Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-39323 (GCVE-0-2023-39323)
Vulnerability from cvelistv5
- CWE 94: Improper Control of Generation of Code ('Code Injection')
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Go toolchain | cmd/go |
Version: 0 ≤ Version: 1.21.0-0 ≤ |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:02:06.899Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://go.dev/issue/63211"
},
{
"tags": [
"x_transferred"
],
"url": "https://go.dev/cl/533215"
},
{
"tags": [
"x_transferred"
],
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"tags": [
"x_transferred"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2095"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20231020-0001/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-39323",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-12T15:14:25.966284Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-12T15:15:12.065Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "cmd/go",
"product": "cmd/go",
"vendor": "Go toolchain",
"versions": [
{
"lessThan": "1.20.9",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "1.21.2",
"status": "affected",
"version": "1.21.0-0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE 94: Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-25T11:09:58.922Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/issue/63211"
},
{
"url": "https://go.dev/cl/533215"
},
{
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2095"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0001/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"title": "Arbitrary code execution during build via line directives in cmd/go"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2023-39323",
"datePublished": "2023-10-05T20:36:58.756Z",
"dateReserved": "2023-07-27T17:05:55.188Z",
"dateUpdated": "2025-06-12T15:15:12.065Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-39323\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2023-10-05T21:15:11.283\",\"lastModified\":\"2025-06-12T16:15:20.520\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Line directives (\\\"//line\\\") can be used to bypass the restrictions on \\\"//go:cgo_\\\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \\\"go build\\\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.\"},{\"lang\":\"es\",\"value\":\"Las directivas de l\u00ednea (\\\"//line\\\") se pueden utilizar para evitar las restricciones de las directivas \\\"//go:cgo_\\\", permitiendo que se pasen indicadores bloqueados del enlazador y del compilador durante la compilaci\u00f3n. Esto puede provocar la ejecuci\u00f3n inesperada de c\u00f3digo arbitrario al ejecutar \\\"go build\\\". La directiva de l\u00ednea requiere la ruta absoluta del archivo en el que se encuentra la directiva, lo que hace que explotar este problema sea significativamente m\u00e1s complejo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.20.9\",\"matchCriteriaId\":\"84851C3D-3035-457E-96D9-48E219817D58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.21.0\",\"versionEndExcluding\":\"1.21.2\",\"matchCriteriaId\":\"7381A279-81EB-48D9-8065-C733FA8736B8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/533215\",\"source\":\"security@golang.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://go.dev/issue/63211\",\"source\":\"security@golang.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/XBa1oHDevAo\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\",\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2023-2095\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202311-09\",\"source\":\"security@golang.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20231020-0001/\",\"source\":\"security@golang.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://go.dev/cl/533215\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://go.dev/issue/63211\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/XBa1oHDevAo\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2023-2095\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202311-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20231020-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://go.dev/issue/63211\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://go.dev/cl/533215\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://groups.google.com/g/golang-announce/c/XBa1oHDevAo\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://pkg.go.dev/vuln/GO-2023-2095\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20231020-0001/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202311-09\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T18:02:06.899Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-39323\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-12T15:14:25.966284Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-12T15:15:03.844Z\"}}], \"cna\": {\"title\": \"Arbitrary code execution during build via line directives in cmd/go\", \"affected\": [{\"vendor\": \"Go toolchain\", \"product\": \"cmd/go\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.20.9\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.21.0-0\", \"lessThan\": \"1.21.2\", \"versionType\": \"semver\"}], \"packageName\": \"cmd/go\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://go.dev/issue/63211\"}, {\"url\": \"https://go.dev/cl/533215\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/XBa1oHDevAo\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2023-2095\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20231020-0001/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/\"}, {\"url\": \"https://security.gentoo.org/glsa/202311-09\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Line directives (\\\"//line\\\") can be used to bypass the restrictions on \\\"//go:cgo_\\\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \\\"go build\\\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE 94: Improper Control of Generation of Code (\u0027Code Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2023-11-25T11:09:58.922Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-39323\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-12T15:15:12.065Z\", \"dateReserved\": \"2023-07-27T17:05:55.188Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2023-10-05T20:36:58.756Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
rhba-2023_6928
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.",
"title": "Topic"
},
{
"category": "general",
"text": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2023:6928",
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index"
},
{
"category": "external",
"summary": "2186495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186495"
},
{
"category": "external",
"summary": "2226901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226901"
},
{
"category": "external",
"summary": "2230599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230599"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhba-2023_6928.json"
}
],
"title": "Red Hat Bug Fix Advisory: go-toolset:rhel8 bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-01-06T19:16:05+00:00",
"generator": {
"date": "2025-01-06T19:16:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.5"
}
},
"id": "RHBA-2023:6928",
"initial_release_date": "2023-11-14T16:04:55+00:00",
"revision_history": [
{
"date": "2023-11-14T16:04:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-14T16:04:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-06T19:16:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset:rhel8:8090020231013032436:26eb71ac",
"product": {
"name": "go-toolset:rhel8:8090020231013032436:26eb71ac",
"product_id": "go-toolset:rhel8:8090020231013032436:26eb71ac",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product": {
"name": "golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product_id": "golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product": {
"name": "golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product_id": "golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product": {
"name": "golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product_id": "golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product": {
"name": "golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product_id": "golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"product": {
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"product_id": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"product": {
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"product_id": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"product": {
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"product_id": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"product": {
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"product_id": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"product": {
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"product_id": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=src"
}
}
},
{
"category": "product_version",
"name": "delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"product": {
"name": "delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"product_id": "delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"product": {
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"product_id": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"product": {
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"product_id": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"product": {
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"product_id": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"product": {
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"product_id": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"product": {
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"product_id": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"product": {
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"product_id": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"product": {
"name": "delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"product_id": "delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"product": {
"name": "delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"product_id": "delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"product": {
"name": "delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"product_id": "delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"product": {
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"product_id": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"product": {
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"product_id": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"product": {
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"product_id": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
"product_reference": "go-toolset:rhel8:8090020231013032436:26eb71ac",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src"
},
"product_reference": "delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64 as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64"
},
"product_reference": "delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64 as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64"
},
"product_reference": "delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64 as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64"
},
"product_reference": "delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64 as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64"
},
"product_reference": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le"
},
"product_reference": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x"
},
"product_reference": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src"
},
"product_reference": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64 as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64"
},
"product_reference": "go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64 as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64"
},
"product_reference": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le"
},
"product_reference": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x"
},
"product_reference": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src"
},
"product_reference": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64 as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64"
},
"product_reference": "golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64 as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64"
},
"product_reference": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le"
},
"product_reference": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x"
},
"product_reference": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64 as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64"
},
"product_reference": "golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
},
"product_reference": "golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
},
"product_reference": "golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
},
"product_reference": "golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch as a component of go-toolset:rhel8:8090020231013032436:26eb71ac as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
},
"product_reference": "golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"relates_to_product_reference": "AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39318",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237776"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not properly handle HMTL-like \"\u003c!--\" and \"--\u003e\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of HTML-like comments within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "RHBZ#2237776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237776"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318"
},
{
"category": "external",
"summary": "https://go.dev/cl/526156",
"url": "https://go.dev/cl/526156"
},
{
"category": "external",
"summary": "https://go.dev/issue/62196",
"url": "https://go.dev/issue/62196"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2041.json",
"url": "https://vuln.go.dev/ID/GO-2023-2041.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of HTML-like comments within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39319",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237773"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of special tags within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "RHBZ#2237773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319"
},
{
"category": "external",
"summary": "https://go.dev/cl/526157",
"url": "https://go.dev/cl/526157"
},
{
"category": "external",
"summary": "https://go.dev/issue/62197",
"url": "https://go.dev/issue/62197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2043.json",
"url": "https://vuln.go.dev/ID/GO-2023-2043.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of special tags within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Martin Seemann"
]
}
],
"cve": "CVE-2023-39321",
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237777"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "RHBZ#2237777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2044.json",
"url": "https://vuln.go.dev/ID/GO-2023-2044.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections"
},
{
"acknowledgments": [
{
"names": [
"Marten Seemann"
]
}
],
"cve": "CVE-2023-39322",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237778"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: lack of a limit on buffered post-handshake",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "RHBZ#2237778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2045.json",
"url": "https://vuln.go.dev/ID/GO-2023-2045.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: lack of a limit on buffered post-handshake"
},
{
"cve": "CVE-2023-39323",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242544"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang cmd/go standard library. A line directive (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to pass during compilation. This can result in the unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/go: line directives allows arbitrary execution during build",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "RHBZ#2242544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323"
},
{
"category": "external",
"summary": "https://go.dev/cl/533215",
"url": "https://go.dev/cl/533215"
},
{
"category": "external",
"summary": "https://go.dev/issue/63211",
"url": "https://go.dev/issue/63211"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo",
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2095.json",
"url": "https://vuln.go.dev/ID/GO-2023-2095.json"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debuginfo-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:delve-debugsource-0:1.20.2-1.module+el8.9.0+18926+5193682d.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:go-toolset-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.src",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-bin-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-docs-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-misc-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-src-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch",
"AppStream-8.9.0.GA:go-toolset:rhel8:8090020231013032436:26eb71ac:golang-tests-0:1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/go: line directives allows arbitrary execution during build"
}
]
}
RHBA-2023:6928
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.",
"title": "Topic"
},
{
"category": "general",
"text": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2023:6928",
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index"
},
{
"category": "external",
"summary": "2186495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186495"
},
{
"category": "external",
"summary": "2226901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226901"
},
{
"category": "external",
"summary": "2230599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230599"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhba-2023_6928.json"
}
],
"title": "Red Hat Bug Fix Advisory: go-toolset:rhel8 bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-10-23T23:57:42+00:00",
"generator": {
"date": "2025-10-23T23:57:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHBA-2023:6928",
"initial_release_date": "2023-11-14T16:04:55+00:00",
"revision_history": [
{
"date": "2023-11-14T16:04:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-14T16:04:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:57:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8)",
"product_id": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8)",
"product_id": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8)",
"product_id": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"product": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm (go-toolset:rhel8)",
"product_id": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=src\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"product": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm (go-toolset:rhel8)",
"product_id": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=src\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"product": {
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm (go-toolset:rhel8)",
"product_id": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=src\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product": {
"name": "golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8)",
"product_id": "golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product": {
"name": "golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8)",
"product_id": "golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product": {
"name": "golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8)",
"product_id": "golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product": {
"name": "golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8)",
"product_id": "golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8)",
"product_id": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8)",
"product_id": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8)",
"product_id": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8)",
"product_id": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=s390x\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8)",
"product_id": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=s390x\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8)",
"product_id": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=s390x\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8)",
"product_id": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8)",
"product_id": "delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8)",
"product_id": "delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8)",
"product_id": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8)",
"product_id": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8)",
"product_id": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8"
},
"product_reference": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8"
},
"product_reference": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8"
},
"product_reference": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8"
},
"product_reference": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8"
},
"product_reference": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8"
},
"product_reference": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8"
},
"product_reference": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8"
},
"product_reference": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8"
},
"product_reference": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8"
},
"product_reference": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8"
},
"product_reference": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8"
},
"product_reference": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
},
"product_reference": "golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
},
"product_reference": "golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
},
"product_reference": "golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
},
"product_reference": "golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39318",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237776"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not properly handle HMTL-like \"\u003c!--\" and \"--\u003e\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of HTML-like comments within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "RHBZ#2237776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237776"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318"
},
{
"category": "external",
"summary": "https://go.dev/cl/526156",
"url": "https://go.dev/cl/526156"
},
{
"category": "external",
"summary": "https://go.dev/issue/62196",
"url": "https://go.dev/issue/62196"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2041.json",
"url": "https://vuln.go.dev/ID/GO-2023-2041.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of HTML-like comments within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39319",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237773"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of special tags within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "RHBZ#2237773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319"
},
{
"category": "external",
"summary": "https://go.dev/cl/526157",
"url": "https://go.dev/cl/526157"
},
{
"category": "external",
"summary": "https://go.dev/issue/62197",
"url": "https://go.dev/issue/62197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2043.json",
"url": "https://vuln.go.dev/ID/GO-2023-2043.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of special tags within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Martin Seemann"
]
}
],
"cve": "CVE-2023-39321",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237777"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw has been marked as moderate instead of high like NVD \nQUICConn.HandleData buffers data and passes it to handlePostHandshakeMessage every time the buffer contains a complete message, while HandleData doesn\u0027t limit the amount of data it can buffer, a panic or denial of service would likely be lower severity,also in order to exploit this vulnerability, an attacker would have to smuggle partial handshake data which might be rejected altogether as per tls RFC specification.Therfore because of a lower severity denial of service and conditions that are beyond the scope of attackers control,we have marked this as moderate severity",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "RHBZ#2237777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2044.json",
"url": "https://vuln.go.dev/ID/GO-2023-2044.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections"
},
{
"acknowledgments": [
{
"names": [
"Marten Seemann"
]
}
],
"cve": "CVE-2023-39322",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237778"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: lack of a limit on buffered post-handshake",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A vulnerability was found in the Go QUIC protocol implementation in the logic that processes post-handshake messages. It is an uncontrolled resource consumption flaw, triggered when a malicious connection sends data without an enforced upper bound. This leads to unbounded memory growth, causing the service to crash and resulting in a denial of service.The single-dimensional impact of denial of service and the added complexity of whether the resource exhaustion would happen, being out of an attacker\u0027s control,this has been rated as moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "RHBZ#2237778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2045.json",
"url": "https://vuln.go.dev/ID/GO-2023-2045.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: lack of a limit on buffered post-handshake"
},
{
"cve": "CVE-2023-39323",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242544"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang cmd/go standard library. A line directive (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to pass during compilation. This can result in the unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/go: line directives allows arbitrary execution during build",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This attack requires knowledge of the absolute path to the file containing the malicious directive, which significantly limits its feasibility for external attackers unless they already have local access or detailed knowledge of the system\u0027s layout. To exploit the vulnerability, an attacker must also convince a developer to download and build a malicious Go module\u2014an action typically constrained by trusted workflows and package verification.\n\nImportantly, this vulnerability does not impact running applications. Instead, it targets the development process, specifically developers or CI/CD pipelines during the build phase, further narrowing its scope.\n\nAs a result, this issue has been rated Moderate due to the multiple complex and unlikely prerequisites required for a successful exploit.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform leverages a web application firewall (WAF) to filter and block malicious input before it reaches the application. It applies managed and custom rule sets to detect suspicious patterns such as embedded scripting functions and remote code execution attempts. By enforcing strict input validation and preventing unauthorized execution of user-supplied code, the WAF reduces the risk of exploitation. Additional protections like rate limiting and bot mitigation help prevent automated injection attacks, while integration with logging, monitoring, and threat detection systems enhances visibility and response capabilities. Through real-time monitoring and automated blocking, the WAF provides a strong layer of defense against code injection vulnerabilities, lowering the likelihood of successful exploitation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "RHBZ#2242544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323"
},
{
"category": "external",
"summary": "https://go.dev/cl/533215",
"url": "https://go.dev/cl/533215"
},
{
"category": "external",
"summary": "https://go.dev/issue/63211",
"url": "https://go.dev/issue/63211"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo",
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2095.json",
"url": "https://vuln.go.dev/ID/GO-2023-2095.json"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/go: line directives allows arbitrary execution during build"
}
]
}
rhea-2023_7311
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for go-toolset-container is now available for Red Hat Enterprise Linux 8.",
"title": "Topic"
},
{
"category": "general",
"text": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2023:7311",
"url": "https://access.redhat.com/errata/RHEA-2023:7311"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index"
},
{
"category": "external",
"summary": "2235856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235856"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhea-2023_7311.json"
}
],
"title": "Red Hat Enhancement Advisory: go-toolset-container bug fix and enhancement update",
"tracking": {
"current_release_date": "2024-11-25T11:12:25+00:00",
"generator": {
"date": "2024-11-25T11:12:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHEA-2023:7311",
"initial_release_date": "2023-11-16T07:58:05+00:00",
"revision_history": [
{
"date": "2023-11-16T07:58:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-16T07:58:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T11:12:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product": {
"name": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_id": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5?arch=amd64\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product": {
"name": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_id": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5?arch=amd64\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product": {
"name": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_id": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9?arch=s390x\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product": {
"name": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_id": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9?arch=s390x\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product": {
"name": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_id": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015?arch=ppc64le\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product": {
"name": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_id": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015?arch=ppc64le\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product": {
"name": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_id": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a?arch=arm64\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product": {
"name": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_id": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a?arch=arm64\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le"
},
"product_reference": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x"
},
"product_reference": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64"
},
"product_reference": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
},
"product_reference": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le"
},
"product_reference": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x"
},
"product_reference": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64"
},
"product_reference": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
},
"product_reference": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39323",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242544"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang cmd/go standard library. A line directive (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to pass during compilation. This can result in the unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/go: line directives allows arbitrary execution during build",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "RHBZ#2242544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323"
},
{
"category": "external",
"summary": "https://go.dev/cl/533215",
"url": "https://go.dev/cl/533215"
},
{
"category": "external",
"summary": "https://go.dev/issue/63211",
"url": "https://go.dev/issue/63211"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo",
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2095.json",
"url": "https://vuln.go.dev/ID/GO-2023-2095.json"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-16T07:58:05+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2023:7311"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/go: line directives allows arbitrary execution during build"
}
]
}
rhea-2023:7311
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for go-toolset-container is now available for Red Hat Enterprise Linux 8.",
"title": "Topic"
},
{
"category": "general",
"text": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2023:7311",
"url": "https://access.redhat.com/errata/RHEA-2023:7311"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index"
},
{
"category": "external",
"summary": "2235856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235856"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhea-2023_7311.json"
}
],
"title": "Red Hat Enhancement Advisory: go-toolset-container bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-10-08T13:18:40+00:00",
"generator": {
"date": "2025-10-08T13:18:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHEA-2023:7311",
"initial_release_date": "2023-11-16T07:58:05+00:00",
"revision_history": [
{
"date": "2023-11-16T07:58:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-16T07:58:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-08T13:18:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product": {
"name": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_id": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5?arch=amd64\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product": {
"name": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_id": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5?arch=amd64\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product": {
"name": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_id": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9?arch=s390x\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product": {
"name": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_id": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9?arch=s390x\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product": {
"name": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_id": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015?arch=ppc64le\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product": {
"name": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_id": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015?arch=ppc64le\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product": {
"name": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_id": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a?arch=arm64\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product": {
"name": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_id": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a?arch=arm64\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le"
},
"product_reference": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x"
},
"product_reference": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64"
},
"product_reference": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
},
"product_reference": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le"
},
"product_reference": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x"
},
"product_reference": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64"
},
"product_reference": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
},
"product_reference": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39323",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242544"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang cmd/go standard library. A line directive (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to pass during compilation. This can result in the unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/go: line directives allows arbitrary execution during build",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This attack requires knowledge of the absolute path to the file containing the malicious directive, which significantly limits its feasibility for external attackers unless they already have local access or detailed knowledge of the system\u0027s layout. To exploit the vulnerability, an attacker must also convince a developer to download and build a malicious Go module\u2014an action typically constrained by trusted workflows and package verification.\n\nImportantly, this vulnerability does not impact running applications. Instead, it targets the development process, specifically developers or CI/CD pipelines during the build phase, further narrowing its scope.\n\nAs a result, this issue has been rated Moderate due to the multiple complex and unlikely prerequisites required for a successful exploit.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform leverages a web application firewall (WAF) to filter and block malicious input before it reaches the application. It applies managed and custom rule sets to detect suspicious patterns such as embedded scripting functions and remote code execution attempts. By enforcing strict input validation and preventing unauthorized execution of user-supplied code, the WAF reduces the risk of exploitation. Additional protections like rate limiting and bot mitigation help prevent automated injection attacks, while integration with logging, monitoring, and threat detection systems enhances visibility and response capabilities. Through real-time monitoring and automated blocking, the WAF provides a strong layer of defense against code injection vulnerabilities, lowering the likelihood of successful exploitation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "RHBZ#2242544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323"
},
{
"category": "external",
"summary": "https://go.dev/cl/533215",
"url": "https://go.dev/cl/533215"
},
{
"category": "external",
"summary": "https://go.dev/issue/63211",
"url": "https://go.dev/issue/63211"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo",
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2095.json",
"url": "https://vuln.go.dev/ID/GO-2023-2095.json"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-16T07:58:05+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2023:7311"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/go: line directives allows arbitrary execution during build"
}
]
}
RHEA-2023:7311
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for go-toolset-container is now available for Red Hat Enterprise Linux 8.",
"title": "Topic"
},
{
"category": "general",
"text": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2023:7311",
"url": "https://access.redhat.com/errata/RHEA-2023:7311"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index"
},
{
"category": "external",
"summary": "2235856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235856"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhea-2023_7311.json"
}
],
"title": "Red Hat Enhancement Advisory: go-toolset-container bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-10-08T13:18:40+00:00",
"generator": {
"date": "2025-10-08T13:18:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHEA-2023:7311",
"initial_release_date": "2023-11-16T07:58:05+00:00",
"revision_history": [
{
"date": "2023-11-16T07:58:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-16T07:58:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-08T13:18:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product": {
"name": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_id": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5?arch=amd64\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product": {
"name": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_id": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5?arch=amd64\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product": {
"name": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_id": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9?arch=s390x\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product": {
"name": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_id": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9?arch=s390x\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product": {
"name": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_id": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015?arch=ppc64le\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product": {
"name": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_id": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015?arch=ppc64le\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product": {
"name": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_id": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a?arch=arm64\u0026repository_url=registry.redhat.io/ubi8/go-toolset\u0026tag=1.20.10-3"
}
}
},
{
"category": "product_version",
"name": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product": {
"name": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_id": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a?arch=arm64\u0026repository_url=registry.redhat.io/rhel8/go-toolset\u0026tag=1.20.10-3"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le"
},
"product_reference": "rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x"
},
"product_reference": "rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64"
},
"product_reference": "rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
},
"product_reference": "rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le"
},
"product_reference": "ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x"
},
"product_reference": "ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64"
},
"product_reference": "ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
},
"product_reference": "ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"relates_to_product_reference": "AppStream-8.9.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39323",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242544"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang cmd/go standard library. A line directive (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to pass during compilation. This can result in the unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/go: line directives allows arbitrary execution during build",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This attack requires knowledge of the absolute path to the file containing the malicious directive, which significantly limits its feasibility for external attackers unless they already have local access or detailed knowledge of the system\u0027s layout. To exploit the vulnerability, an attacker must also convince a developer to download and build a malicious Go module\u2014an action typically constrained by trusted workflows and package verification.\n\nImportantly, this vulnerability does not impact running applications. Instead, it targets the development process, specifically developers or CI/CD pipelines during the build phase, further narrowing its scope.\n\nAs a result, this issue has been rated Moderate due to the multiple complex and unlikely prerequisites required for a successful exploit.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform leverages a web application firewall (WAF) to filter and block malicious input before it reaches the application. It applies managed and custom rule sets to detect suspicious patterns such as embedded scripting functions and remote code execution attempts. By enforcing strict input validation and preventing unauthorized execution of user-supplied code, the WAF reduces the risk of exploitation. Additional protections like rate limiting and bot mitigation help prevent automated injection attacks, while integration with logging, monitoring, and threat detection systems enhances visibility and response capabilities. Through real-time monitoring and automated blocking, the WAF provides a strong layer of defense against code injection vulnerabilities, lowering the likelihood of successful exploitation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "RHBZ#2242544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323"
},
{
"category": "external",
"summary": "https://go.dev/cl/533215",
"url": "https://go.dev/cl/533215"
},
{
"category": "external",
"summary": "https://go.dev/issue/63211",
"url": "https://go.dev/issue/63211"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo",
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2095.json",
"url": "https://vuln.go.dev/ID/GO-2023-2095.json"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-16T07:58:05+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2023:7311"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:rhel8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:1438b41a97337f91f08a7f4d6b859cc5232f1defb6067873a0dfe20970774015_ppc64le",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:697a8aa186f930077c1f766a56a8bc7c78f052aa55f77e99360d4f3150c525a9_s390x",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:c5e43b8090e6ed26c86143a4d7e6ff8fb8556485293f1343c1d7522f7e4c01c5_amd64",
"AppStream-8.9.0.GA:ubi8/go-toolset@sha256:cb8b8324d59b195dd02c71e5368d2022d6eef4d34d1a4bc3a6386656f5ae172a_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/go: line directives allows arbitrary execution during build"
}
]
}
rhba-2023:6928
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.",
"title": "Topic"
},
{
"category": "general",
"text": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2023:6928",
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index"
},
{
"category": "external",
"summary": "2186495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186495"
},
{
"category": "external",
"summary": "2226901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226901"
},
{
"category": "external",
"summary": "2230599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230599"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhba-2023_6928.json"
}
],
"title": "Red Hat Bug Fix Advisory: go-toolset:rhel8 bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-10-23T23:57:42+00:00",
"generator": {
"date": "2025-10-23T23:57:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHBA-2023:6928",
"initial_release_date": "2023-11-14T16:04:55+00:00",
"revision_history": [
{
"date": "2023-11-14T16:04:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-14T16:04:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:57:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8)",
"product_id": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8)",
"product_id": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8)",
"product_id": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"product": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm (go-toolset:rhel8)",
"product_id": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=src\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"product": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm (go-toolset:rhel8)",
"product_id": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=src\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"product": {
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm (go-toolset:rhel8)",
"product_id": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=src\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product": {
"name": "golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8)",
"product_id": "golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product": {
"name": "golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8)",
"product_id": "golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product": {
"name": "golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8)",
"product_id": "golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product": {
"name": "golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8)",
"product_id": "golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=noarch\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8)",
"product_id": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8)",
"product_id": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8)",
"product_id": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8)",
"product_id": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=s390x\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8)",
"product_id": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=s390x\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8)",
"product_id": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=s390x\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8)",
"product_id": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8)",
"product_id": "delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8)",
"product_id": "delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.20.2-1.module%2Bel8.9.0%2B18926%2B5193682d?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8)",
"product_id": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8)",
"product_id": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
},
{
"category": "product_version",
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8)",
"product_id": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.20.10-1.module%2Bel8.9.0%2B20382%2B04f7fe80?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8090020231013032436:26eb71ac"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8"
},
"product_reference": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8"
},
"product_reference": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8"
},
"product_reference": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8"
},
"product_reference": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8"
},
"product_reference": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8"
},
"product_reference": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8"
},
"product_reference": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8"
},
"product_reference": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8"
},
"product_reference": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8"
},
"product_reference": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8"
},
"product_reference": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8"
},
"product_reference": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8"
},
"product_reference": "golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
},
"product_reference": "golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
},
"product_reference": "golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
},
"product_reference": "golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
},
"product_reference": "golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.9.0.GA"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39318",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237776"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not properly handle HMTL-like \"\u003c!--\" and \"--\u003e\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of HTML-like comments within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "RHBZ#2237776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237776"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318"
},
{
"category": "external",
"summary": "https://go.dev/cl/526156",
"url": "https://go.dev/cl/526156"
},
{
"category": "external",
"summary": "https://go.dev/issue/62196",
"url": "https://go.dev/issue/62196"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2041.json",
"url": "https://vuln.go.dev/ID/GO-2023-2041.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of HTML-like comments within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39319",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237773"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of special tags within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "RHBZ#2237773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319"
},
{
"category": "external",
"summary": "https://go.dev/cl/526157",
"url": "https://go.dev/cl/526157"
},
{
"category": "external",
"summary": "https://go.dev/issue/62197",
"url": "https://go.dev/issue/62197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2043.json",
"url": "https://vuln.go.dev/ID/GO-2023-2043.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of special tags within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Martin Seemann"
]
}
],
"cve": "CVE-2023-39321",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237777"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw has been marked as moderate instead of high like NVD \nQUICConn.HandleData buffers data and passes it to handlePostHandshakeMessage every time the buffer contains a complete message, while HandleData doesn\u0027t limit the amount of data it can buffer, a panic or denial of service would likely be lower severity,also in order to exploit this vulnerability, an attacker would have to smuggle partial handshake data which might be rejected altogether as per tls RFC specification.Therfore because of a lower severity denial of service and conditions that are beyond the scope of attackers control,we have marked this as moderate severity",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "RHBZ#2237777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2044.json",
"url": "https://vuln.go.dev/ID/GO-2023-2044.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections"
},
{
"acknowledgments": [
{
"names": [
"Marten Seemann"
]
}
],
"cve": "CVE-2023-39322",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237778"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: lack of a limit on buffered post-handshake",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A vulnerability was found in the Go QUIC protocol implementation in the logic that processes post-handshake messages. It is an uncontrolled resource consumption flaw, triggered when a malicious connection sends data without an enforced upper bound. This leads to unbounded memory growth, causing the service to crash and resulting in a denial of service.The single-dimensional impact of denial of service and the added complexity of whether the resource exhaustion would happen, being out of an attacker\u0027s control,this has been rated as moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "RHBZ#2237778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2045.json",
"url": "https://vuln.go.dev/ID/GO-2023-2045.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: lack of a limit on buffered post-handshake"
},
{
"cve": "CVE-2023-39323",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242544"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang cmd/go standard library. A line directive (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to pass during compilation. This can result in the unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/go: line directives allows arbitrary execution during build",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This attack requires knowledge of the absolute path to the file containing the malicious directive, which significantly limits its feasibility for external attackers unless they already have local access or detailed knowledge of the system\u0027s layout. To exploit the vulnerability, an attacker must also convince a developer to download and build a malicious Go module\u2014an action typically constrained by trusted workflows and package verification.\n\nImportantly, this vulnerability does not impact running applications. Instead, it targets the development process, specifically developers or CI/CD pipelines during the build phase, further narrowing its scope.\n\nAs a result, this issue has been rated Moderate due to the multiple complex and unlikely prerequisites required for a successful exploit.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform leverages a web application firewall (WAF) to filter and block malicious input before it reaches the application. It applies managed and custom rule sets to detect suspicious patterns such as embedded scripting functions and remote code execution attempts. By enforcing strict input validation and preventing unauthorized execution of user-supplied code, the WAF reduces the risk of exploitation. Additional protections like rate limiting and bot mitigation help prevent automated injection attacks, while integration with logging, monitoring, and threat detection systems enhances visibility and response capabilities. Through real-time monitoring and automated blocking, the WAF provides a strong layer of defense against code injection vulnerabilities, lowering the likelihood of successful exploitation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "RHBZ#2242544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323"
},
{
"category": "external",
"summary": "https://go.dev/cl/533215",
"url": "https://go.dev/cl/533215"
},
{
"category": "external",
"summary": "https://go.dev/issue/63211",
"url": "https://go.dev/issue/63211"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo",
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2095.json",
"url": "https://vuln.go.dev/ID/GO-2023-2095.json"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-14T16:04:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2023:6928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debuginfo-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:delve-debugsource-1.20.2-1.module+el8.9.0+18926+5193682d.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.src.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.aarch64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.ppc64le.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.s390x.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80.x86_64.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8",
"AppStream-8.9.0.GA:golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80.noarch.rpm-go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/go: line directives allows arbitrary execution during build"
}
]
}
suse-su-2023:4018-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.20",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.20 fixes the following issues:\n\n- Updated to version 1.20.9 (bsc#1206346):\n\n - CVE-2023-39323: Fixed an arbitrary execution issue during build\n time due to path directive bypass (bsc#1215985).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4018,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4018,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4018,openSUSE-SLE-15.4-2023-4018,openSUSE-SLE-15.5-2023-4018",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4018-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4018-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234018-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4018-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016573.html"
},
{
"category": "self",
"summary": "SUSE Bug 1206346",
"url": "https://bugzilla.suse.com/1206346"
},
{
"category": "self",
"summary": "SUSE Bug 1215985",
"url": "https://bugzilla.suse.com/1215985"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39323/"
}
],
"title": "Security update for go1.20",
"tracking": {
"current_release_date": "2023-10-09T17:24:03Z",
"generator": {
"date": "2023-10-09T17:24:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4018-1",
"initial_release_date": "2023-10-09T17:24:03Z",
"revision_history": [
{
"date": "2023-10-09T17:24:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.20-1.20.9-150000.1.26.1.aarch64",
"product": {
"name": "go1.20-1.20.9-150000.1.26.1.aarch64",
"product_id": "go1.20-1.20.9-150000.1.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"product": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"product_id": "go1.20-doc-1.20.9-150000.1.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.20-race-1.20.9-150000.1.26.1.aarch64",
"product": {
"name": "go1.20-race-1.20.9-150000.1.26.1.aarch64",
"product_id": "go1.20-race-1.20.9-150000.1.26.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.20-1.20.9-150000.1.26.1.i586",
"product": {
"name": "go1.20-1.20.9-150000.1.26.1.i586",
"product_id": "go1.20-1.20.9-150000.1.26.1.i586"
}
},
{
"category": "product_version",
"name": "go1.20-doc-1.20.9-150000.1.26.1.i586",
"product": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.i586",
"product_id": "go1.20-doc-1.20.9-150000.1.26.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.20-1.20.9-150000.1.26.1.ppc64le",
"product": {
"name": "go1.20-1.20.9-150000.1.26.1.ppc64le",
"product_id": "go1.20-1.20.9-150000.1.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"product": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"product_id": "go1.20-doc-1.20.9-150000.1.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"product": {
"name": "go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"product_id": "go1.20-race-1.20.9-150000.1.26.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.20-1.20.9-150000.1.26.1.s390x",
"product": {
"name": "go1.20-1.20.9-150000.1.26.1.s390x",
"product_id": "go1.20-1.20.9-150000.1.26.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.20-doc-1.20.9-150000.1.26.1.s390x",
"product": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.s390x",
"product_id": "go1.20-doc-1.20.9-150000.1.26.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.20-race-1.20.9-150000.1.26.1.s390x",
"product": {
"name": "go1.20-race-1.20.9-150000.1.26.1.s390x",
"product_id": "go1.20-race-1.20.9-150000.1.26.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.20-1.20.9-150000.1.26.1.x86_64",
"product": {
"name": "go1.20-1.20.9-150000.1.26.1.x86_64",
"product_id": "go1.20-1.20.9-150000.1.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"product": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"product_id": "go1.20-doc-1.20.9-150000.1.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.20-race-1.20.9-150000.1.26.1.x86_64",
"product": {
"name": "go1.20-race-1.20.9-150000.1.26.1.x86_64",
"product_id": "go1.20-race-1.20.9-150000.1.26.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.ppc64le"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.s390x"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.ppc64le"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.s390x"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-race-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-race-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.ppc64le"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.s390x"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.ppc64le"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.s390x"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.ppc64le"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.s390x"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.ppc64le"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.s390x"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.ppc64le"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.s390x"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.ppc64le"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.s390x"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.ppc64le"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.s390x"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-150000.1.26.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.ppc64le"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.s390x"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-150000.1.26.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.aarch64"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.ppc64le"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.s390x"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-150000.1.26.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.x86_64"
},
"product_reference": "go1.20-race-1.20.9-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39323"
}
],
"notes": [
{
"category": "general",
"text": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-race-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39323",
"url": "https://www.suse.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "SUSE Bug 1215985 for CVE-2023-39323",
"url": "https://bugzilla.suse.com/1215985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-race-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-race-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-race-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.4:go1.20-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.4:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.4:go1.20-race-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.5:go1.20-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.5:go1.20-doc-1.20.9-150000.1.26.1.x86_64",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.aarch64",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.ppc64le",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.s390x",
"openSUSE Leap 15.5:go1.20-race-1.20.9-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-09T17:24:03Z",
"details": "important"
}
],
"title": "CVE-2023-39323"
}
]
}
suse-su-2023:4472-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.20-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.20-openssl fixes the following issues:\n\nUpdate to version 1.20.11.1 cut from the go1.20-openssl-fips\nbranch at the revision tagged go1.20.11-1-openssl-fips.\n\n* Update to go1.20.11\n\n\ngo1.20.11 (released 2023-11-07) includes security fixes to the\npath/filepath package, as well as bug fixes to the linker and the\nnet/http package.\n\n* security: fix CVE-2023-45283 CVE-2023-45284 path/filepath: insecure parsing of Windows paths (bsc#1216943, bsc#1216944)\n* cmd/link: split text sections for arm 32-bit\n* net/http: http2 page fails on firefox/safari if pushing resources\n\n\nUpdate to version 1.20.10.1 cut from the go1.20-openssl-fips\nbranch at the revision tagged go1.20.10-1-openssl-fips.\n\n* Update to go1.20.10\n\n\ngo1.20.10 (released 2023-10-10) includes a security fix to the\nnet/http package.\n\n* security: fix CVE-2023-39325 CVE-2023-44487 net/http: rapid stream resets can cause excessive work (bsc#1216109)\n\n \ngo1.20.9 (released 2023-10-05) includes one security fixes to the\ncmd/go package, as well as bug fixes to the go command and the\nlinker.\n\n* security: fix CVE-2023-39323 cmd/go: line directives allows arbitrary execution during build (bsc#1215985)\n* cmd/link: issues with Apple\u0027s new linker in Xcode 15 beta\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4472,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4472,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4472,openSUSE-SLE-15.4-2023-4472,openSUSE-SLE-15.5-2023-4472",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4472-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4472-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234472-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4472-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017047.html"
},
{
"category": "self",
"summary": "SUSE Bug 1206346",
"url": "https://bugzilla.suse.com/1206346"
},
{
"category": "self",
"summary": "SUSE Bug 1215985",
"url": "https://bugzilla.suse.com/1215985"
},
{
"category": "self",
"summary": "SUSE Bug 1216109",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "self",
"summary": "SUSE Bug 1216943",
"url": "https://bugzilla.suse.com/1216943"
},
{
"category": "self",
"summary": "SUSE Bug 1216944",
"url": "https://bugzilla.suse.com/1216944"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39325 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-44487 page",
"url": "https://www.suse.com/security/cve/CVE-2023-44487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45283 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45284 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45284/"
}
],
"title": "Security update for go1.20-openssl",
"tracking": {
"current_release_date": "2023-11-16T18:01:39Z",
"generator": {
"date": "2023-11-16T18:01:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4472-1",
"initial_release_date": "2023-11-16T18:01:39Z",
"revision_history": [
{
"date": "2023-11-16T18:01:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"product": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"product_id": "go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"product": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"product_id": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"product": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"product_id": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.i586",
"product": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.i586",
"product_id": "go1.20-openssl-1.20.11.1-150000.1.14.1.i586"
}
},
{
"category": "product_version",
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.i586",
"product": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.i586",
"product_id": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"product": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"product_id": "go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"product": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"product_id": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"product": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"product_id": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"product": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"product_id": "go1.20-openssl-1.20.11.1-150000.1.14.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"product": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"product_id": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"product": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"product_id": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"product": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"product_id": "go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"product": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"product_id": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"product": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"product_id": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
},
"product_reference": "go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39323"
}
],
"notes": [
{
"category": "general",
"text": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39323",
"url": "https://www.suse.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "SUSE Bug 1215985 for CVE-2023-39323",
"url": "https://bugzilla.suse.com/1215985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T18:01:39Z",
"details": "important"
}
],
"title": "CVE-2023-39323"
},
{
"cve": "CVE-2023-39325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39325"
}
],
"notes": [
{
"category": "general",
"text": "A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39325",
"url": "https://www.suse.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "SUSE Bug 1216109 for CVE-2023-39325",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "external",
"summary": "SUSE Bug 1230323 for CVE-2023-39325",
"url": "https://bugzilla.suse.com/1230323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T18:01:39Z",
"details": "important"
}
],
"title": "CVE-2023-39325"
},
{
"cve": "CVE-2023-44487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-44487"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-44487",
"url": "https://www.suse.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "SUSE Bug 1216109 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "external",
"summary": "SUSE Bug 1216123 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216123"
},
{
"category": "external",
"summary": "SUSE Bug 1216169 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216169"
},
{
"category": "external",
"summary": "SUSE Bug 1216171 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216171"
},
{
"category": "external",
"summary": "SUSE Bug 1216174 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216174"
},
{
"category": "external",
"summary": "SUSE Bug 1216176 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216176"
},
{
"category": "external",
"summary": "SUSE Bug 1216181 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216181"
},
{
"category": "external",
"summary": "SUSE Bug 1216182 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216182"
},
{
"category": "external",
"summary": "SUSE Bug 1216190 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T18:01:39Z",
"details": "important"
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45283"
}
],
"notes": [
{
"category": "general",
"text": "The filepath package does not recognize paths with a \\??\\ prefix as special. On Windows, a path beginning with \\??\\ is a Root Local Device path equivalent to a path beginning with \\\\?\\. Paths with a \\??\\ prefix may be used to access arbitrary locations on the system. For example, the path \\??\\c:\\x is equivalent to the more common path c:\\x. Before fix, Clean could convert a rooted path such as \\a\\..\\??\\b into the root local device path \\??\\b. Clean will now convert this to .\\??\\b. Similarly, Join(\\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \\??\\b. Join will now convert this to \\.\\??\\b. In addition, with fix, IsAbs now correctly reports paths beginning with \\??\\ as absolute, and VolumeName correctly reports the \\??\\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \\?, resulting in filepath.Clean(\\?\\c:) returning \\?\\c: rather than \\?\\c:\\ (among other effects). The previous behavior has been restored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45283",
"url": "https://www.suse.com/security/cve/CVE-2023-45283"
},
{
"category": "external",
"summary": "SUSE Bug 1216943 for CVE-2023-45283",
"url": "https://bugzilla.suse.com/1216943"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T18:01:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-45283"
},
{
"cve": "CVE-2023-45284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45284"
}
],
"notes": [
{
"category": "general",
"text": "On Windows, The IsLocal function does not correctly detect reserved device names in some cases. Reserved names followed by spaces, such as \"COM1 \", and reserved names \"COM\" and \"LPT\" followed by superscript 1, 2, or 3, are incorrectly reported as local. With fix, IsLocal now correctly reports these names as non-local.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45284",
"url": "https://www.suse.com/security/cve/CVE-2023-45284"
},
{
"category": "external",
"summary": "SUSE Bug 1216944 for CVE-2023-45284",
"url": "https://bugzilla.suse.com/1216944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.4:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-doc-1.20.11.1-150000.1.14.1.x86_64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.aarch64",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.ppc64le",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.s390x",
"openSUSE Leap 15.5:go1.20-openssl-race-1.20.11.1-150000.1.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T18:01:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-45284"
}
]
}
suse-su-2023:4017-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.21",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.21 fixes the following issues:\n\n- Updated to version 1.21.2 (bsc#1212475):\n\n - CVE-2023-39323: Fixed an arbitrary execution issue during build\n time due to path directive bypass (bsc#1215985).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4017,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4017,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4017,openSUSE-SLE-15.4-2023-4017,openSUSE-SLE-15.5-2023-4017",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4017-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4017-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234017-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4017-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016574.html"
},
{
"category": "self",
"summary": "SUSE Bug 1212475",
"url": "https://bugzilla.suse.com/1212475"
},
{
"category": "self",
"summary": "SUSE Bug 1215985",
"url": "https://bugzilla.suse.com/1215985"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39323/"
}
],
"title": "Security update for go1.21",
"tracking": {
"current_release_date": "2023-10-09T17:23:30Z",
"generator": {
"date": "2023-10-09T17:23:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4017-1",
"initial_release_date": "2023-10-09T17:23:30Z",
"revision_history": [
{
"date": "2023-10-09T17:23:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.2-150000.1.9.1.aarch64",
"product": {
"name": "go1.21-1.21.2-150000.1.9.1.aarch64",
"product_id": "go1.21-1.21.2-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"product": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"product_id": "go1.21-doc-1.21.2-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.2-150000.1.9.1.aarch64",
"product": {
"name": "go1.21-race-1.21.2-150000.1.9.1.aarch64",
"product_id": "go1.21-race-1.21.2-150000.1.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.2-150000.1.9.1.i586",
"product": {
"name": "go1.21-1.21.2-150000.1.9.1.i586",
"product_id": "go1.21-1.21.2-150000.1.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.2-150000.1.9.1.i586",
"product": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.i586",
"product_id": "go1.21-doc-1.21.2-150000.1.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.2-150000.1.9.1.ppc64le",
"product": {
"name": "go1.21-1.21.2-150000.1.9.1.ppc64le",
"product_id": "go1.21-1.21.2-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"product": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"product_id": "go1.21-doc-1.21.2-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"product": {
"name": "go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"product_id": "go1.21-race-1.21.2-150000.1.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.2-150000.1.9.1.s390x",
"product": {
"name": "go1.21-1.21.2-150000.1.9.1.s390x",
"product_id": "go1.21-1.21.2-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.2-150000.1.9.1.s390x",
"product": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.s390x",
"product_id": "go1.21-doc-1.21.2-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.2-150000.1.9.1.s390x",
"product": {
"name": "go1.21-race-1.21.2-150000.1.9.1.s390x",
"product_id": "go1.21-race-1.21.2-150000.1.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.2-150000.1.9.1.x86_64",
"product": {
"name": "go1.21-1.21.2-150000.1.9.1.x86_64",
"product_id": "go1.21-1.21.2-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"product": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"product_id": "go1.21-doc-1.21.2-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.2-150000.1.9.1.x86_64",
"product": {
"name": "go1.21-race-1.21.2-150000.1.9.1.x86_64",
"product_id": "go1.21-race-1.21.2-150000.1.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.s390x"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.s390x"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.s390x"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.s390x"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.s390x"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.s390x"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.s390x"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.s390x"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.s390x"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-150000.1.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.s390x"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-150000.1.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.s390x"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-150000.1.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.21-race-1.21.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39323"
}
],
"notes": [
{
"category": "general",
"text": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39323",
"url": "https://www.suse.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "SUSE Bug 1215985 for CVE-2023-39323",
"url": "https://bugzilla.suse.com/1215985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-race-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.4:go1.21-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.4:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.4:go1.21-race-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.5:go1.21-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.5:go1.21-doc-1.21.2-150000.1.9.1.x86_64",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.aarch64",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.ppc64le",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.s390x",
"openSUSE Leap 15.5:go1.21-race-1.21.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-09T17:23:30Z",
"details": "important"
}
],
"title": "CVE-2023-39323"
}
]
}
suse-su-2023:4469-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.21-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.21-openssl fixes the following issues:\n\nUpdate to version 1.21.4.1 cut from the go1.21-openssl-fips\nbranch at the revision tagged go1.21.4-1-openssl-fips.\n\n* Update to go1.21.4\n\n\ngo1.21.4 (released 2023-11-07) includes security fixes to the\npath/filepath package, as well as bug fixes to the linker, the\nruntime, the compiler, and the go/types, net/http, and\nruntime/cgo packages.\n\n* security: fix CVE-2023-45283 CVE-2023-45284 path/filepath: insecure parsing of Windows paths (bsc#1216943, bsc#1216944)\n* spec: update unification rules\n* cmd/compile: internal compiler error: expected struct value to have type struct\n* cmd/link: split text sections for arm 32-bit\n* runtime: MADV_COLLAPSE causes production performance issues on Linux\n* go/types, x/tools/go/ssa: panic: type param without replacement encountered\n* cmd/compile: -buildmode=c-archive produces code not suitable for use in a shared object on arm64\n* net/http: http2 page fails on firefox/safari if pushing resources\n\n\nInitial package go1.21-openssl version 1.21.3.1 cut from the\ngo1.21-openssl-fips branch at the revision tagged\ngo1.21.3-1-openssl-fips. (jsc#SLE-18320)\n\n* Go upstream merged branch dev.boringcrypto in go1.19+.\n* In go1.x enable BoringCrypto via GOEXPERIMENT=boringcrypto.\n* In go1.x-openssl enable FIPS mode (or boring mode as the\n package is named) either via an environment variable\n GOLANG_FIPS=1 or by virtue of booting the host in FIPS mode.\n* When the operating system is operating in FIPS mode, Go\n applications which import crypto/tls/fipsonly limit operations\n to the FIPS ciphersuite.\n* go1.x-openssl is delivered as two large patches to go1.x\n applying necessary modifications from the golang-fips/go GitHub\n project for the Go crypto library to use OpenSSL as the\n external cryptographic library in a FIPS compliant way.\n* go1.x-openssl modifies the crypto/* packages to use OpenSSL for\n cryptographic operations.\n* go1.x-openssl uses dlopen() to call into OpenSSL.\n* SUSE RPM packaging introduces a fourth version digit go1.x.y.z\n corresponding to the golang-fips/go patchset tagged revision.\n* Patchset improvements can be updated independently of upstream\n Go maintenance releases.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4469,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4469,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4469,openSUSE-SLE-15.4-2023-4469,openSUSE-SLE-15.5-2023-4469",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4469-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4469-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234469-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4469-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html"
},
{
"category": "self",
"summary": "SUSE Bug 1212475",
"url": "https://bugzilla.suse.com/1212475"
},
{
"category": "self",
"summary": "SUSE Bug 1212667",
"url": "https://bugzilla.suse.com/1212667"
},
{
"category": "self",
"summary": "SUSE Bug 1212669",
"url": "https://bugzilla.suse.com/1212669"
},
{
"category": "self",
"summary": "SUSE Bug 1215084",
"url": "https://bugzilla.suse.com/1215084"
},
{
"category": "self",
"summary": "SUSE Bug 1215085",
"url": "https://bugzilla.suse.com/1215085"
},
{
"category": "self",
"summary": "SUSE Bug 1215086",
"url": "https://bugzilla.suse.com/1215086"
},
{
"category": "self",
"summary": "SUSE Bug 1215087",
"url": "https://bugzilla.suse.com/1215087"
},
{
"category": "self",
"summary": "SUSE Bug 1215090",
"url": "https://bugzilla.suse.com/1215090"
},
{
"category": "self",
"summary": "SUSE Bug 1215985",
"url": "https://bugzilla.suse.com/1215985"
},
{
"category": "self",
"summary": "SUSE Bug 1216109",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "self",
"summary": "SUSE Bug 1216943",
"url": "https://bugzilla.suse.com/1216943"
},
{
"category": "self",
"summary": "SUSE Bug 1216944",
"url": "https://bugzilla.suse.com/1216944"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39318 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39319 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39320 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39321 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39322 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39325 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-44487 page",
"url": "https://www.suse.com/security/cve/CVE-2023-44487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45283 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45284 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45284/"
}
],
"title": "Security update for go1.21-openssl",
"tracking": {
"current_release_date": "2023-11-16T17:59:49Z",
"generator": {
"date": "2023-11-16T17:59:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4469-1",
"initial_release_date": "2023-11-16T17:59:49Z",
"revision_history": [
{
"date": "2023-11-16T17:59:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"product": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"product_id": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"product": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"product_id": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"product": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"product_id": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.i586",
"product": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.i586",
"product_id": "go1.21-openssl-1.21.4.1-150000.1.5.1.i586"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.i586",
"product": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.i586",
"product_id": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"product": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"product_id": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"product": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"product_id": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"product": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"product_id": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"product": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"product_id": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"product": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"product_id": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"product": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"product_id": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"product": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"product_id": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"product": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"product_id": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"product": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"product_id": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
},
"product_reference": "go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39318"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39318",
"url": "https://www.suse.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "SUSE Bug 1215084 for CVE-2023-39318",
"url": "https://bugzilla.suse.com/1215084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "moderate"
}
],
"title": "CVE-2023-39318"
},
{
"cve": "CVE-2023-39319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39319"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39319",
"url": "https://www.suse.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "SUSE Bug 1215085 for CVE-2023-39319",
"url": "https://bugzilla.suse.com/1215085"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "moderate"
}
],
"title": "CVE-2023-39319"
},
{
"cve": "CVE-2023-39320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39320"
}
],
"notes": [
{
"category": "general",
"text": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39320",
"url": "https://www.suse.com/security/cve/CVE-2023-39320"
},
{
"category": "external",
"summary": "SUSE Bug 1215086 for CVE-2023-39320",
"url": "https://bugzilla.suse.com/1215086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-39320"
},
{
"cve": "CVE-2023-39321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39321"
}
],
"notes": [
{
"category": "general",
"text": "Processing an incomplete post-handshake message for a QUIC connection can cause a panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39321",
"url": "https://www.suse.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "SUSE Bug 1215087 for CVE-2023-39321",
"url": "https://bugzilla.suse.com/1215087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-39321"
},
{
"cve": "CVE-2023-39322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39322"
}
],
"notes": [
{
"category": "general",
"text": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39322",
"url": "https://www.suse.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "SUSE Bug 1215087 for CVE-2023-39322",
"url": "https://bugzilla.suse.com/1215087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-39322"
},
{
"cve": "CVE-2023-39323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39323"
}
],
"notes": [
{
"category": "general",
"text": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39323",
"url": "https://www.suse.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "SUSE Bug 1215985 for CVE-2023-39323",
"url": "https://bugzilla.suse.com/1215985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-39323"
},
{
"cve": "CVE-2023-39325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39325"
}
],
"notes": [
{
"category": "general",
"text": "A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39325",
"url": "https://www.suse.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "SUSE Bug 1216109 for CVE-2023-39325",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "external",
"summary": "SUSE Bug 1230323 for CVE-2023-39325",
"url": "https://bugzilla.suse.com/1230323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-39325"
},
{
"cve": "CVE-2023-44487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-44487"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-44487",
"url": "https://www.suse.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "SUSE Bug 1216109 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "external",
"summary": "SUSE Bug 1216123 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216123"
},
{
"category": "external",
"summary": "SUSE Bug 1216169 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216169"
},
{
"category": "external",
"summary": "SUSE Bug 1216171 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216171"
},
{
"category": "external",
"summary": "SUSE Bug 1216174 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216174"
},
{
"category": "external",
"summary": "SUSE Bug 1216176 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216176"
},
{
"category": "external",
"summary": "SUSE Bug 1216181 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216181"
},
{
"category": "external",
"summary": "SUSE Bug 1216182 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216182"
},
{
"category": "external",
"summary": "SUSE Bug 1216190 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "important"
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45283"
}
],
"notes": [
{
"category": "general",
"text": "The filepath package does not recognize paths with a \\??\\ prefix as special. On Windows, a path beginning with \\??\\ is a Root Local Device path equivalent to a path beginning with \\\\?\\. Paths with a \\??\\ prefix may be used to access arbitrary locations on the system. For example, the path \\??\\c:\\x is equivalent to the more common path c:\\x. Before fix, Clean could convert a rooted path such as \\a\\..\\??\\b into the root local device path \\??\\b. Clean will now convert this to .\\??\\b. Similarly, Join(\\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \\??\\b. Join will now convert this to \\.\\??\\b. In addition, with fix, IsAbs now correctly reports paths beginning with \\??\\ as absolute, and VolumeName correctly reports the \\??\\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \\?, resulting in filepath.Clean(\\?\\c:) returning \\?\\c: rather than \\?\\c:\\ (among other effects). The previous behavior has been restored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45283",
"url": "https://www.suse.com/security/cve/CVE-2023-45283"
},
{
"category": "external",
"summary": "SUSE Bug 1216943 for CVE-2023-45283",
"url": "https://bugzilla.suse.com/1216943"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "moderate"
}
],
"title": "CVE-2023-45283"
},
{
"cve": "CVE-2023-45284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45284"
}
],
"notes": [
{
"category": "general",
"text": "On Windows, The IsLocal function does not correctly detect reserved device names in some cases. Reserved names followed by spaces, such as \"COM1 \", and reserved names \"COM\" and \"LPT\" followed by superscript 1, 2, or 3, are incorrectly reported as local. With fix, IsLocal now correctly reports these names as non-local.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45284",
"url": "https://www.suse.com/security/cve/CVE-2023-45284"
},
{
"category": "external",
"summary": "SUSE Bug 1216944 for CVE-2023-45284",
"url": "https://bugzilla.suse.com/1216944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.4:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-doc-1.21.4.1-150000.1.5.1.x86_64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.aarch64",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.ppc64le",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.s390x",
"openSUSE Leap 15.5:go1.21-openssl-race-1.21.4.1-150000.1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T17:59:49Z",
"details": "moderate"
}
],
"title": "CVE-2023-45284"
}
]
}
fkie_cve-2023-39323
Vulnerability from fkie_nvd
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| security@golang.org | https://go.dev/cl/533215 | Patch | |
| security@golang.org | https://go.dev/issue/63211 | Issue Tracking, Patch | |
| security@golang.org | https://groups.google.com/g/golang-announce/c/XBa1oHDevAo | Mailing List, Release Notes | |
| security@golang.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/ | Mailing List, Third Party Advisory | |
| security@golang.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/ | Mailing List, Third Party Advisory | |
| security@golang.org | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/ | Mailing List, Third Party Advisory | |
| security@golang.org | https://pkg.go.dev/vuln/GO-2023-2095 | Vendor Advisory | |
| security@golang.org | https://security.gentoo.org/glsa/202311-09 | Third Party Advisory | |
| security@golang.org | https://security.netapp.com/advisory/ntap-20231020-0001/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://go.dev/cl/533215 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://go.dev/issue/63211 | Issue Tracking, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/g/golang-announce/c/XBa1oHDevAo | Mailing List, Release Notes | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/ | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/ | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/ | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://pkg.go.dev/vuln/GO-2023-2095 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202311-09 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20231020-0001/ | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| golang | go | * | |
| golang | go | * | |
| fedoraproject | fedora | 37 | |
| fedoraproject | fedora | 38 | |
| fedoraproject | fedora | 39 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84851C3D-3035-457E-96D9-48E219817D58",
"versionEndExcluding": "1.20.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7381A279-81EB-48D9-8065-C733FA8736B8",
"versionEndExcluding": "1.21.2",
"versionStartIncluding": "1.21.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex."
},
{
"lang": "es",
"value": "Las directivas de l\u00ednea (\"//line\") se pueden utilizar para evitar las restricciones de las directivas \"//go:cgo_\", permitiendo que se pasen indicadores bloqueados del enlazador y del compilador durante la compilaci\u00f3n. Esto puede provocar la ejecuci\u00f3n inesperada de c\u00f3digo arbitrario al ejecutar \"go build\". La directiva de l\u00ednea requiere la ruta absoluta del archivo en el que se encuentra la directiva, lo que hace que explotar este problema sea significativamente m\u00e1s complejo."
}
],
"id": "CVE-2023-39323",
"lastModified": "2025-06-12T16:15:20.520",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-10-05T21:15:11.283",
"references": [
{
"source": "security@golang.org",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/533215"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://go.dev/issue/63211"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Release Notes"
],
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2095"
},
{
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20231020-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/533215"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://go.dev/issue/63211"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Release Notes"
],
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2095"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20231020-0001/"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
opensuse-su-2024:13306-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.20-1.20.9-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.20-1.20.9-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13306",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13306-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39323/"
}
],
"title": "go1.20-1.20.9-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13306-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.20-1.20.9-1.1.aarch64",
"product": {
"name": "go1.20-1.20.9-1.1.aarch64",
"product_id": "go1.20-1.20.9-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.20-doc-1.20.9-1.1.aarch64",
"product": {
"name": "go1.20-doc-1.20.9-1.1.aarch64",
"product_id": "go1.20-doc-1.20.9-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.20-libstd-1.20.9-1.1.aarch64",
"product": {
"name": "go1.20-libstd-1.20.9-1.1.aarch64",
"product_id": "go1.20-libstd-1.20.9-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.20-race-1.20.9-1.1.aarch64",
"product": {
"name": "go1.20-race-1.20.9-1.1.aarch64",
"product_id": "go1.20-race-1.20.9-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.20-1.20.9-1.1.ppc64le",
"product": {
"name": "go1.20-1.20.9-1.1.ppc64le",
"product_id": "go1.20-1.20.9-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.20-doc-1.20.9-1.1.ppc64le",
"product": {
"name": "go1.20-doc-1.20.9-1.1.ppc64le",
"product_id": "go1.20-doc-1.20.9-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.20-libstd-1.20.9-1.1.ppc64le",
"product": {
"name": "go1.20-libstd-1.20.9-1.1.ppc64le",
"product_id": "go1.20-libstd-1.20.9-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.20-race-1.20.9-1.1.ppc64le",
"product": {
"name": "go1.20-race-1.20.9-1.1.ppc64le",
"product_id": "go1.20-race-1.20.9-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.20-1.20.9-1.1.s390x",
"product": {
"name": "go1.20-1.20.9-1.1.s390x",
"product_id": "go1.20-1.20.9-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.20-doc-1.20.9-1.1.s390x",
"product": {
"name": "go1.20-doc-1.20.9-1.1.s390x",
"product_id": "go1.20-doc-1.20.9-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.20-libstd-1.20.9-1.1.s390x",
"product": {
"name": "go1.20-libstd-1.20.9-1.1.s390x",
"product_id": "go1.20-libstd-1.20.9-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.20-race-1.20.9-1.1.s390x",
"product": {
"name": "go1.20-race-1.20.9-1.1.s390x",
"product_id": "go1.20-race-1.20.9-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.20-1.20.9-1.1.x86_64",
"product": {
"name": "go1.20-1.20.9-1.1.x86_64",
"product_id": "go1.20-1.20.9-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.20-doc-1.20.9-1.1.x86_64",
"product": {
"name": "go1.20-doc-1.20.9-1.1.x86_64",
"product_id": "go1.20-doc-1.20.9-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.20-libstd-1.20.9-1.1.x86_64",
"product": {
"name": "go1.20-libstd-1.20.9-1.1.x86_64",
"product_id": "go1.20-libstd-1.20.9-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.20-race-1.20.9-1.1.x86_64",
"product": {
"name": "go1.20-race-1.20.9-1.1.x86_64",
"product_id": "go1.20-race-1.20.9-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-1.20.9-1.1.aarch64"
},
"product_reference": "go1.20-1.20.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-1.20.9-1.1.ppc64le"
},
"product_reference": "go1.20-1.20.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-1.20.9-1.1.s390x"
},
"product_reference": "go1.20-1.20.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-1.20.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-1.20.9-1.1.x86_64"
},
"product_reference": "go1.20-1.20.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.aarch64"
},
"product_reference": "go1.20-doc-1.20.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.ppc64le"
},
"product_reference": "go1.20-doc-1.20.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.s390x"
},
"product_reference": "go1.20-doc-1.20.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-doc-1.20.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.x86_64"
},
"product_reference": "go1.20-doc-1.20.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-libstd-1.20.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.aarch64"
},
"product_reference": "go1.20-libstd-1.20.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-libstd-1.20.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.ppc64le"
},
"product_reference": "go1.20-libstd-1.20.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-libstd-1.20.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.s390x"
},
"product_reference": "go1.20-libstd-1.20.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-libstd-1.20.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.x86_64"
},
"product_reference": "go1.20-libstd-1.20.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.aarch64"
},
"product_reference": "go1.20-race-1.20.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.ppc64le"
},
"product_reference": "go1.20-race-1.20.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.s390x"
},
"product_reference": "go1.20-race-1.20.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.20-race-1.20.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.x86_64"
},
"product_reference": "go1.20-race-1.20.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39323"
}
],
"notes": [
{
"category": "general",
"text": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39323",
"url": "https://www.suse.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "SUSE Bug 1215985 for CVE-2023-39323",
"url": "https://bugzilla.suse.com/1215985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-1.20.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-doc-1.20.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-libstd-1.20.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.s390x",
"openSUSE Tumbleweed:go1.20-race-1.20.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-39323"
}
]
}
opensuse-su-2023:0360-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.21",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update introduces go1.21, including fixes for the following issues:\n\n- go1.21.3 (released 2023-10-10) includes a security fix to the\n net/http package.\n Refs boo#1212475 go1.21 release tracking\n CVE-2023-39325 CVE-2023-44487\n * go#63427 go#63417 boo#1216109 security: fix CVE-2023-39325 CVE-2023-44487 net/http: rapid stream resets can cause excessive work\n\n- go1.21.2 (released 2023-10-05) includes one security fixes to the\n cmd/go package, as well as bug fixes to the compiler, the go\n command, the linker, the runtime, and the runtime/metrics\n package.\n Refs boo#1212475 go1.21 release tracking\n CVE-2023-39323\n * go#63214 go#63211 boo#1215985 security: fix CVE-2023-39323 cmd/go: line directives allows arbitrary execution during build\n * go#62464 runtime: \u0027traceback did not unwind completely\u0027\n * go#62478 runtime/metrics: /gc/scan* metrics return zero\n * go#62505 plugin: variable not initialized properly\n * go#62506 cmd/compile: internal compiler error: InvertFlags should never make it to codegen v100 = InvertFlags v123\n * go#62509 runtime: scheduler change causes Delve\u0027s function call injection to fail intermittently\n * go#62537 runtime: \u0027fatal: morestack on g0\u0027 with PGO enabled on arm64\n * go#62598 cmd/link: issues with Apple\u0027s new linker in Xcode 15 beta\n * go#62668 cmd/compile: slow to compile 17,000 line switch statement?\n * go#62711 cmd/go: TestScript/gotoolchain_path fails if golang.org/dl/go1.21.1 is installed in the user\u0027s $PATH\n\n- go1.21.1 (released 2023-09-06) includes four security fixes to\n the cmd/go, crypto/tls, and html/template packages, as well as\n bug fixes to the compiler, the go command, the linker, the\n runtime, and the context, crypto/tls, encoding/gob, encoding/xml,\n go/types, net/http, os, and path/filepath packages.\n Refs boo#1212475 go1.21 release tracking\n CVE-2023-39318 CVE-2023-39319 CVE-2023-39320 CVE-2023-39321 CVE-2023-39322\n * go#62290 go#62266 boo#1215087 security: fix CVE-2023-39321 CVE-2023-39322 crypto/tls: panic when processing partial post-handshake message in QUICConn.HandleData\n * go#62394 go#62198 boo#1215086 security: fix CVE-2023-39320 cmd/go: go.mod toolchain directive allows arbitrary execution\n * go#62396 go#62196 boo#1215084 security: fix CVE-2023-39318 html/template: improper handling of HTML-like comments within script contexts\n * go#62398 go#62197 boo#1215085 security: fix CVE-2023-39319 html/template: improper handling of special tags within script contexts\n * go#61743 go/types: interface.Complete panics for interfaces with duplicate methods\n * go#61781 cmd/compile: internal compiler error: \u0027f\u0027: value .autotmp_1 (nil) incorrectly live at entry\n * go#61818 cmd/go: panic: runtime error: index out of range [-1] in collectDepsErrors\n * go#61821 runtime/internal/wasitest: TestTCPEcho is racy\n * go#61868 path/filepath: Clean on some invalid Windows paths can lose .. components\n * go#61904 net/http: go 1.20.6 host validation breaks setting Host to a unix socket address\n * go#61905 cmd/go: go get/mod tidy panics with internal error: net token acquired but not released\n * go#61909 cmd/compile: internal compiler error: missed typecheck\n * go#61910 os: ReadDir fails on file systems without File ID support on Windows\n * go#61927 cmd/distpack: release archives don\u0027t include directory members\n * go#61930 spec, go/types, types2: restore Go 1.20 unification when compiling for Go 1.20\n * go#61932 go/types, types2: index out of range panic in Checker.arguments\n * go#61958 cmd/compile: write barrier code is sometimes preemptible when compiled with -N\n * go#61959 go/types, types2: panic: infinite recursion in unification with go1.21.0\n * go#61964 os: ReadDir(\\\\.\\pipe\\) fails with go1.21 on Windows\n * go#61967 crypto/tls: add GODEBUG to control max RSA key size\n * go#61987 runtime: simple programs crash on linux/386 with go1.21 when build with -gcflags=\u0027all=-N -l\u0027\n * go#62019 runtime: execution halts with goroutines stuck in runtime.gopark (protocol error E08 during memory read for packet)\n * go#62046 runtime/trace: segfault in runtime.fpTracebackPCs during deferred call after recovering from panic\n * go#62051 encoding/xml: incompatible changes in the Go 1.21.0\n * go#62057 cmd/compile: internal compiler error: \u0027F\u0027: func F, startMem[b1] has different values\n * go#62071 cmd/api: make non-importable\n * go#62140 cmd/link: slice bounds out of range\n * go#62143 hash/crc32: panic on arm64 with go1.21.0 when indexing slice\n * go#62144 cmd/go: locating GOROOT fails when the go command is run from the cross-compiled bin subdirectory\n * go#62154 encoding/gob: panic decoding into local type, received remote type\n * go#62189 context: misuse of sync.Cond in ExampleAfterFunc_cond\n * go#62204 maps: segfault in Clone\n * go#62205 cmd/compile: backward incompatible change in Go 1.21 type inference with channels\n * go#62222 cmd/go: \u0027go test -o\u0027 may fail with ETXTBSY when running the compiled test\n * go#62328 net/http: http client regression building with js/wasm and running on Chrome: net::ERR_H2_OR_QUIC_REQUIRED\n * go#62329 runtime: MADV_HUGEPAGE causes stalls when allocating memory\n\n- go1.21 (released 2023-08-08) is a major release of Go.\n go1.21.x minor releases will be provided through August 2024.\n https://github.com/golang/go/wiki/Go-Release-Cycle\n go1.21 arrives six months after go1.20. Most of its changes are\n in the implementation of the toolchain, runtime, and libraries.\n As always, the release maintains the Go 1 promise of\n compatibility. We expect almost all Go programs to continue to\n compile and run as before.\n Refs boo#1212475 go1.21 release tracking\n * Go 1.21 introduces a small change to the numbering of\n releases. In the past, we used Go 1.N to refer to both the\n overall Go language version and release family as well as the\n first release in that family. Starting in Go 1.21, the first\n release is now Go 1.N.0. Today we are releasing both the Go\n 1.21 language and its initial implementation, the Go 1.21.0\n release. These notes refer to \u0027Go 1.21\u0027; tools like go version\n will report \u0027go1.21.0\u0027 (until you upgrade to Go 1.21.1). See\n \u0027Go versions\u0027 in the \u0027Go Toolchains\u0027 documentation for details\n about the new version numbering.\n * Language change: Go 1.21 adds three new built-ins to the\n language.\n * Language change: The new functions min and max compute the\n smallest (or largest, for max) value of a fixed number of given\n arguments. See the language spec for details.\n * Language change: The new function clear deletes all elements\n from a map or zeroes all elements of a slice. See the language\n spec for details.\n * Package initialization order is now specified more\n precisely. This may change the behavior of some programs that\n rely on a specific initialization ordering that was not\n expressed by explicit imports. The behavior of such programs\n was not well defined by the spec in past releases. The new rule\n provides an unambiguous definition.\n * Multiple improvements that increase the power and precision of\n type inference have been made.\n * A (possibly partially instantiated generic) function may now be\n called with arguments that are themselves (possibly partially\n instantiated) generic functions.\n * Type inference now also considers methods when a value is\n assigned to an interface: type arguments for type parameters\n used in method signatures may be inferred from the\n corresponding parameter types of matching methods.\n * Similarly, since a type argument must implement all the methods\n of its corresponding constraint, the methods of the type\n argument and constraint are matched which may lead to the\n inference of additional type arguments.\n * If multiple untyped constant arguments of different kinds (such\n as an untyped int and an untyped floating-point constant) are\n passed to parameters with the same (not otherwise specified)\n type parameter type, instead of an error, now type inference\n determines the type using the same approach as an operator with\n untyped constant operands. This change brings the types\n inferred from untyped constant arguments in line with the types\n of constant expressions.\n * Type inference is now precise when matching corresponding types\n in assignments\n * The description of type inference in the language spec has been\n clarified.\n * Go 1.21 includes a preview of a language change we are\n considering for a future version of Go: making for loop\n variables per-iteration instead of per-loop, to avoid\n accidental sharing bugs. For details about how to try that\n language change, see the LoopvarExperiment wiki page.\n * Go 1.21 now defines that if a goroutine is panicking and\n recover was called directly by a deferred function, the return\n value of recover is guaranteed not to be nil. To ensure this,\n calling panic with a nil interface value (or an untyped nil)\n causes a run-time panic of type *runtime.PanicNilError.\n To support programs written for older versions of Go, nil\n panics can be re-enabled by setting GODEBUG=panicnil=1. This\n setting is enabled automatically when compiling a program whose\n main package is in a module with that declares go 1.20 or\n earlier.\n * Go 1.21 adds improved support for backwards compatibility and\n forwards compatibility in the Go toolchain.\n * To improve backwards compatibility, Go 1.21 formalizes Go\u0027s use\n of the GODEBUG environment variable to control the default\n behavior for changes that are non-breaking according to the\n compatibility policy but nonetheless may cause existing\n programs to break. (For example, programs that depend on buggy\n behavior may break when a bug is fixed, but bug fixes are not\n considered breaking changes.) When Go must make this kind of\n behavior change, it now chooses between the old and new\n behavior based on the go line in the workspace\u0027s go.work file\n or else the main module\u0027s go.mod file. Upgrading to a new Go\n toolchain but leaving the go line set to its original (older)\n Go version preserves the behavior of the older toolchain. With\n this compatibility support, the latest Go toolchain should\n always be the best, most secure, implementation of an older\n version of Go. See \u0027Go, Backwards Compatibility, and GODEBUG\u0027\n for details.\n * To improve forwards compatibility, Go 1.21 now reads the go\n line in a go.work or go.mod file as a strict minimum\n requirement: go 1.21.0 means that the workspace or module\n cannot be used with Go 1.20 or with Go 1.21rc1. This allows\n projects that depend on fixes made in later versions of Go to\n ensure that they are not used with earlier versions. It also\n gives better error reporting for projects that make use of new\n Go features: when the problem is that a newer Go version is\n needed, that problem is reported clearly, instead of attempting\n to build the code and instead printing errors about unresolved\n imports or syntax errors.\n * To make these new stricter version requirements easier to\n manage, the go command can now invoke not just the toolchain\n bundled in its own release but also other Go toolchain versions\n found in the PATH or downloaded on demand. If a go.mod or\n go.work go line declares a minimum requirement on a newer\n version of Go, the go command will find and run that version\n automatically. The new toolchain directive sets a suggested\n minimum toolchain to use, which may be newer than the strict go\n minimum. See \u0027Go Toolchains\u0027 for details.\n * go command: The -pgo build flag now defaults to -pgo=auto, and\n the restriction of specifying a single main package on the\n command line is now removed. If a file named default.pgo is\n present in the main package\u0027s directory, the go command will\n use it to enable profile-guided optimization for building the\n corresponding program.\n * go command: The -C dir flag must now be the first flag on the\n command-line when used.\n * go command: The new go test option -fullpath prints full path\n names in test log messages, rather than just base names.\n * go command: The go test -c flag now supports writing test\n binaries for multiple packages, each to pkg.test where pkg is\n the package name. It is an error if more than one test package\n being compiled has a given package name.]\n * go command: The go test -o flag now accepts a directory\n argument, in which case test binaries are written to that\n directory instead of the current directory.\n * cgo: In files that import \u0027C\u0027, the Go toolchain now correctly\n reports errors for attempts to declare Go methods on C types.\n * runtime: When printing very deep stacks, the runtime now prints\n the first 50 (innermost) frames followed by the bottom 50\n (outermost) frames, rather than just printing the first 100\n frames. This makes it easier to see how deeply recursive stacks\n started, and is especially valuable for debugging stack\n overflows.\n * runtime: On Linux platforms that support transparent huge\n pages, the Go runtime now manages which parts of the heap may\n be backed by huge pages more explicitly. This leads to better\n utilization of memory: small heaps should see less memory used\n (up to 50% in pathological cases) while large heaps should see\n fewer broken huge pages for dense parts of the heap, improving\n CPU usage and latency by up to 1%.\n * runtime: As a result of runtime-internal garbage collection\n tuning, applications may see up to a 40% reduction in\n application tail latency and a small decrease in memory\n use. Some applications may also observe a small loss in\n throughput. The memory use decrease should be proportional to\n the loss in throughput, such that the previous release\u0027s\n throughput/memory tradeoff may be recovered (with little change\n to latency) by increasing GOGC and/or GOMEMLIMIT slightly.\n * runtime: Calls from C to Go on threads created in C require\n some setup to prepare for Go execution. On Unix platforms, this\n setup is now preserved across multiple calls from the same\n thread. This significantly reduces the overhead of subsequent C\n to Go calls from ~1-3 microseconds per call to ~100-200\n nanoseconds per call.\n * compiler: Profile-guide optimization (PGO), added as a preview\n in Go 1.20, is now ready for general use. PGO enables\n additional optimizations on code identified as hot by profiles\n of production workloads. As mentioned in the Go command\n section, PGO is enabled by default for binaries that contain a\n default.pgo profile in the main package directory. Performance\n improvements vary depending on application behavior, with most\n programs from a representative set of Go programs seeing\n between 2 and 7% improvement from enabling PGO. See the PGO\n user guide for detailed documentation.\n * compiler: PGO builds can now devirtualize some interface method\n calls, adding a concrete call to the most common callee. This\n enables further optimization, such as inlining the callee.\n * compiler: Go 1.21 improves build speed by up to 6%, largely\n thanks to building the compiler itself with PGO.\n * assembler: On amd64, frameless nosplit assembly functions are\n no longer automatically marked as NOFRAME. Instead, the NOFRAME\n attribute must be explicitly specified if desired, which is\n already the behavior on other architectures supporting frame\n pointers. With this, the runtime now maintains the frame\n pointers for stack transitions.\n * assembler: The verifier that checks for incorrect uses of R15\n when dynamic linking on amd64 has been improved.\n * linker: On windows/amd64, the linker (with help from the\n compiler) now emits SEH unwinding data by default, which\n improves the integration of Go applications with Windows\n debuggers and other tools.\n * linker: In Go 1.21 the linker (with help from the compiler) is\n now capable of deleting dead (unreferenced) global map\n variables, if the number of entries in the variable initializer\n is sufficiently large, and if the initializer expressions are\n side-effect free.\n * core library: The new log/slog package provides structured\n logging with levels. Structured logging emits key-value pairs\n to enable fast, accurate processing of large amounts of log\n data. The package supports integration with popular log\n analysis tools and services.\n * core library: The new testing/slogtest package can help to\n validate slog.Handler implementations.\n * core library: The new slices package provides many common\n operations on slices, using generic functions that work with\n slices of any element type.\n * core library: The new maps package provides several common\n operations on maps, using generic functions that work with maps\n of any key or element type.\n * core library: The new cmp package defines the type constraint\n Ordered and two new generic functions Less and Compare that are\n useful with ordered types.\n * Minor changes to the library: As always, there are various\n minor changes and updates to the library, made with the Go 1\n promise of compatibility in mind. There are also various\n performance improvements, not enumerated here.\n * archive/tar: The implementation of the io/fs.FileInfo interface\n returned by Header.FileInfo now implements a String method that\n calls io/fs.FormatFileInfo.\n * archive/zip: The implementation of the io/fs.FileInfo interface\n returned by FileHeader.FileInfo now implements a String method\n that calls io/fs.FormatFileInfo.\n * archive/zip: The implementation of the io/fs.DirEntry interface\n returned by the io/fs.ReadDirFile.ReadDir method of the\n io/fs.File returned by Reader.Open now implements a String\n method that calls io/fs.FormatDirEntry.\n * bytes: The Buffer type has two new methods: Available and\n AvailableBuffer. These may be used along with the Write method\n to append directly to the Buffer.\n * context: The new WithoutCancel function returns a copy of a\n context that is not canceled when the original context is\n canceled.\n * context: The new WithDeadlineCause and WithTimeoutCause\n functions provide a way to set a context cancellation cause\n when a deadline or timer expires. The cause may be retrieved\n with the Cause function.\n * context: The new AfterFunc function registers a function to run\n after a context has been cancelled.\n * context: An optimization means that the results of calling\n Background and TODO and converting them to a shared type can be\n considered equal. In previous releases they were always\n different. Comparing Context values for equality has never been\n well-defined, so this is not considered to be an incompatible\n change.\n * crypto/ecdsa: PublicKey.Equal and PrivateKey.Equal now execute\n in constant time.\n * crypto/elliptic: All of the Curve methods have been deprecated,\n along with GenerateKey, Marshal, and Unmarshal. For ECDH\n operations, the new crypto/ecdh package should be used\n instead. For lower-level operations, use third-party modules\n such as filippo.io/nistec.\n * crypto/rand: The crypto/rand package now uses the getrandom\n system call on NetBSD 10.0 and later.\n * crypto/rsa: The performance of private RSA operations\n (decryption and signing) is now better than Go 1.19 for\n GOARCH=amd64 and GOARCH=arm64. It had regressed in Go 1.20.\n * crypto/rsa: Due to the addition of private fields to\n PrecomputedValues, PrivateKey.Precompute must be called for\n optimal performance even if deserializing (for example from\n JSON) a previously-precomputed private key.\n * crypto/rsa: PublicKey.Equal and PrivateKey.Equal now execute in\n constant time.\n * crypto/rsa: The GenerateMultiPrimeKey function and the\n PrecomputedValues.CRTValues field have been\n deprecated. PrecomputedValues.CRTValues will still be populated\n when PrivateKey.Precompute is called, but the values will not\n be used during decryption operations.\n * crypto/sha256: SHA-224 and SHA-256 operations now use native\n instructions when available when GOARCH=amd64, providing a\n performance improvement on the order of 3-4x.\n * crypto/tls: Servers now skip verifying client certificates\n (including not running Config.VerifyPeerCertificate) for\n resumed connections, besides checking the expiration time. This\n makes session tickets larger when client certificates are in\n use. Clients were already skipping verification on resumption,\n but now check the expiration time even if\n Config.InsecureSkipVerify is set.\n * crypto/tls: Applications can now control the content of session\n tickets.\n * crypto/tls: The new SessionState type describes a resumable\n session.\n * crypto/tls: The SessionState.Bytes method and ParseSessionState\n function serialize and deserialize a SessionState.\n * crypto/tls: The Config.WrapSession and Config.UnwrapSession\n hooks convert a SessionState to and from a ticket on the server\n side.\n * crypto/tls: The Config.EncryptTicket and Config.DecryptTicket\n methods provide a default implementation of WrapSession and\n UnwrapSession.\n * crypto/tls: The ClientSessionState.ResumptionState method and\n NewResumptionState function may be used by a ClientSessionCache\n implementation to store and resume sessions on the client side.\n * crypto/tls: To reduce the potential for session tickets to be\n used as a tracking mechanism across connections, the server now\n issues new tickets on every resumption (if they are supported\n and not disabled) and tickets don\u0027t bear an identifier for the\n key that encrypted them anymore. If passing a large number of\n keys to Conn.SetSessionTicketKeys, this might lead to a\n noticeable performance cost.\n * crypto/tls: Both clients and servers now implement the Extended\n Master Secret extension (RFC 7627). The deprecation of\n ConnectionState.TLSUnique has been reverted, and is now set for\n resumed connections that support Extended Master Secret.\n * crypto/tls: The new QUICConn type provides support for QUIC\n implementations, including 0-RTT support. Note that this is not\n itself a QUIC implementation, and 0-RTT is still not supported\n in TLS.\n * crypto/tls: The new VersionName function returns the name for a\n TLS version number.\n * crypto/tls: The TLS alert codes sent from the server for client\n authentication failures have been improved. Previously, these\n failures always resulted in a \u0027bad certificate\u0027 alert. Now,\n certain failures will result in more appropriate alert codes,\n as defined by RFC 5246 and RFC 8446:\n * crypto/tls: For TLS 1.3 connections, if the server is\n configured to require client authentication using\n RequireAnyClientCert or RequireAndVerifyClientCert, and the\n client does not provide any certificate, the server will now\n return the \u0027certificate required\u0027 alert.\n * crypto/tls: If the client provides a certificate that is not\n signed by the set of trusted certificate authorities configured\n on the server, the server will return the \u0027unknown certificate\n authority\u0027 alert.\n * crypto/tls: If the client provides a certificate that is either\n expired or not yet valid, the server will return the \u0027expired\n certificate\u0027 alert.\n * crypto/tls: In all other scenarios related to client\n authentication failures, the server still returns \u0027bad\n certificate\u0027.\n * crypto/x509: RevocationList.RevokedCertificates has been\n deprecated and replaced with the new RevokedCertificateEntries\n field, which is a slice of RevocationListEntry.\n RevocationListEntry contains all of the fields in\n pkix.RevokedCertificate, as well as the revocation reason code.\n * crypto/x509: Name constraints are now correctly enforced on\n non-leaf certificates, and not on the certificates where they\n are expressed.\n * debug/elf: The new File.DynValue method may be used to retrieve\n the numeric values listed with a given dynamic tag.\n * debug/elf: The constant flags permitted in a DT_FLAGS_1 dynamic\n tag are now defined with type DynFlag1. These tags have names\n starting with DF_1.\n * debug/elf: The package now defines the constant COMPRESS_ZSTD.\n * debug/elf: The package now defines the constant\n R_PPC64_REL24_P9NOTOC.\n * debug/pe: Attempts to read from a section containing\n uninitialized data using Section.Data or the reader returned by\n Section.Open now return an error.\n * embed: The io/fs.File returned by FS.Open now has a ReadAt\n method that implements io.ReaderAt.\n * embed: Calling FS.Open.Stat will return a type that now\n implements a String method that calls io/fs.FormatFileInfo.\n * errors: The new ErrUnsupported error provides a standardized\n way to indicate that a requested operation may not be performed\n because it is unsupported. For example, a call to os.Link when\n using a file system that does not support hard links.\n * flag: The new BoolFunc function and FlagSet.BoolFunc method\n define a flag that does not require an argument and calls a\n function when the flag is used. This is similar to Func but for\n a boolean flag.\n * flag: A flag definition (via Bool, BoolVar, Int, IntVar, etc.)\n will panic if Set has already been called on a flag with the\n same name. This change is intended to detect cases where\n changes in initialization order cause flag operations to occur\n in a different order than expected. In many cases the fix to\n this problem is to introduce a explicit package dependence to\n correctly order the definition before any Set operations.\n * go/ast: The new IsGenerated predicate reports whether a file\n syntax tree contains the special comment that conventionally\n indicates that the file was generated by a tool.\n * go/ast: The new File.GoVersion field records the minimum Go\n version required by any //go:build or // +build directives.\n * go/build: The package now parses build directives (comments\n that start with //go:) in file headers (before the package\n declaration). These directives are available in the new Package\n fields Directives, TestDirectives, and XTestDirectives.\n * go/build/constraint: The new GoVersion function returns the\n minimum Go version implied by a build expression.\n * go/token: The new File.Lines method returns the file\u0027s\n line-number table in the same form as accepted by\n File.SetLines.\n * go/types: The new Package.GoVersion method returns the Go\n language version used to check the package.\n * hash/maphash: The hash/maphash package now has a pure Go\n implementation, selectable with the purego build tag.\n * html/template: The new error ErrJSTemplate is returned when an\n action appears in a JavaScript template literal. Previously an\n unexported error was returned.\n * io/fs: The new FormatFileInfo function returns a formatted\n version of a FileInfo. The new FormatDirEntry function returns\n a formatted version of a DirEntry. The implementation of\n DirEntry returned by ReadDir now implements a String method\n that calls FormatDirEntry, and the same is true for the\n DirEntry value passed to WalkDirFunc.\n * math/big: The new Int.Float64 method returns the nearest\n floating-point value to a multi-precision integer, along with\n an indication of any rounding that occurred.\n * net: On Linux, the net package can now use Multipath TCP when\n the kernel supports it. It is not used by default. To use\n Multipath TCP when available on a client, call the\n Dialer.SetMultipathTCP method before calling the Dialer.Dial or\n Dialer.DialContext methods. To use Multipath TCP when available\n on a server, call the ListenConfig.SetMultipathTCP method\n before calling the ListenConfig.Listen method. Specify the\n network as \u0027tcp\u0027 or \u0027tcp4\u0027 or \u0027tcp6\u0027 as usual. If Multipath TCP\n is not supported by the kernel or the remote host, the\n connection will silently fall back to TCP. To test whether a\n particular connection is using Multipath TCP, use the\n TCPConn.MultipathTCP method.\n * net: In a future Go release we may enable Multipath TCP by\n default on systems that support it.\n * net/http: The new ResponseController.EnableFullDuplex method\n allows server handlers to concurrently read from an HTTP/1\n request body while writing the response. Normally, the HTTP/1\n server automatically consumes any remaining request body before\n starting to write the response, to avoid deadlocking clients\n which attempt to write a complete request before reading the\n response. The EnableFullDuplex method disables this behavior.\n * net/http: The new ErrSchemeMismatch error is returned by Client\n and Transport when the server responds to an HTTPS request with\n an HTTP response.\n * net/http: The net/http package now supports\n errors.ErrUnsupported, in that the expression\n errors.Is(http.ErrNotSupported, errors.ErrUnsupported) will\n return true.\n * os: Programs may now pass an empty time.Time value to the\n Chtimes function to leave either the access time or the\n modification time unchanged.\n * os: On Windows the File.Chdir method now changes the current\n directory to the file, rather than always returning an error.\n * os: On Unix systems, if a non-blocking descriptor is passed to\n NewFile, calling the File.Fd method will now return a\n non-blocking descriptor. Previously the descriptor was\n converted to blocking mode.\n * os: On Windows calling Truncate on a non-existent file used to\n create an empty file. It now returns an error indicating that\n the file does not exist.\n * os: On Windows calling TempDir now uses GetTempPath2W when\n available, instead of GetTempPathW. The new behavior is a\n security hardening measure that prevents temporary files\n created by processes running as SYSTEM to be accessed by\n non-SYSTEM processes.\n * os: On Windows the os package now supports working with files\n whose names, stored as UTF-16, can\u0027t be represented as valid\n UTF-8.\n * os: On Windows Lstat now resolves symbolic links for paths\n ending with a path separator, consistent with its behavior on\n POSIX platforms.\n * os: The implementation of the io/fs.DirEntry interface returned\n by the ReadDir function and the File.ReadDir method now\n implements a String method that calls io/fs.FormatDirEntry.\n * os: The implementation of the io/fs.FS interface returned by\n the DirFS function now implements the io/fs.ReadFileFS and the\n io/fs.ReadDirFS interfaces.\n * path/filepath: The implementation of the io/fs.DirEntry\n interface passed to the function argument of WalkDir now\n implements a String method that calls io/fs.FormatDirEntry.\n * reflect: In Go 1.21, ValueOf no longer forces its argument to\n be allocated on the heap, allowing a Value\u0027s content to be\n allocated on the stack. Most operations on a Value also allow\n the underlying value to be stack allocated.\n * reflect: The new Value method Value.Clear clears the contents\n of a map or zeros the contents of a slice. This corresponds to\n the new clear built-in added to the language.\n * reflect: The SliceHeader and StringHeader types are now\n deprecated. In new code prefer unsafe.Slice, unsafe.SliceData,\n unsafe.String, or unsafe.StringData.\n * regexp: Regexp now defines MarshalText and UnmarshalText\n methods. These implement encoding.TextMarshaler and\n encoding.TextUnmarshaler and will be used by packages such as\n encoding/json.\n * runtime: Textual stack traces produced by Go programs, such as\n those produced when crashing, calling runtime.Stack, or\n collecting a goroutine profile with debug=2, now include the\n IDs of the goroutines that created each goroutine in the stack\n trace.\n * runtime: Crashing Go applications can now opt-in to Windows\n Error Reporting (WER) by setting the environment variable\n GOTRACEBACK=wer or calling debug.SetTraceback(\u0027wer\u0027) before the\n crash. Other than enabling WER, the runtime will behave as with\n GOTRACEBACK=crash. On non-Windows systems, GOTRACEBACK=wer is\n ignored.\n * runtime: GODEBUG=cgocheck=2, a thorough checker of cgo pointer\n passing rules, is no longer available as a debug\n option. Instead, it is available as an experiment using\n GOEXPERIMENT=cgocheck2. In particular this means that this mode\n has to be selected at build time instead of startup time.\n * runtime: GODEBUG=cgocheck=1 is still available (and is still\n the default).\n * runtime: A new type Pinner has been added to the runtime\n package. Pinners may be used to \u0027pin\u0027 Go memory such that it\n may be used more freely by non-Go code. For instance, passing\n Go values that reference pinned Go memory to C code is now\n allowed. Previously, passing any such nested reference was\n disallowed by the cgo pointer passing rules. See the docs for\n more details.\n * runtime/metrics: A few previously-internal GC metrics, such as\n live heap size, are now available. GOGC and GOMEMLIMIT are also\n now available as metrics.\n * runtime/trace: Collecting traces on amd64 and arm64 now incurs\n a substantially smaller CPU cost: up to a 10x improvement over\n the previous release.\n * runtime/trace: Traces now contain explicit stop-the-world\n events for every reason the Go runtime might stop-the-world,\n not just garbage collection.\n * sync: The new OnceFunc, OnceValue, and OnceValues functions\n capture a common use of Once to lazily initialize a value on\n first use.\n * syscall: On Windows the Fchdir function now changes the current\n directory to its argument, rather than always returning an\n error.\n * syscall: On FreeBSD SysProcAttr has a new field Jail that may\n be used to put the newly created process in a jailed\n environment.\n * syscall: On Windows the syscall package now supports working\n with files whose names, stored as UTF-16, can\u0027t be represented\n as valid UTF-8. The UTF16ToString and UTF16FromString functions\n now convert between UTF-16 data and WTF-8 strings. This is\n backward compatible as WTF-8 is a superset of the UTF-8 format\n that was used in earlier releases.\n * syscall: Several error values match the new\n errors.ErrUnsupported, such that errors.Is(err,\n errors.ErrUnsupported) returns true.\n ENOSYS\n ENOTSUP\n EOPNOTSUPP\n EPLAN9 (Plan 9 only)\n ERROR_CALL_NOT_IMPLEMENTED (Windows only)\n ERROR_NOT_SUPPORTED (Windows only)\n EWINDOWS (Windows only)\n * testing: The new -test.fullpath option will print full path\n names in test log messages, rather than just base names.\n * testing: The new Testing function reports whether the program\n is a test created by go test.\n * testing/fstest: Calling Open.Stat will return a type that now\n implements a String method that calls io/fs.FormatFileInfo.\n * unicode: The unicode package and associated support throughout\n the system has been upgraded to Unicode 15.0.0.\n * Darwin port: As announced in the Go 1.20 release notes, Go 1.21\n requires macOS 10.15 Catalina or later; support for previous\n versions has been discontinued.\n * Windows port: As announced in the Go 1.20 release notes, Go\n 1.21 requires at least Windows 10 or Windows Server 2016;\n support for previous versions has been discontinued.\n * WebAssembly port: The new go:wasmimport directive can now be\n used in Go programs to import functions from the WebAssembly\n host.\n * WebAssembly port: The Go scheduler now interacts much more\n efficiently with the JavaScript event loop, especially in\n applications that block frequently on asynchronous events.\n * WebAssembly System Interface port: Go 1.21 adds an experimental\n port to the WebAssembly System Interface (WASI), Preview 1\n (GOOS=wasip1, GOARCH=wasm).\n * WebAssembly System Interface port: As a result of the addition\n of the new GOOS value \u0027wasip1\u0027, Go files named *_wasip1.go will\n now be ignored by Go tools except when that GOOS value is being\n used. If you have existing filenames matching that pattern, you\n will need to rename them.\n * ppc64/ppc64le port: On Linux, GOPPC64=power10 now generates\n PC-relative instructions, prefixed instructions, and other new\n Power10 instructions. On AIX, GOPPC64=power10 generates Power10\n instructions, but does not generate PC-relative instructions.\n * ppc64/ppc64le port: When building position-independent binaries\n for GOPPC64=power10 GOOS=linux GOARCH=ppc64le, users can expect\n reduced binary sizes in most cases, in some cases\n 3.5%. Position-independent binaries are built for ppc64le with\n the following -buildmode values: c-archive, c-shared, shared,\n pie, plugin.\n * loong64 port: The linux/loong64 port now supports\n -buildmode=c-archive, -buildmode=c-shared and -buildmode=pie.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2023-360",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2023_0360-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2023:0360-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2023:0360-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/"
},
{
"category": "self",
"summary": "SUSE Bug 1212475",
"url": "https://bugzilla.suse.com/1212475"
},
{
"category": "self",
"summary": "SUSE Bug 1212667",
"url": "https://bugzilla.suse.com/1212667"
},
{
"category": "self",
"summary": "SUSE Bug 1212669",
"url": "https://bugzilla.suse.com/1212669"
},
{
"category": "self",
"summary": "SUSE Bug 1215084",
"url": "https://bugzilla.suse.com/1215084"
},
{
"category": "self",
"summary": "SUSE Bug 1215085",
"url": "https://bugzilla.suse.com/1215085"
},
{
"category": "self",
"summary": "SUSE Bug 1215086",
"url": "https://bugzilla.suse.com/1215086"
},
{
"category": "self",
"summary": "SUSE Bug 1215087",
"url": "https://bugzilla.suse.com/1215087"
},
{
"category": "self",
"summary": "SUSE Bug 1215090",
"url": "https://bugzilla.suse.com/1215090"
},
{
"category": "self",
"summary": "SUSE Bug 1215985",
"url": "https://bugzilla.suse.com/1215985"
},
{
"category": "self",
"summary": "SUSE Bug 1216109",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39318 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39319 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39320 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39321 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39322 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39325 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-44487 page",
"url": "https://www.suse.com/security/cve/CVE-2023-44487/"
}
],
"title": "Security update for go1.21",
"tracking": {
"current_release_date": "2023-11-09T08:51:37Z",
"generator": {
"date": "2023-11-09T08:51:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2023:0360-1",
"initial_release_date": "2023-11-09T08:51:37Z",
"revision_history": [
{
"date": "2023-11-09T08:51:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go-1.21-41.1.x86_64",
"product": {
"name": "go-1.21-41.1.x86_64",
"product_id": "go-1.21-41.1.x86_64"
}
},
{
"category": "product_version",
"name": "go-doc-1.21-41.1.x86_64",
"product": {
"name": "go-doc-1.21-41.1.x86_64",
"product_id": "go-doc-1.21-41.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-1.21.3-2.1.x86_64",
"product": {
"name": "go1.21-1.21.3-2.1.x86_64",
"product_id": "go1.21-1.21.3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.3-2.1.x86_64",
"product": {
"name": "go1.21-doc-1.21.3-2.1.x86_64",
"product_id": "go1.21-doc-1.21.3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12",
"product": {
"name": "SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-1.21-41.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:go-1.21-41.1.x86_64"
},
"product_reference": "go-1.21-41.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-doc-1.21-41.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:go-doc-1.21-41.1.x86_64"
},
"product_reference": "go-doc-1.21-41.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.3-2.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64"
},
"product_reference": "go1.21-1.21.3-2.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.3-2.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.3-2.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39318"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39318",
"url": "https://www.suse.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "SUSE Bug 1215084 for CVE-2023-39318",
"url": "https://bugzilla.suse.com/1215084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "moderate"
}
],
"title": "CVE-2023-39318"
},
{
"cve": "CVE-2023-39319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39319"
}
],
"notes": [
{
"category": "general",
"text": "The html/template package does not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39319",
"url": "https://www.suse.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "SUSE Bug 1215085 for CVE-2023-39319",
"url": "https://bugzilla.suse.com/1215085"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "moderate"
}
],
"title": "CVE-2023-39319"
},
{
"cve": "CVE-2023-39320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39320"
}
],
"notes": [
{
"category": "general",
"text": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39320",
"url": "https://www.suse.com/security/cve/CVE-2023-39320"
},
{
"category": "external",
"summary": "SUSE Bug 1215086 for CVE-2023-39320",
"url": "https://bugzilla.suse.com/1215086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-39320"
},
{
"cve": "CVE-2023-39321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39321"
}
],
"notes": [
{
"category": "general",
"text": "Processing an incomplete post-handshake message for a QUIC connection can cause a panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39321",
"url": "https://www.suse.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "SUSE Bug 1215087 for CVE-2023-39321",
"url": "https://bugzilla.suse.com/1215087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-39321"
},
{
"cve": "CVE-2023-39322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39322"
}
],
"notes": [
{
"category": "general",
"text": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39322",
"url": "https://www.suse.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "SUSE Bug 1215087 for CVE-2023-39322",
"url": "https://bugzilla.suse.com/1215087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-39322"
},
{
"cve": "CVE-2023-39323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39323"
}
],
"notes": [
{
"category": "general",
"text": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39323",
"url": "https://www.suse.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "SUSE Bug 1215985 for CVE-2023-39323",
"url": "https://bugzilla.suse.com/1215985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-39323"
},
{
"cve": "CVE-2023-39325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39325"
}
],
"notes": [
{
"category": "general",
"text": "A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39325",
"url": "https://www.suse.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "SUSE Bug 1216109 for CVE-2023-39325",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "external",
"summary": "SUSE Bug 1230323 for CVE-2023-39325",
"url": "https://bugzilla.suse.com/1230323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-39325"
},
{
"cve": "CVE-2023-44487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-44487"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-44487",
"url": "https://www.suse.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "SUSE Bug 1216109 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "external",
"summary": "SUSE Bug 1216123 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216123"
},
{
"category": "external",
"summary": "SUSE Bug 1216169 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216169"
},
{
"category": "external",
"summary": "SUSE Bug 1216171 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216171"
},
{
"category": "external",
"summary": "SUSE Bug 1216174 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216174"
},
{
"category": "external",
"summary": "SUSE Bug 1216176 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216176"
},
{
"category": "external",
"summary": "SUSE Bug 1216181 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216181"
},
{
"category": "external",
"summary": "SUSE Bug 1216182 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216182"
},
{
"category": "external",
"summary": "SUSE Bug 1216190 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:go-1.21-41.1.x86_64",
"SUSE Package Hub 12:go-doc-1.21-41.1.x86_64",
"SUSE Package Hub 12:go1.21-1.21.3-2.1.x86_64",
"SUSE Package Hub 12:go1.21-doc-1.21.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-09T08:51:37Z",
"details": "important"
}
],
"title": "CVE-2023-44487"
}
]
}
opensuse-su-2024:13307-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.21-1.21.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.21-1.21.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13307",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13307-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39323/"
}
],
"title": "go1.21-1.21.2-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13307-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.2-1.1.aarch64",
"product": {
"name": "go1.21-1.21.2-1.1.aarch64",
"product_id": "go1.21-1.21.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.2-1.1.aarch64",
"product": {
"name": "go1.21-doc-1.21.2-1.1.aarch64",
"product_id": "go1.21-doc-1.21.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-libstd-1.21.2-1.1.aarch64",
"product": {
"name": "go1.21-libstd-1.21.2-1.1.aarch64",
"product_id": "go1.21-libstd-1.21.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.2-1.1.aarch64",
"product": {
"name": "go1.21-race-1.21.2-1.1.aarch64",
"product_id": "go1.21-race-1.21.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.2-1.1.ppc64le",
"product": {
"name": "go1.21-1.21.2-1.1.ppc64le",
"product_id": "go1.21-1.21.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.2-1.1.ppc64le",
"product": {
"name": "go1.21-doc-1.21.2-1.1.ppc64le",
"product_id": "go1.21-doc-1.21.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-libstd-1.21.2-1.1.ppc64le",
"product": {
"name": "go1.21-libstd-1.21.2-1.1.ppc64le",
"product_id": "go1.21-libstd-1.21.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.2-1.1.ppc64le",
"product": {
"name": "go1.21-race-1.21.2-1.1.ppc64le",
"product_id": "go1.21-race-1.21.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.2-1.1.s390x",
"product": {
"name": "go1.21-1.21.2-1.1.s390x",
"product_id": "go1.21-1.21.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.2-1.1.s390x",
"product": {
"name": "go1.21-doc-1.21.2-1.1.s390x",
"product_id": "go1.21-doc-1.21.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-libstd-1.21.2-1.1.s390x",
"product": {
"name": "go1.21-libstd-1.21.2-1.1.s390x",
"product_id": "go1.21-libstd-1.21.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.2-1.1.s390x",
"product": {
"name": "go1.21-race-1.21.2-1.1.s390x",
"product_id": "go1.21-race-1.21.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.21-1.21.2-1.1.x86_64",
"product": {
"name": "go1.21-1.21.2-1.1.x86_64",
"product_id": "go1.21-1.21.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-doc-1.21.2-1.1.x86_64",
"product": {
"name": "go1.21-doc-1.21.2-1.1.x86_64",
"product_id": "go1.21-doc-1.21.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-libstd-1.21.2-1.1.x86_64",
"product": {
"name": "go1.21-libstd-1.21.2-1.1.x86_64",
"product_id": "go1.21-libstd-1.21.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.21-race-1.21.2-1.1.x86_64",
"product": {
"name": "go1.21-race-1.21.2-1.1.x86_64",
"product_id": "go1.21-race-1.21.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-1.21.2-1.1.aarch64"
},
"product_reference": "go1.21-1.21.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-1.21.2-1.1.ppc64le"
},
"product_reference": "go1.21-1.21.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-1.21.2-1.1.s390x"
},
"product_reference": "go1.21-1.21.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-1.21.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-1.21.2-1.1.x86_64"
},
"product_reference": "go1.21-1.21.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.aarch64"
},
"product_reference": "go1.21-doc-1.21.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.ppc64le"
},
"product_reference": "go1.21-doc-1.21.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.s390x"
},
"product_reference": "go1.21-doc-1.21.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-doc-1.21.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.x86_64"
},
"product_reference": "go1.21-doc-1.21.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-libstd-1.21.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.aarch64"
},
"product_reference": "go1.21-libstd-1.21.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-libstd-1.21.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.ppc64le"
},
"product_reference": "go1.21-libstd-1.21.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-libstd-1.21.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.s390x"
},
"product_reference": "go1.21-libstd-1.21.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-libstd-1.21.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.x86_64"
},
"product_reference": "go1.21-libstd-1.21.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.aarch64"
},
"product_reference": "go1.21-race-1.21.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.ppc64le"
},
"product_reference": "go1.21-race-1.21.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.s390x"
},
"product_reference": "go1.21-race-1.21.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.21-race-1.21.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.x86_64"
},
"product_reference": "go1.21-race-1.21.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39323"
}
],
"notes": [
{
"category": "general",
"text": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39323",
"url": "https://www.suse.com/security/cve/CVE-2023-39323"
},
{
"category": "external",
"summary": "SUSE Bug 1215985 for CVE-2023-39323",
"url": "https://bugzilla.suse.com/1215985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-1.21.2-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-doc-1.21.2-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-libstd-1.21.2-1.1.x86_64",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.aarch64",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.ppc64le",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.s390x",
"openSUSE Tumbleweed:go1.21-race-1.21.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-39323"
}
]
}
wid-sec-w-2023-2516
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann eine Schwachstelle in Golang Go ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Sonstiges\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2516 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2516.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2516 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2516"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6574-1 vom 2024-01-11",
"url": "https://ubuntu.com/security/notices/USN-6574-1"
},
{
"category": "external",
"summary": "Golang Security Advisory vom 2023-09-28",
"url": "https://groups.google.com/g/golang-announce/c/2dWHvJVFA9s/m/lF9Srr_QAAAJ"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:4017-1 vom 2023-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016574.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:4018-1 vom 2023-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016573.html"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0109 vom 2024-01-22",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0109"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7104449 vom 2024-01-02",
"url": "https://www.ibm.com/support/pages/node/7104449"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-004 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox%C2%AE-Security-Bulletin-XRX24-004-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-1871 vom 2023-10-19",
"url": "https://alas.aws.amazon.com/ALAS-2023-1871.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-FE53E13B5B vom 2023-10-20",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-fe53e13b5b"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASECS-2023-016 vom 2023-11-01",
"url": "https://alas.aws.amazon.com/AL2/ALASECS-2023-016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:4472-1 vom 2023-11-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017047.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2023-1C906D04EE vom 2023-11-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-1c906d04ee"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202311-09 vom 2023-11-25",
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7161954 vom 2024-07-30",
"url": "https://www.ibm.com/support/pages/node/7161954"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1012 vom 2024-10-14",
"url": "https://advisory.splunk.com//advisories/SVD-2024-1012"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7111-1 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7111-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7109-1 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7109-1"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehre Schwachstellen",
"tracking": {
"current_release_date": "2024-11-14T23:00:00.000+00:00",
"generator": {
"date": "2024-11-15T09:19:46.984+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2023-2516",
"initial_release_date": "2023-09-28T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-28T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-10-08T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: GO-2023-2095, 2242544"
},
{
"date": "2023-10-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-10-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-10-22T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-11-01T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-11-16T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-11-23T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-11-26T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2024-01-02T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-01-10T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-01-22T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "16"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.21.2",
"product": {
"name": "Golang Go \u003c1.21.2",
"product_id": "T030161"
}
},
{
"category": "product_version",
"name": "1.21.2",
"product": {
"name": "Golang Go 1.21.2",
"product_id": "T030161-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.21.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.20.9",
"product": {
"name": "Golang Go \u003c1.20.9",
"product_id": "T030162"
}
},
{
"category": "product_version",
"name": "1.20.9",
"product": {
"name": "Golang Go 1.20.9",
"product_id": "T030162-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.20.9"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "REST \u003c1.0.0.1158-amd64",
"product": {
"name": "IBM DB2 REST \u003c1.0.0.1158-amd64",
"product_id": "T031843"
}
},
{
"category": "product_version",
"name": "REST 1.0.0.1158-amd64",
"product": {
"name": "IBM DB2 REST 1.0.0.1158-amd64",
"product_id": "T031843-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:rest__1.0.0.1158-amd64"
}
}
}
],
"category": "product_name",
"name": "DB2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.16.2",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.16.2",
"product_id": "T036379"
}
},
{
"category": "product_version",
"name": "10.1.16.2",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.16.2",
"product_id": "T036379-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.16.2"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.0.8",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.8",
"product_id": "T032269"
}
},
{
"category": "product_version",
"name": "9.0.8",
"product": {
"name": "Splunk Splunk Enterprise 9.0.8",
"product_id": "T032269-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.3",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.3",
"product_id": "T032270"
}
},
{
"category": "product_version",
"name": "9.1.3",
"product": {
"name": "Splunk Splunk Enterprise 9.1.3",
"product_id": "T032270-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.3.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.3.1",
"product_id": "T038314"
}
},
{
"category": "product_version",
"name": "9.3.1",
"product": {
"name": "Splunk Splunk Enterprise 9.3.1",
"product_id": "T038314-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.3.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.3",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.3",
"product_id": "T038315"
}
},
{
"category": "product_version",
"name": "9.2.3",
"product": {
"name": "Splunk Splunk Enterprise 9.2.3",
"product_id": "T038315-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.6",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.6",
"product_id": "T038316"
}
},
{
"category": "product_version",
"name": "9.1.6",
"product": {
"name": "Splunk Splunk Enterprise 9.1.6",
"product_id": "T038316-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.6"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T015631",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
},
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39323",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Golang Go, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T032269",
"T031843",
"T038314",
"T015632",
"T032270",
"T036379",
"T038315",
"T030161",
"T012167",
"T015631",
"T038316",
"T030162",
"74185",
"T002207",
"T000126",
"398363"
]
},
"release_date": "2023-09-28T22:00:00.000+00:00",
"title": "CVE-2023-39323"
},
{
"cve": "CVE-2023-39324",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Golang Go, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T032269",
"T031843",
"T038314",
"T015632",
"T032270",
"T036379",
"T038315",
"T030161",
"T012167",
"T015631",
"T038316",
"T030162",
"74185",
"T002207",
"T000126",
"398363"
]
},
"release_date": "2023-09-28T22:00:00.000+00:00",
"title": "CVE-2023-39324"
}
]
}
WID-SEC-W-2023-2516
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann eine Schwachstelle in Golang Go ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Sonstiges\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2516 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2516.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2516 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2516"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6574-1 vom 2024-01-11",
"url": "https://ubuntu.com/security/notices/USN-6574-1"
},
{
"category": "external",
"summary": "Golang Security Advisory vom 2023-09-28",
"url": "https://groups.google.com/g/golang-announce/c/2dWHvJVFA9s/m/lF9Srr_QAAAJ"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:4017-1 vom 2023-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016574.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:4018-1 vom 2023-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016573.html"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0109 vom 2024-01-22",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0109"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7104449 vom 2024-01-02",
"url": "https://www.ibm.com/support/pages/node/7104449"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-004 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox%C2%AE-Security-Bulletin-XRX24-004-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-1871 vom 2023-10-19",
"url": "https://alas.aws.amazon.com/ALAS-2023-1871.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-FE53E13B5B vom 2023-10-20",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-fe53e13b5b"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASECS-2023-016 vom 2023-11-01",
"url": "https://alas.aws.amazon.com/AL2/ALASECS-2023-016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:4472-1 vom 2023-11-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017047.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2023-1C906D04EE vom 2023-11-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-1c906d04ee"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202311-09 vom 2023-11-25",
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7161954 vom 2024-07-30",
"url": "https://www.ibm.com/support/pages/node/7161954"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1012 vom 2024-10-14",
"url": "https://advisory.splunk.com//advisories/SVD-2024-1012"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7111-1 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7111-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7109-1 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7109-1"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehre Schwachstellen",
"tracking": {
"current_release_date": "2024-11-14T23:00:00.000+00:00",
"generator": {
"date": "2024-11-15T09:19:46.984+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2023-2516",
"initial_release_date": "2023-09-28T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-28T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-10-08T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: GO-2023-2095, 2242544"
},
{
"date": "2023-10-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-10-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-10-22T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-11-01T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-11-16T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-11-23T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-11-26T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2024-01-02T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-01-10T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-01-22T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "16"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.21.2",
"product": {
"name": "Golang Go \u003c1.21.2",
"product_id": "T030161"
}
},
{
"category": "product_version",
"name": "1.21.2",
"product": {
"name": "Golang Go 1.21.2",
"product_id": "T030161-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.21.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.20.9",
"product": {
"name": "Golang Go \u003c1.20.9",
"product_id": "T030162"
}
},
{
"category": "product_version",
"name": "1.20.9",
"product": {
"name": "Golang Go 1.20.9",
"product_id": "T030162-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.20.9"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "REST \u003c1.0.0.1158-amd64",
"product": {
"name": "IBM DB2 REST \u003c1.0.0.1158-amd64",
"product_id": "T031843"
}
},
{
"category": "product_version",
"name": "REST 1.0.0.1158-amd64",
"product": {
"name": "IBM DB2 REST 1.0.0.1158-amd64",
"product_id": "T031843-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:rest__1.0.0.1158-amd64"
}
}
}
],
"category": "product_name",
"name": "DB2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.16.2",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.16.2",
"product_id": "T036379"
}
},
{
"category": "product_version",
"name": "10.1.16.2",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.16.2",
"product_id": "T036379-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.16.2"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.0.8",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.8",
"product_id": "T032269"
}
},
{
"category": "product_version",
"name": "9.0.8",
"product": {
"name": "Splunk Splunk Enterprise 9.0.8",
"product_id": "T032269-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.3",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.3",
"product_id": "T032270"
}
},
{
"category": "product_version",
"name": "9.1.3",
"product": {
"name": "Splunk Splunk Enterprise 9.1.3",
"product_id": "T032270-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.3.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.3.1",
"product_id": "T038314"
}
},
{
"category": "product_version",
"name": "9.3.1",
"product": {
"name": "Splunk Splunk Enterprise 9.3.1",
"product_id": "T038314-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.3.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.3",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.3",
"product_id": "T038315"
}
},
{
"category": "product_version",
"name": "9.2.3",
"product": {
"name": "Splunk Splunk Enterprise 9.2.3",
"product_id": "T038315-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.6",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.6",
"product_id": "T038316"
}
},
{
"category": "product_version",
"name": "9.1.6",
"product": {
"name": "Splunk Splunk Enterprise 9.1.6",
"product_id": "T038316-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.6"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T015631",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
},
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39323",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Golang Go, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T032269",
"T031843",
"T038314",
"T015632",
"T032270",
"T036379",
"T038315",
"T030161",
"T012167",
"T015631",
"T038316",
"T030162",
"74185",
"T002207",
"T000126",
"398363"
]
},
"release_date": "2023-09-28T22:00:00.000+00:00",
"title": "CVE-2023-39323"
},
{
"cve": "CVE-2023-39324",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Golang Go, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T032269",
"T031843",
"T038314",
"T015632",
"T032270",
"T036379",
"T038315",
"T030161",
"T012167",
"T015631",
"T038316",
"T030162",
"74185",
"T002207",
"T000126",
"398363"
]
},
"release_date": "2023-09-28T22:00:00.000+00:00",
"title": "CVE-2023-39324"
}
]
}
CERTFR-2024-AVI-0145
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | N/A | IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions antérieures à v4.8.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF05 | ||
| IBM | QRadar | IBM QRadar Use Case Manager App versions antérieures à 3.9.0 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | WebSphere | IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.1.x.x antérieures à 6.1.0.23 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.3.x.x antérieures à 6.3.0.6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.2.x.x antérieures à 6.2.0.22 | ||
| IBM | Db2 | IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | Cloud Pak | IBM Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.x.x antérieures à 5.1.2.15 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | QRadar WinCollect Agent | IBM QRadar WinCollect Agent versions 10.0.x antérieures à 10.1.9 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.3.x antérieures à 5.1.9.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF05",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.x.x ant\u00e9rieures \u00e0 5.1.2.15",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar WinCollect Agent versions 10.0.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.3.x ant\u00e9rieures \u00e0 5.1.9.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2021-41190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41190"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29244"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2020-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8244"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2023-34054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34054"
},
{
"name": "CVE-2023-34053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34053"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47145"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-46308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46308"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-23541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23541"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2023-49081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49081"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-22190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
},
{
"name": "CVE-2023-4586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4586"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2023-47152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47152"
},
{
"name": "CVE-2023-49082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49082"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47141"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2023-27859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27859"
},
{
"name": "CVE-2023-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47158"
},
{
"name": "CVE-2023-36665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36665"
},
{
"name": "CVE-2022-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23529"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2022-23539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23539"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2022-23540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23540"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50308"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2023-45193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45193"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2020-29510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29510"
},
{
"name": "CVE-2023-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47746"
},
{
"name": "CVE-2023-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34062"
},
{
"name": "CVE-2023-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47747"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
}
],
"initial_release_date": "2024-02-16T00:00:00",
"last_revision_date": "2024-02-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0145",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117872 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117872"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118592 du 16 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118592"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117873 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117873"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118289 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118289"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118351 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118351"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117821 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117821"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117883 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117883"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117881 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117881"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117884 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117884"
}
]
}
CERTFR-2024-AVI-0061
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.3 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.8 | ||
| Splunk | N/A | Splunk Cloud versions antérieures à 9.1.2312.200 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.8",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.1.2312.200",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
},
{
"name": "CVE-2024-23676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23676"
},
{
"name": "CVE-2024-23675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23675"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2024-23678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23678"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2024-23677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23677"
}
],
"initial_release_date": "2024-01-23T00:00:00",
"last_revision_date": "2024-01-23T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0061",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Splunk\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0105 du 22 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0105"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0108 du 22 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0108"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0106 du 22 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0106"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0107 du 22 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0107"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0109 du 22 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0109"
}
]
}
CERTFR-2025-AVI-0283
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu Greenplum. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum Platform Extension Framework versions antérieures à 6.11.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 6.29.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum Platform Extension Framework versions ant\u00e9rieures \u00e0 6.11.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.29.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3792"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2023-39320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2022-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2018-1282",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1282"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
}
],
"initial_release_date": "2025-04-08T00:00:00",
"last_revision_date": "2025-04-10T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0283",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-08T00:00:00.000000"
},
{
"description": "Correction d\u0027une erreur dans le r\u00e9sum\u00e9",
"revision_date": "2025-04-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu Greenplum. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu Greenplum",
"vendor_advisories": [
{
"published_at": "2025-04-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 25580",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25580"
},
{
"published_at": "2025-04-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 25581",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25581"
}
]
}
CERTFR-2024-AVI-0878
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.2.x antérieures à 9.2.3 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.1.x antérieures à 9.1.6 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.3.x antérieures à 9.3.1 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.208 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.205 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2403.x antérieures à 9.2.2403.108 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Entreprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.208",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.205",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2403.x ant\u00e9rieures \u00e0 9.2.2403.108",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2017-14159",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14159"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2020-36230",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
},
{
"name": "CVE-2024-45733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45733"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2020-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
},
{
"name": "CVE-2024-45731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45731"
},
{
"name": "CVE-2019-13057",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13057"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-29401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29401"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2015-3276",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3276"
},
{
"name": "CVE-2020-36225",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
},
{
"name": "CVE-2024-45739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45739"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2020-36224",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2021-27212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27212"
},
{
"name": "CVE-2020-36228",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
},
{
"name": "CVE-2020-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2020-15719",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15719"
},
{
"name": "CVE-2024-45740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45740"
},
{
"name": "CVE-2024-45736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45736"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-39320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
},
{
"name": "CVE-2017-17740",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17740"
},
{
"name": "CVE-2024-45741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45741"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2020-36223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-45737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45737"
},
{
"name": "CVE-2020-36229",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-45732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45732"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-45735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45735"
},
{
"name": "CVE-2023-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50658"
},
{
"name": "CVE-2023-47108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47108"
},
{
"name": "CVE-2023-26125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26125"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-45738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45738"
},
{
"name": "CVE-2020-36226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
},
{
"name": "CVE-2020-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2022-42969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42969"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2019-13565",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-45734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45734"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
}
],
"initial_release_date": "2024-10-15T00:00:00",
"last_revision_date": "2024-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0878",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1008",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1008"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1005",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1005"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1006",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1006"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1002",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1002"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1003",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1003"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1007",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1007"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1004",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1004"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1010",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1010"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1011",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1011"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1012",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1012"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1009",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1009"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1001",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1001"
}
]
}
CERTFR-2025-AVI-0864
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare Tanzu pour MySQL sur Kubernetes 2.0.0 toutes version",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2024-20977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20977"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2024-20985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20985"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2024-21052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21052"
},
{
"name": "CVE-2024-20964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20964"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2024-21053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21053"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2024-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20976"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-20998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20998"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21102"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-21049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21049"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-21015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21015"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-45918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45918"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2024-20962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20962"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-21009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21009"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-20969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20969"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-22112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22112"
},
{
"name": "CVE-2024-20966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20966"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-20972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20972"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21050"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-48566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48566"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2024-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20961"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-20983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20983"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21000"
},
{
"name": "CVE-2024-20984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20984"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21057"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-20963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20963"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-21062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21062"
},
{
"name": "CVE-2024-21055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21055"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-21056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21056"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21047"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-20981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20981"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-21013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21013"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2016-20013",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20013"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-22092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22092"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21060"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2024-20974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20974"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2024-20993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20993"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2024-20982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20982"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2024-21087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21087"
},
{
"name": "CVE-2023-22064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22064"
},
{
"name": "CVE-2024-20971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20971"
},
{
"name": "CVE-2024-20978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20978"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-20973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20973"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-20965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20965"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2024-21061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21061"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-20967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20967"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21069"
},
{
"name": "CVE-2024-21051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21051"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-20970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20970"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-21054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21054"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-20968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20968"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21008"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20994"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22079"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-20960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20960"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-10-13T00:00:00",
"last_revision_date": "2025-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36208"
}
]
}
CERTFR-2025-AVI-0622
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
| VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
| VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
| VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
| VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-25647",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-36617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2020-36843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36843"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2025-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2022-29173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29173"
},
{
"name": "CVE-2022-35929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35929"
},
{
"name": "CVE-2022-36056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36056"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2023-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28755"
},
{
"name": "CVE-2023-30551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30551"
},
{
"name": "CVE-2023-33199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33199"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2023-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46737"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-24579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24579"
},
{
"name": "CVE-2024-29902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29902"
},
{
"name": "CVE-2024-29903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29903"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2024-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41909"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2024-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52587"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-47290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47290"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
}
],
"initial_release_date": "2025-07-25T00:00:00",
"last_revision_date": "2025-07-25T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0622",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35981",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35967",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35980",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35974",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35979",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35984",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35970",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35983",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35978",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35968",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35973",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35976",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35969",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35966",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35972",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35977",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35982",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35971",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35975",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975"
}
]
}
CERTFR-2024-AVI-0646
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Storage Protect | Storage Protect Plus Server versions 10.1.x antérieures à 10.1.16.2 | ||
| IBM | WebSphere | WebSphere Application Server Liberty versions antérieures à 24.0.0.5 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier openssl.base versions antérieures à 3.0.13.1000 | ||
| IBM | WebSphere | WebSphere Application Server versions 8.5.x antérieures à 8.5.5.25 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 avec un fichier openssl.base versions antérieures à 1.1.1.2400 ou 3.0.13.1000 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.x antérieures à 9.0.5.20 | ||
| IBM | N/A | Sterling Control Center versions 6.3.0 antérieures à 6.3.0.0 iFix06 | ||
| IBM | N/A | Sterling Control Center versions 6.2.1 antérieures à 6.2.1.0 iFix13 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 avec un fichier openssl.base versions antérieures à 1.1.1.2400 ou 3.0.13.1000 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.0.x antérieures à 7.5.0 UP9 IF01 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Storage Protect Plus Server versions 10.1.x ant\u00e9rieures \u00e0 10.1.16.2",
"product": {
"name": "Storage Protect",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server Liberty versions ant\u00e9rieures \u00e0 24.0.0.5 ",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un fichier openssl.base versions ant\u00e9rieures \u00e0 3.0.13.1000",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.25",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 avec un fichier openssl.base versions ant\u00e9rieures \u00e0 1.1.1.2400 ou 3.0.13.1000",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.0.x ant\u00e9rieures \u00e0 9.0.5.20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.0 ant\u00e9rieures \u00e0 6.3.0.0 iFix06",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.2.1 ant\u00e9rieures \u00e0 6.2.1.0 iFix13",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 avec un fichier openssl.base versions ant\u00e9rieures \u00e0 1.1.1.2400 ou 3.0.13.1000",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0.x ant\u00e9rieures \u00e0 7.5.0 UP9 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2024-27059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27059"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2024-26897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
},
{
"name": "CVE-2021-47055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47055"
},
{
"name": "CVE-2024-35154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35154"
},
{
"name": "CVE-2020-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2021-47185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47185"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2024-23650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23650"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2024-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3652"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26643"
},
{
"name": "CVE-2024-26779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-32021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32021"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
},
{
"name": "CVE-2024-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2024-27048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27048"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2023-39320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2021-47171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47171"
},
{
"name": "CVE-2024-26743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26743"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2024-32004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32004"
},
{
"name": "CVE-2021-47118",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47118"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-32020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32020"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2019-20372",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20372"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-32487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2021-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47153"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2024-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2357"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-26919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26919"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-1394",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1394"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2024-32465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32465"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2021-46934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26693"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-26872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26872"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2024-26744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26744"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2022-48669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48669"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2024-26694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26694"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2018-25091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25091"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
}
],
"initial_release_date": "2024-08-02T00:00:00",
"last_revision_date": "2024-08-02T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0646",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7161679",
"url": "https://www.ibm.com/support/pages/node/7161679"
},
{
"published_at": "2024-07-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7161667",
"url": "https://www.ibm.com/support/pages/node/7161667"
},
{
"published_at": "2024-07-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7161954",
"url": "https://www.ibm.com/support/pages/node/7161954"
},
{
"published_at": "2024-07-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7162032",
"url": "https://www.ibm.com/support/pages/node/7162032"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160144",
"url": "https://www.ibm.com/support/pages/node/7160144"
},
{
"published_at": "2024-07-31",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7162077",
"url": "https://www.ibm.com/support/pages/node/7162077"
}
]
}
CERTFR-2025-AVI-0256
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Broadcom VMware Tanzu Greenplum. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Broadcom | VMware Tanzu Greenplum | VMware Tanzu Greenplum Data Copy Utility versions 2.x antérieures à 2.7.1 | ||
| Broadcom | VMware Tanzu Greenplum | VMware Tanzu Greenplum Command Center versions 6.x antérieures à 6.13.1 | ||
| Broadcom | VMware Tanzu Greenplum | VMware Tanzu Greenplum Command Center versions 7.x antérieures à 7.3.1 | ||
| Broadcom | VMware Tanzu Greenplum | VMware Tanzu Greenplum Streaming Server versions 2.x antérieures à 2.0.1 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Tanzu Greenplum Data Copy Utility versions 2.x ant\u00e9rieures \u00e0 2.7.1",
"product": {
"name": "VMware Tanzu Greenplum",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "VMware Tanzu Greenplum Command Center versions 6.x ant\u00e9rieures \u00e0 6.13.1",
"product": {
"name": "VMware Tanzu Greenplum",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "VMware Tanzu Greenplum Command Center versions 7.x ant\u00e9rieures \u00e0 7.3.1 ",
"product": {
"name": "VMware Tanzu Greenplum",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "VMware Tanzu Greenplum Streaming Server versions 2.x ant\u00e9rieures \u00e0 2.0.1",
"product": {
"name": "VMware Tanzu Greenplum",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
}
],
"initial_release_date": "2025-03-31T00:00:00",
"last_revision_date": "2025-03-31T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0256",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-03-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Broadcom VMware Tanzu Greenplum. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Broadcom VMware Tanzu Greenplum",
"vendor_advisories": [
{
"published_at": "2025-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 Broadcom 25562",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25562"
},
{
"published_at": "2025-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 Broadcom 25561",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25561"
},
{
"published_at": "2025-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 Broadcom 25565",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25565"
}
]
}
CERTFR-2025-AVI-0524
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
| VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
| VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
| VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.8.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Command Center versions ant\u00e9rieures \u00e0 6.14.0 et 7.4.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 6.x ant\u00e9rieures \u00e0 6.29.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 7.x ant\u00e9rieures \u00e0 7.5.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour Valkey sur Kubernetes versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2126"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2021-45943",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45943"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2022-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-4752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4752"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2022-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0543"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-1580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1580"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-23807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23807"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2022-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2017-17507",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17507"
},
{
"name": "CVE-2017-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
},
{
"name": "CVE-2018-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10126"
},
{
"name": "CVE-2018-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11205"
},
{
"name": "CVE-2018-13866",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13866"
},
{
"name": "CVE-2018-13867",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13867"
},
{
"name": "CVE-2018-13868",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13868"
},
{
"name": "CVE-2018-13869",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13869"
},
{
"name": "CVE-2018-13870",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13870"
},
{
"name": "CVE-2018-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13871"
},
{
"name": "CVE-2018-13872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13872"
},
{
"name": "CVE-2018-13874",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13874"
},
{
"name": "CVE-2018-13875",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13875"
},
{
"name": "CVE-2018-13876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13876"
},
{
"name": "CVE-2018-14031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14031"
},
{
"name": "CVE-2018-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14033"
},
{
"name": "CVE-2018-14034",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14034"
},
{
"name": "CVE-2018-14035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14035"
},
{
"name": "CVE-2018-14460",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14460"
},
{
"name": "CVE-2018-15671",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15671"
},
{
"name": "CVE-2018-16438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16438"
},
{
"name": "CVE-2018-17432",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17432"
},
{
"name": "CVE-2018-17433",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17433"
},
{
"name": "CVE-2018-17434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17434"
},
{
"name": "CVE-2018-17435",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17435"
},
{
"name": "CVE-2018-17436",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17436"
},
{
"name": "CVE-2018-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17437"
},
{
"name": "CVE-2018-17438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17438"
},
{
"name": "CVE-2018-17439",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17439"
},
{
"name": "CVE-2019-20005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20005"
},
{
"name": "CVE-2019-20006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20006"
},
{
"name": "CVE-2019-20007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20007"
},
{
"name": "CVE-2019-20198",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20198"
},
{
"name": "CVE-2019-20199",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20199"
},
{
"name": "CVE-2019-20200",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20200"
},
{
"name": "CVE-2019-20201",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20201"
},
{
"name": "CVE-2019-20202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20202"
},
{
"name": "CVE-2019-6988",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6988"
},
{
"name": "CVE-2019-8396",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8396"
},
{
"name": "CVE-2019-8397",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8397"
},
{
"name": "CVE-2019-8398",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8398"
},
{
"name": "CVE-2019-9151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9151"
},
{
"name": "CVE-2019-9152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9152"
},
{
"name": "CVE-2020-10809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10809"
},
{
"name": "CVE-2020-10810",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10810"
},
{
"name": "CVE-2020-10811",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10811"
},
{
"name": "CVE-2020-10812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10812"
},
{
"name": "CVE-2020-18232",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18232"
},
{
"name": "CVE-2020-18494",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18494"
},
{
"name": "CVE-2021-26220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26220"
},
{
"name": "CVE-2021-26221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26221"
},
{
"name": "CVE-2021-26222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26222"
},
{
"name": "CVE-2021-30485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30485"
},
{
"name": "CVE-2021-31229",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31229"
},
{
"name": "CVE-2021-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31347"
},
{
"name": "CVE-2021-31348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31348"
},
{
"name": "CVE-2021-31598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31598"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2021-37501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37501"
},
{
"name": "CVE-2021-45829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45829"
},
{
"name": "CVE-2021-45830",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45830"
},
{
"name": "CVE-2021-45832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45832"
},
{
"name": "CVE-2021-45833",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45833"
},
{
"name": "CVE-2021-46242",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46242"
},
{
"name": "CVE-2021-46243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46243"
},
{
"name": "CVE-2021-46244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46244"
},
{
"name": "CVE-2022-25942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25942"
},
{
"name": "CVE-2022-25972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25972"
},
{
"name": "CVE-2022-26061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26061"
},
{
"name": "CVE-2022-30045",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30045"
},
{
"name": "CVE-2022-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4055"
},
{
"name": "CVE-2022-47655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47655"
},
{
"name": "CVE-2023-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0996"
},
{
"name": "CVE-2023-29659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29659"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-39329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39329"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2023-6879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6879"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2024-29157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29157"
},
{
"name": "CVE-2024-29158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29158"
},
{
"name": "CVE-2024-29159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29159"
},
{
"name": "CVE-2024-29160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29160"
},
{
"name": "CVE-2024-29161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29161"
},
{
"name": "CVE-2024-29162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29162"
},
{
"name": "CVE-2024-29163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29163"
},
{
"name": "CVE-2024-29164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29164"
},
{
"name": "CVE-2024-29165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29165"
},
{
"name": "CVE-2024-29166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29166"
},
{
"name": "CVE-2024-32605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32605"
},
{
"name": "CVE-2024-32606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32606"
},
{
"name": "CVE-2024-32607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32607"
},
{
"name": "CVE-2024-32608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32608"
},
{
"name": "CVE-2024-32609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32609"
},
{
"name": "CVE-2024-32610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32610"
},
{
"name": "CVE-2024-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32611"
},
{
"name": "CVE-2024-32612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32612"
},
{
"name": "CVE-2024-32613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32613"
},
{
"name": "CVE-2024-32614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32614"
},
{
"name": "CVE-2024-32615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32615"
},
{
"name": "CVE-2024-32616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32616"
},
{
"name": "CVE-2024-32617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32617"
},
{
"name": "CVE-2024-32618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32618"
},
{
"name": "CVE-2024-32619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32619"
},
{
"name": "CVE-2024-32620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32620"
},
{
"name": "CVE-2024-32621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32621"
},
{
"name": "CVE-2024-32622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32622"
},
{
"name": "CVE-2024-32623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32623"
},
{
"name": "CVE-2024-32624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32624"
},
{
"name": "CVE-2024-33873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33873"
},
{
"name": "CVE-2024-33874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33874"
},
{
"name": "CVE-2024-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33875"
},
{
"name": "CVE-2024-33876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33876"
},
{
"name": "CVE-2024-33877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33877"
},
{
"name": "CVE-2024-34402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34402"
},
{
"name": "CVE-2024-34403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34403"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2024-41996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41996"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2024-46981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46981"
},
{
"name": "CVE-2024-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49203"
},
{
"name": "CVE-2024-5171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5171"
},
{
"name": "CVE-2024-51741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51741"
},
{
"name": "CVE-2024-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52522"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2024-56378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56378"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2024-6716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6716"
},
{
"name": "CVE-2025-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2153"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-23022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23022"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
}
],
"initial_release_date": "2025-06-19T00:00:00",
"last_revision_date": "2025-06-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0524",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35841",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35844",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35843",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35842",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35846",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35849",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35840",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35847",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35839",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35845",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35848",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848"
}
]
}
ghsa-679v-hh23-h5jh
Vulnerability from github
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
{
"affected": [],
"aliases": [
"CVE-2023-39323"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-10-05T21:15:11Z",
"severity": "CRITICAL"
},
"details": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"id": "GHSA-679v-hh23-h5jh",
"modified": "2025-06-12T18:31:06Z",
"published": "2023-10-05T21:30:46Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39323"
},
{
"type": "WEB",
"url": "https://go.dev/cl/533215"
},
{
"type": "WEB",
"url": "https://go.dev/issue/63211"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2023-2095"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20231020-0001"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
msrc_cve-2023-39323
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39323 Arbitrary code execution during build via line directives in cmd/go - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-39323.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Arbitrary code execution during build via line directives in cmd/go",
"tracking": {
"current_release_date": "2025-09-03T21:58:26.000Z",
"generator": {
"date": "2025-10-20T00:44:26.406Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-39323",
"initial_release_date": "2023-10-01T00:00:00.000Z",
"revision_history": [
{
"date": "2025-09-03T21:58:26.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 golang 1.17.13-2",
"product": {
"name": "\u003ccbl2 golang 1.17.13-2",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 golang 1.17.13-2",
"product": {
"name": "cbl2 golang 1.17.13-2",
"product_id": "19778"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 golang 1.21.6-1",
"product": {
"name": "\u003ccbl2 golang 1.21.6-1",
"product_id": "10"
}
},
{
"category": "product_version",
"name": "cbl2 golang 1.21.6-1",
"product": {
"name": "cbl2 golang 1.21.6-1",
"product_id": "17375"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 golang 1.20.10-1",
"product": {
"name": "\u003ccbl2 golang 1.20.10-1",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "cbl2 golang 1.20.10-1",
"product": {
"name": "cbl2 golang 1.20.10-1",
"product_id": "18153"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 golang 1.20.10-1",
"product": {
"name": "\u003cazl3 golang 1.20.10-1",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "azl3 golang 1.20.10-1",
"product": {
"name": "azl3 golang 1.20.10-1",
"product_id": "18154"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 golang 1.18.8-7",
"product": {
"name": "\u003ccbl2 golang 1.18.8-7",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 golang 1.18.8-7",
"product": {
"name": "cbl2 golang 1.18.8-7",
"product_id": "19785"
}
}
],
"category": "product_name",
"name": "golang"
},
{
"category": "product_name",
"name": "cbl2 tensorflow 2.11.1-2",
"product": {
"name": "cbl2 tensorflow 2.11.1-2",
"product_id": "6"
}
},
{
"category": "product_name",
"name": "cbl2 msft-golang 1.24.1-2",
"product": {
"name": "cbl2 msft-golang 1.24.1-2",
"product_id": "3"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "azl3 tensorflow 2.16.1-9",
"product_id": "9"
}
},
{
"category": "product_name",
"name": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "azl3 python-tensorboard 2.16.2-6",
"product_id": "5"
}
},
{
"category": "product_name",
"name": "azl3 golang 1.24.3-1",
"product": {
"name": "azl3 golang 1.24.3-1",
"product_id": "4"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 golang 1.17.13-2 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 golang 1.17.13-2 as a component of CBL Mariner 2.0",
"product_id": "19778-17086"
},
"product_reference": "19778",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 tensorflow 2.11.1-2 as a component of CBL Mariner 2.0",
"product_id": "17086-6"
},
"product_reference": "6",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 golang 1.21.6-1 as a component of CBL Mariner 2.0",
"product_id": "17086-10"
},
"product_reference": "10",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 golang 1.21.6-1 as a component of CBL Mariner 2.0",
"product_id": "17375-17086"
},
"product_reference": "17375",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 golang 1.20.10-1 as a component of CBL Mariner 2.0",
"product_id": "17086-8"
},
"product_reference": "8",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 golang 1.20.10-1 as a component of CBL Mariner 2.0",
"product_id": "18153-17086"
},
"product_reference": "18153",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 golang 1.20.10-1 as a component of Azure Linux 3.0",
"product_id": "17084-7"
},
"product_reference": "7",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.20.10-1 as a component of Azure Linux 3.0",
"product_id": "18154-17084"
},
"product_reference": "18154",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 msft-golang 1.24.1-2 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 golang 1.18.8-7 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 golang 1.18.8-7 as a component of CBL Mariner 2.0",
"product_id": "19785-17086"
},
"product_reference": "19785",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17084-9"
},
"product_reference": "9",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.16.2-6 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.24.3-1 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39323",
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17086-6",
"17084-9",
"17084-5",
"17084-4"
]
},
{
"label": "vulnerable_code_not_present",
"product_ids": [
"17086-3"
]
}
],
"notes": [
{
"category": "general",
"text": "Go",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19778-17086",
"17375-17086",
"18153-17086",
"18154-17084",
"19785-17086"
],
"known_affected": [
"17086-2",
"17086-10",
"17086-8",
"17084-7",
"17086-1"
],
"known_not_affected": [
"17086-6",
"17086-3",
"17084-9",
"17084-5",
"17084-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39323 Arbitrary code execution during build via line directives in cmd/go - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-39323.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-03T21:58:26.000Z",
"details": "Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-09-03T21:58:26.000Z",
"details": "1.21.6-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-10"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-09-03T21:58:26.000Z",
"details": " 1.20.10-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-8",
"17084-7"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"17086-2",
"17086-10",
"17086-8",
"17084-7",
"17086-1"
]
}
],
"title": "Arbitrary code execution during build via line directives in cmd/go"
}
]
}
gsd-2023-39323
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2023-39323",
"id": "GSD-2023-39323"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-39323"
],
"details": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.",
"id": "GSD-2023-39323",
"modified": "2023-12-13T01:20:33.654209Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@golang.org",
"ID": "CVE-2023-39323",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "cmd/go",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "0",
"version_value": "1.20.9"
},
{
"version_affected": "\u003c",
"version_name": "1.21.0-0",
"version_value": "1.21.2"
}
]
}
}
]
},
"vendor_name": "Go toolchain"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE 94: Improper Control of Generation of Code (\u0027Code Injection\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://go.dev/issue/63211",
"refsource": "MISC",
"url": "https://go.dev/issue/63211"
},
{
"name": "https://go.dev/cl/533215",
"refsource": "MISC",
"url": "https://go.dev/cl/533215"
},
{
"name": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo",
"refsource": "MISC",
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"name": "https://pkg.go.dev/vuln/GO-2023-2095",
"refsource": "MISC",
"url": "https://pkg.go.dev/vuln/GO-2023-2095"
},
{
"name": "https://security.netapp.com/advisory/ntap-20231020-0001/",
"refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20231020-0001/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"
},
{
"name": "https://security.gentoo.org/glsa/202311-09",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/202311-09"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84851C3D-3035-457E-96D9-48E219817D58",
"versionEndExcluding": "1.20.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7381A279-81EB-48D9-8065-C733FA8736B8",
"versionEndExcluding": "1.21.2",
"versionStartIncluding": "1.21.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex."
},
{
"lang": "es",
"value": "Las directivas de l\u00ednea (\"//line\") se pueden utilizar para evitar las restricciones de las directivas \"//go:cgo_\", permitiendo que se pasen indicadores bloqueados del enlazador y del compilador durante la compilaci\u00f3n. Esto puede provocar la ejecuci\u00f3n inesperada de c\u00f3digo arbitrario al ejecutar \"go build\". La directiva de l\u00ednea requiere la ruta absoluta del archivo en el que se encuentra la directiva, lo que hace que explotar este problema sea significativamente m\u00e1s complejo."
}
],
"id": "CVE-2023-39323",
"lastModified": "2024-01-04T18:04:15.457",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-10-05T21:15:11.283",
"references": [
{
"source": "security@golang.org",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/533215"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://go.dev/issue/63211"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Release Notes"
],
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2095"
},
{
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20231020-0001/"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.