023-1C906D04EE vom 2023-11-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-1c906d04ee"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202311-09 vom 2023-11-25",
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7517 vom 2023-11-28",
"url": "https://access.redhat.com/errata/RHSA-2023:7517"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1901 vom 2024-04-18",
"url": "https://access.redhat.com/errata/RHSA-2024:1901"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2098 vom 2024-04-30",
"url": "https://linux.oracle.com/errata/ELSA-2024-2098.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2160 vom 2024-04-30",
"url": "https://access.redhat.com/errata/RHSA-2024:2160"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2988 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3352 vom 2024-05-23",
"url": "https://access.redhat.com/errata/RHSA-2024:3352"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-2988.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3467 vom 2024-05-29",
"url": "https://access.redhat.com/errata/RHSA-2024:3467"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7161954 vom 2024-07-30",
"url": "https://www.ibm.com/support/pages/node/7161954"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7162077 vom 2024-07-31",
"url": "https://www.ibm.com/support/pages/node/7162077"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7061-1 vom 2024-10-10",
"url": "https://ubuntu.com/security/notices/USN-7061-1"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1012 vom 2024-10-14",
"url": "https://advisory.splunk.com//advisories/SVD-2024-1012"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7109-1 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7109-1"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-14T23:00:00.000+00:00",
"generator": {
"date": "2024-11-15T09:19:48.016+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2023-2280",
"initial_release_date": "2023-09-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-09-20T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-09-27T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-10-22T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-23T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-25T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-26T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-29T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-10-30T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-31T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-11-16T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-11-23T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-11-26T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2023-11-27T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-12-12T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-12-14T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-01-10T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-04-17T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-23T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-10T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "29"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.21.1",
"product": {
"name": "Golang Go \u003c1.21.1",
"product_id": "T029752"
}
},
{
"category": "product_version",
"name": "1.21.1",
"product": {
"name": "Golang Go 1.21.1",
"product_id": "T029752-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.21.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.20.8",
"product": {
"name": "Golang Go \u003c1.20.8",
"product_id": "T029753"
}
},
{
"category": "product_version",
"name": "1.20.8",
"product": {
"name": "Golang Go 1.20.8",
"product_id": "T029753-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.20.8"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.16.2",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.16.2",
"product_id": "T036379"
}
},
{
"category": "product_version",
"name": "10.1.16.2",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.16.2",
"product_id": "T036379-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.16.2"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "16.2",
"product": {
"name": "Red Hat OpenStack 16.2",
"product_id": "T023999",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2"
}
}
}
],
"category": "product_name",
"name": "OpenStack"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.3.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.3.1",
"product_id": "T038314"
}
},
{
"category": "product_version",
"name": "9.3.1",
"product": {
"name": "Splunk Splunk Enterprise 9.3.1",
"product_id": "T038314-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.3.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.3",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.3",
"product_id": "T038315"
}
},
{
"category": "product_version",
"name": "9.2.3",
"product": {
"name": "Splunk Splunk Enterprise 9.2.3",
"product_id": "T038315-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.6",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.6",
"product_id": "T038316"
}
},
{
"category": "product_version",
"name": "9.1.6",
"product": {
"name": "Splunk Splunk Enterprise 9.1.6",
"product_id": "T038316-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.6"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T015631",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
},
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39318",
"notes": [
{
"category": "description",
"text": "In Golang Go existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden im html/template Package nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"67646",
"T038314",
"T015632",
"T036379",
"T038315",
"T012167",
"T015631",
"T038316",
"T004914",
"74185",
"T023999",
"T002207",
"T000126",
"T029753",
"T029752"
]
},
"release_date": "2023-09-06T22:00:00.000+00:00",
"title": "CVE-2023-39318"
},
{
"cve": "CVE-2023-39319",
"notes": [
{
"category": "description",
"text": "In Golang Go existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden im html/template Package nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"67646",
"T038314",
"T015632",
"T036379",
"T038315",
"T012167",
"T015631",
"T038316",
"T004914",
"74185",
"T023999",
"T002207",
"T000126",
"T029753",
"T029752"
]
},
"release_date": "2023-09-06T22:00:00.000+00:00",
"title": "CVE-2023-39319"
},
{
"cve": "CVE-2023-39320",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Golang Go. Ein Angreifer kann diese Schwachstelle ausnutzen, um Skripte und Bin\u00e4rdateien relativ zur Wurzel des Moduls auszuf\u00fchren, wenn der \"go\"-Befehl innerhalb des Moduls ausgef\u00fchrt wird. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"67646",
"T038314",
"T015632",
"T036379",
"T038315",
"T012167",
"T015631",
"T038316",
"T004914",
"74185",
"T023999",
"T002207",
"T000126",
"T029752"
]
},
"release_date": "2023-09-06T22:00:00.000+00:00",
"title": "CVE-2023-39320"
},
{
"cve": "CVE-2023-39321",
"notes": [
{
"category": "description",
"text": "In Golang Go existieren mehrere Schwachstellen. Die Verarbeitung einer unvollst\u00e4ndigen Post-Handshake-Nachricht f\u00fcr eine QUIC-Verbindung f\u00fchrt zu einer Fehlfunktion. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T038314",
"T015632",
"T036379",
"T038315",
"T012167",
"T015631",
"T038316",
"T004914",
"74185",
"T023999",
"T002207",
"T000126",
"T029753",
"T029752"
]
},
"release_date": "2023-09-06T22:00:00.000+00:00",
"title": "CVE-2023-39321"
},
{
"cve": "CVE-2023-39322",
"notes": [
{
"category": "description",
"text": "In Golang Go existieren mehrere Schwachstellen. Die Verarbeitung einer unvollst\u00e4ndigen Post-Handshake-Nachricht f\u00fcr eine QUIC-Verbindung f\u00fchrt zu einer Fehlfunktion. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T038314",
"T015632",
"T036379",
"T038315",
"T012167",
"T015631",
"T038316",
"T004914",
"74185",
"T023999",
"T002207",
"T000126",
"T029753",
"T029752"
]
},
"release_date": "2023-09-06T22:00:00.000+00:00",
"title": "CVE-2023-39322"
}
]
}
gsd-2023-39320
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2023-39320",
"id": "GSD-2023-39320"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-39320"
],
"details": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software.",
"id": "GSD-2023-39320",
"modified": "2023-12-13T01:20:33.130086Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@golang.org",
"ID": "CVE-2023-39320",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "cmd/go",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "1.21.0-0",
"version_value": "1.21.1"
}
]
}
}
]
},
"vendor_name": "Go toolchain"
}
]
}
},
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://go.dev/issue/62198",
"refsource": "MISC",
"url": "https://go.dev/issue/62198"
},
{
"name": "https://go.dev/cl/526158",
"refsource": "MISC",
"url": "https://go.dev/cl/526158"
},
{
"name": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"refsource": "MISC",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"name": "https://pkg.go.dev/vuln/GO-2023-2042",
"refsource": "MISC",
"url": "https://pkg.go.dev/vuln/GO-2023-2042"
},
{
"name": "https://security.netapp.com/advisory/ntap-20231020-0004/",
"refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20231020-0004/"
},
{
"name": "https://security.gentoo.org/glsa/202311-09",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/202311-09"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.21.1",
"versionStartIncluding": "1.21.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@golang.org",
"ID": "CVE-2023-39320"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"refsource": "MISC",
"tags": [
"Release Notes"
],
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"name": "https://go.dev/cl/526158",
"refsource": "MISC",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/526158"
},
{
"name": "https://pkg.go.dev/vuln/GO-2023-2042",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2042"
},
{
"name": "https://go.dev/issue/62198",
"refsource": "MISC",
"tags": [
"Issue Tracking"
],
"url": "https://go.dev/issue/62198"
},
{
"name": "https://security.netapp.com/advisory/ntap-20231020-0004/",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20231020-0004/"
},
{
"name": "https://security.gentoo.org/glsa/202311-09",
"refsource": "",
"tags": [],
"url": "https://security.gentoo.org/glsa/202311-09"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-11-25T11:15Z",
"publishedDate": "2023-09-08T17:15Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.