Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-24787
Vulnerability from cvelistv5
Published
2024-05-08 15:31
Modified
2025-02-13 17:40
Severity ?
EPSS score ?
Summary
On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Go toolchain | cmd/go |
Version: 0 ≤ Version: 1.22.0-0 ≤ |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:golang:go:1.21.0:-:*:*:*:*:*:*", ], defaultStatus: "affected", product: "go", vendor: "golang", versions: [ { status: "affected", version: "1.21.0", }, { status: "affected", version: "1.22", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.4, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-24787", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-05T14:49:29.014816Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-05T14:54:50.242Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T23:28:12.679Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://go.dev/issue/67119", }, { tags: [ "x_transferred", ], url: "https://go.dev/cl/583815", }, { tags: [ "x_transferred", ], url: "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", }, { tags: [ "x_transferred", ], url: "https://pkg.go.dev/vuln/GO-2024-2825", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20240531-0006/", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/05/08/3", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { collectionURL: "https://pkg.go.dev", defaultStatus: "unaffected", packageName: "cmd/go", platforms: [ "darwin", ], product: "cmd/go", vendor: "Go toolchain", versions: [ { lessThan: "1.21.10", status: "affected", version: "0", versionType: "semver", }, { lessThan: "1.22.3", status: "affected", version: "1.22.0-0", versionType: "semver", }, ], }, ], credits: [ { lang: "en", value: "Juho Forsén (Mattermost)", }, ], descriptions: [ { lang: "en", value: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", }, ], problemTypes: [ { descriptions: [ { description: "CWE 74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-10T16:10:10.782Z", orgId: "1bb62c36-49e3-4200-9d77-64a1400537cc", shortName: "Go", }, references: [ { url: "https://go.dev/issue/67119", }, { url: "https://go.dev/cl/583815", }, { url: "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", }, { url: "https://pkg.go.dev/vuln/GO-2024-2825", }, { url: "https://security.netapp.com/advisory/ntap-20240531-0006/", }, { url: "http://www.openwall.com/lists/oss-security/2024/05/08/3", }, ], title: "Arbitrary code execution during build on Darwin in cmd/go", }, }, cveMetadata: { assignerOrgId: "1bb62c36-49e3-4200-9d77-64a1400537cc", assignerShortName: "Go", cveId: "CVE-2024-24787", datePublished: "2024-05-08T15:31:14.530Z", dateReserved: "2024-01-30T16:05:14.758Z", dateUpdated: "2025-02-13T17:40:26.439Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { descriptions: "[{\"lang\": \"en\", \"value\": \"On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \\\"#cgo LDFLAGS\\\" directive.\"}, {\"lang\": \"es\", \"value\": \"En Darwin, crear un m\\u00f3dulo Go que contenga CGO puede desencadenar la ejecuci\\u00f3n de c\\u00f3digo arbitrario cuando se usa la versi\\u00f3n Apple de ld, debido al uso del indicador -lto_library en una directiva \\\"#cgo LDFLAGS\\\".\"}]", id: "CVE-2024-24787", lastModified: "2024-11-21T08:59:42.297", metrics: "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.5, \"impactScore\": 5.9}]}", published: "2024-05-08T16:15:08.183", references: "[{\"url\": \"http://www.openwall.com/lists/oss-security/2024/05/08/3\", \"source\": \"security@golang.org\"}, {\"url\": \"https://go.dev/cl/583815\", \"source\": \"security@golang.org\"}, {\"url\": \"https://go.dev/issue/67119\", \"source\": \"security@golang.org\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/wkkO4P9stm0\", \"source\": \"security@golang.org\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2024-2825\", \"source\": \"security@golang.org\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240531-0006/\", \"source\": \"security@golang.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/05/08/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://go.dev/cl/583815\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://go.dev/issue/67119\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/wkkO4P9stm0\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2024-2825\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240531-0006/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", sourceIdentifier: "security@golang.org", vulnStatus: "Awaiting Analysis", }, nvd: "{\"cve\":{\"id\":\"CVE-2024-24787\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2024-05-08T16:15:08.183\",\"lastModified\":\"2024-11-21T08:59:42.297\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \\\"#cgo LDFLAGS\\\" directive.\"},{\"lang\":\"es\",\"value\":\"En Darwin, crear un módulo Go que contenga CGO puede desencadenar la ejecución de código arbitrario cuando se usa la versión Apple de ld, debido al uso del indicador -lto_library en una directiva \\\"#cgo LDFLAGS\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":5.9}]},\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2024/05/08/3\",\"source\":\"security@golang.org\"},{\"url\":\"https://go.dev/cl/583815\",\"source\":\"security@golang.org\"},{\"url\":\"https://go.dev/issue/67119\",\"source\":\"security@golang.org\"},{\"url\":\"https://groups.google.com/g/golang-announce/c/wkkO4P9stm0\",\"source\":\"security@golang.org\"},{\"url\":\"https://pkg.go.dev/vuln/GO-2024-2825\",\"source\":\"security@golang.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240531-0006/\",\"source\":\"security@golang.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/05/08/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://go.dev/cl/583815\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://go.dev/issue/67119\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://groups.google.com/g/golang-announce/c/wkkO4P9stm0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://pkg.go.dev/vuln/GO-2024-2825\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240531-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://go.dev/issue/67119\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://go.dev/cl/583815\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://groups.google.com/g/golang-announce/c/wkkO4P9stm0\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://pkg.go.dev/vuln/GO-2024-2825\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240531-0006/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/05/08/3\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T23:28:12.679Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-24787\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-05T14:49:29.014816Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:golang:go:1.21.0:-:*:*:*:*:*:*\"], \"vendor\": \"golang\", \"product\": \"go\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.21.0\"}, {\"status\": \"affected\", \"version\": \"1.22\"}], \"defaultStatus\": \"affected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-05T14:53:02.626Z\"}}], \"cna\": {\"title\": \"Arbitrary code execution during build on Darwin in cmd/go\", \"credits\": [{\"lang\": \"en\", \"value\": \"Juho Fors\\u00e9n (Mattermost)\"}], \"affected\": [{\"vendor\": \"Go toolchain\", \"product\": \"cmd/go\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.21.10\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.22.0-0\", \"lessThan\": \"1.22.3\", \"versionType\": \"semver\"}], \"platforms\": [\"darwin\"], \"packageName\": \"cmd/go\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://go.dev/issue/67119\"}, {\"url\": \"https://go.dev/cl/583815\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/wkkO4P9stm0\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2024-2825\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240531-0006/\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/05/08/3\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \\\"#cgo LDFLAGS\\\" directive.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE 74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2024-06-10T16:10:10.782Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2024-24787\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T17:40:26.439Z\", \"dateReserved\": \"2024-01-30T16:05:14.758Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2024-05-08T15:31:14.530Z\", \"assignerShortName\": \"Go\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
gsd-2024-24787
Vulnerability from gsd
Modified
2024-01-31 06:02
Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
{ gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2024-24787", ], id: "GSD-2024-24787", modified: "2024-01-31T06:02:39.995070Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2024-24787", STATE: "RESERVED", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", }, ], }, }, }, }
fkie_cve-2024-24787
Vulnerability from fkie_nvd
Published
2024-05-08 16:15
Modified
2024-11-21 08:59
Severity ?
Summary
On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive.
References
Impacted products
Vendor | Product | Version |
---|
{ cveTags: [], descriptions: [ { lang: "en", value: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", }, { lang: "es", value: "En Darwin, crear un módulo Go que contenga CGO puede desencadenar la ejecución de código arbitrario cuando se usa la versión Apple de ld, debido al uso del indicador -lto_library en una directiva \"#cgo LDFLAGS\".", }, ], id: "CVE-2024-24787", lastModified: "2024-11-21T08:59:42.297", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.4, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.5, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-05-08T16:15:08.183", references: [ { source: "security@golang.org", url: "http://www.openwall.com/lists/oss-security/2024/05/08/3", }, { source: "security@golang.org", url: "https://go.dev/cl/583815", }, { source: "security@golang.org", url: "https://go.dev/issue/67119", }, { source: "security@golang.org", url: "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", }, { source: "security@golang.org", url: "https://pkg.go.dev/vuln/GO-2024-2825", }, { source: "security@golang.org", url: "https://security.netapp.com/advisory/ntap-20240531-0006/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2024/05/08/3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://go.dev/cl/583815", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://go.dev/issue/67119", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://pkg.go.dev/vuln/GO-2024-2825", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20240531-0006/", }, ], sourceIdentifier: "security@golang.org", vulnStatus: "Awaiting Analysis", }
ghsa-5fq7-4mxc-535h
Vulnerability from github
Published
2024-05-08 18:30
Modified
2024-07-03 18:39
Severity ?
Details
On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive.
{ affected: [], aliases: [ "CVE-2024-24787", ], database_specific: { cwe_ids: [], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2024-05-08T16:15:08Z", severity: "MODERATE", }, details: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", id: "GHSA-5fq7-4mxc-535h", modified: "2024-07-03T18:39:57Z", published: "2024-05-08T18:30:48Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-24787", }, { type: "WEB", url: "https://go.dev/cl/583815", }, { type: "WEB", url: "https://go.dev/issue/67119", }, { type: "WEB", url: "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", }, { type: "WEB", url: "https://pkg.go.dev/vuln/GO-2024-2825", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20240531-0006", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2024/05/08/3", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
suse-su-2024:1587-1
Vulnerability from csaf_suse
Published
2024-05-10 07:18
Modified
2024-05-10 07:18
Summary
Security update for go1.22
Notes
Title of the patch
Security update for go1.22
Description of the patch
This update for go1.22 fixes the following issues:
Update to go1.22.3:
- CVE-2024-24787: cmd/go: arbitrary code execution during build on darwin (bsc#1224017)
- CVE-2024-24788: net: high cpu usage in extractExtendedRCode (bsc#1224018)
- cmd/compile: Go 1.22.x failed to be bootstrapped from 386 to ppc64le
- cmd/compile: changing a hot concrete method to interface method triggers a PGO ICE
- runtime: deterministic fallback hashes across process boundary
- net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0
Patchnames
SUSE-2024-1587,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1587,openSUSE-SLE-15.5-2024-1587,openSUSE-SLE-15.6-2024-1587
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for go1.22", title: "Title of the patch", }, { category: "description", text: "This update for go1.22 fixes the following issues:\n\nUpdate to go1.22.3:\n\n- CVE-2024-24787: cmd/go: arbitrary code execution during build on darwin (bsc#1224017)\n- CVE-2024-24788: net: high cpu usage in extractExtendedRCode (bsc#1224018)\n- cmd/compile: Go 1.22.x failed to be bootstrapped from 386 to ppc64le\n- cmd/compile: changing a hot concrete method to interface method triggers a PGO ICE\n- runtime: deterministic fallback hashes across process boundary\n- net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-1587,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1587,openSUSE-SLE-15.5-2024-1587,openSUSE-SLE-15.6-2024-1587", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1587-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:1587-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20241587-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:1587-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018503.html", }, { category: "self", summary: "SUSE Bug 1218424", url: "https://bugzilla.suse.com/1218424", }, { category: "self", summary: "SUSE Bug 1224017", url: "https://bugzilla.suse.com/1224017", }, { category: "self", summary: "SUSE Bug 1224018", url: "https://bugzilla.suse.com/1224018", }, { category: "self", summary: "SUSE CVE CVE-2024-24787 page", url: "https://www.suse.com/security/cve/CVE-2024-24787/", }, { category: "self", summary: "SUSE CVE CVE-2024-24788 page", url: "https://www.suse.com/security/cve/CVE-2024-24788/", }, ], title: "Security update for go1.22", tracking: { current_release_date: "2024-05-10T07:18:43Z", generator: { date: "2024-05-10T07:18:43Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:1587-1", initial_release_date: "2024-05-10T07:18:43Z", revision_history: [ { date: "2024-05-10T07:18:43Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "go1.22-1.22.3-150000.1.15.1.aarch64", product: { name: "go1.22-1.22.3-150000.1.15.1.aarch64", product_id: "go1.22-1.22.3-150000.1.15.1.aarch64", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-150000.1.15.1.aarch64", product: { name: "go1.22-doc-1.22.3-150000.1.15.1.aarch64", product_id: "go1.22-doc-1.22.3-150000.1.15.1.aarch64", }, }, { category: "product_version", name: "go1.22-race-1.22.3-150000.1.15.1.aarch64", product: { name: "go1.22-race-1.22.3-150000.1.15.1.aarch64", product_id: "go1.22-race-1.22.3-150000.1.15.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "go1.22-1.22.3-150000.1.15.1.i586", product: { name: "go1.22-1.22.3-150000.1.15.1.i586", product_id: "go1.22-1.22.3-150000.1.15.1.i586", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-150000.1.15.1.i586", product: { name: "go1.22-doc-1.22.3-150000.1.15.1.i586", product_id: "go1.22-doc-1.22.3-150000.1.15.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "go1.22-1.22.3-150000.1.15.1.ppc64le", product: { name: "go1.22-1.22.3-150000.1.15.1.ppc64le", product_id: "go1.22-1.22.3-150000.1.15.1.ppc64le", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-150000.1.15.1.ppc64le", product: { name: "go1.22-doc-1.22.3-150000.1.15.1.ppc64le", product_id: "go1.22-doc-1.22.3-150000.1.15.1.ppc64le", }, }, { category: "product_version", name: "go1.22-race-1.22.3-150000.1.15.1.ppc64le", product: { name: "go1.22-race-1.22.3-150000.1.15.1.ppc64le", product_id: "go1.22-race-1.22.3-150000.1.15.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "go1.22-1.22.3-150000.1.15.1.s390x", product: { name: "go1.22-1.22.3-150000.1.15.1.s390x", product_id: "go1.22-1.22.3-150000.1.15.1.s390x", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-150000.1.15.1.s390x", product: { name: "go1.22-doc-1.22.3-150000.1.15.1.s390x", product_id: "go1.22-doc-1.22.3-150000.1.15.1.s390x", }, }, { category: "product_version", name: "go1.22-race-1.22.3-150000.1.15.1.s390x", product: { name: "go1.22-race-1.22.3-150000.1.15.1.s390x", product_id: "go1.22-race-1.22.3-150000.1.15.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "go1.22-1.22.3-150000.1.15.1.x86_64", product: { name: "go1.22-1.22.3-150000.1.15.1.x86_64", product_id: "go1.22-1.22.3-150000.1.15.1.x86_64", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-150000.1.15.1.x86_64", product: { name: "go1.22-doc-1.22.3-150000.1.15.1.x86_64", product_id: "go1.22-doc-1.22.3-150000.1.15.1.x86_64", }, }, { category: "product_version", name: "go1.22-race-1.22.3-150000.1.15.1.x86_64", product: { name: "go1.22-race-1.22.3-150000.1.15.1.x86_64", product_id: "go1.22-race-1.22.3-150000.1.15.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.aarch64", }, product_reference: "go1.22-1.22.3-150000.1.15.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.ppc64le", }, product_reference: "go1.22-1.22.3-150000.1.15.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.s390x", }, product_reference: "go1.22-1.22.3-150000.1.15.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.x86_64", }, product_reference: "go1.22-1.22.3-150000.1.15.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.s390x", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.aarch64", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.s390x", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.x86_64", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.aarch64", }, product_reference: "go1.22-1.22.3-150000.1.15.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.ppc64le", }, product_reference: "go1.22-1.22.3-150000.1.15.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.s390x", }, product_reference: "go1.22-1.22.3-150000.1.15.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.x86_64", }, product_reference: "go1.22-1.22.3-150000.1.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.s390x", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.aarch64", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.s390x", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.x86_64", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.aarch64", }, product_reference: "go1.22-1.22.3-150000.1.15.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.ppc64le", }, product_reference: "go1.22-1.22.3-150000.1.15.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.s390x", }, product_reference: "go1.22-1.22.3-150000.1.15.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-150000.1.15.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.x86_64", }, product_reference: "go1.22-1.22.3-150000.1.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.aarch64", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.s390x", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-150000.1.15.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.x86_64", }, product_reference: "go1.22-doc-1.22.3-150000.1.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.aarch64", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.ppc64le", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.s390x", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-150000.1.15.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.x86_64", }, product_reference: "go1.22-race-1.22.3-150000.1.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2024-24787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24787", }, ], notes: [ { category: "general", text: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24787", url: "https://www.suse.com/security/cve/CVE-2024-24787", }, { category: "external", summary: "SUSE Bug 1224017 for CVE-2024-24787", url: "https://bugzilla.suse.com/1224017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-05-10T07:18:43Z", details: "moderate", }, ], title: "CVE-2024-24787", }, { cve: "CVE-2024-24788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24788", }, ], notes: [ { category: "general", text: "A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24788", url: "https://www.suse.com/security/cve/CVE-2024-24788", }, { category: "external", summary: "SUSE Bug 1224018 for CVE-2024-24788", url: "https://bugzilla.suse.com/1224018", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.5:go1.22-race-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.3-150000.1.15.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.3-150000.1.15.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-05-10T07:18:43Z", details: "moderate", }, ], title: "CVE-2024-24788", }, ], }
suse-su-2024:3089-1
Vulnerability from csaf_suse
Published
2024-09-03 13:52
Modified
2024-09-03 13:52
Summary
Security update for go1.21-openssl
Notes
Title of the patch
Security update for go1.21-openssl
Description of the patch
This update for go1.21-openssl fixes the following issues:
- CVE-2024-24791: Fixed denial of service due to improper 100-continue handling (bsc#1227314)
- CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973)
- CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip (bsc#1225974)
- CVE-2024-24787: Fixed arbitrary code execution during build on darwin in cmd/go (bsc#1224017)
- CVE-2023-45288: Fixed denial of service due to close connections when receiving too many headers in net/http and x/net/http2 (bsc#1221400)
- CVE-2023-45289: Fixed incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http and net/http/cookiejar (bsc#1221000)
- CVE-2023-45290: Fixed memory exhaustion in Request.ParseMultipartForm in net/http (bsc#1221001)
- CVE-2024-24783: Fixed denial of service on certificates with an unknown public key algorithm in crypto/x509 (bsc#1220999)
- CVE-2024-24784: Fixed comments in display names are incorrectly handled in net/mail (bsc#1221002)
- CVE-2024-24785: Fixed errors returned from MarshalJSON methods may break template escaping in html/template (bsc#1221003)
Other fixes:
- Update to version 1.21.13.1 cut from the go1.21-fips-release (jsc#SLE-18320)
- Update to version 1.21.13 (bsc#1212475)
- Remove subpackage go1.x-openssl-libstd for compiled shared object libstd.so. (jsc#PED-1962)
- Ensure VERSION file is present in GOROOT as required by go tool dist and go tool distpack (bsc#1219988)
Patchnames
SUSE-2024-3089,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3089,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3089,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3089,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3089,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3089,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3089,openSUSE-SLE-15.5-2024-3089
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for go1.21-openssl", title: "Title of the patch", }, { category: "description", text: "This update for go1.21-openssl fixes the following issues:\n \n- CVE-2024-24791: Fixed denial of service due to improper 100-continue handling (bsc#1227314)\n- CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973)\n- CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip (bsc#1225974)\n- CVE-2024-24787: Fixed arbitrary code execution during build on darwin in cmd/go (bsc#1224017)\n- CVE-2023-45288: Fixed denial of service due to close connections when receiving too many headers in net/http and x/net/http2 (bsc#1221400)\n- CVE-2023-45289: Fixed incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http and net/http/cookiejar (bsc#1221000) \n- CVE-2023-45290: Fixed memory exhaustion in Request.ParseMultipartForm in net/http (bsc#1221001)\n- CVE-2024-24783: Fixed denial of service on certificates with an unknown public key algorithm in crypto/x509 (bsc#1220999)\n- CVE-2024-24784: Fixed comments in display names are incorrectly handled in net/mail (bsc#1221002)\n- CVE-2024-24785: Fixed errors returned from MarshalJSON methods may break template escaping in html/template (bsc#1221003)\n\nOther fixes:\n- Update to version 1.21.13.1 cut from the go1.21-fips-release (jsc#SLE-18320)\n- Update to version 1.21.13 (bsc#1212475)\n- Remove subpackage go1.x-openssl-libstd for compiled shared object libstd.so. (jsc#PED-1962)\n- Ensure VERSION file is present in GOROOT as required by go tool dist and go tool distpack (bsc#1219988)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-3089,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3089,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3089,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3089,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3089,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3089,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3089,openSUSE-SLE-15.5-2024-3089", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3089-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:3089-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20243089-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:3089-1", url: "https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html", }, { category: "self", summary: "SUSE Bug 1212475", url: "https://bugzilla.suse.com/1212475", }, { category: "self", summary: "SUSE Bug 1219988", url: "https://bugzilla.suse.com/1219988", }, { category: "self", summary: "SUSE Bug 1220999", url: "https://bugzilla.suse.com/1220999", }, { category: "self", summary: "SUSE Bug 1221000", url: "https://bugzilla.suse.com/1221000", }, { category: "self", summary: "SUSE Bug 1221001", url: "https://bugzilla.suse.com/1221001", }, { category: "self", summary: "SUSE Bug 1221002", url: "https://bugzilla.suse.com/1221002", }, { category: "self", summary: "SUSE Bug 1221003", url: "https://bugzilla.suse.com/1221003", }, { category: "self", summary: "SUSE Bug 1221400", url: "https://bugzilla.suse.com/1221400", }, { category: "self", summary: "SUSE Bug 1224017", url: "https://bugzilla.suse.com/1224017", }, { category: "self", summary: "SUSE Bug 1225973", url: "https://bugzilla.suse.com/1225973", }, { category: "self", summary: "SUSE Bug 1225974", url: "https://bugzilla.suse.com/1225974", }, { category: "self", summary: "SUSE Bug 1227314", url: "https://bugzilla.suse.com/1227314", }, { category: "self", summary: "SUSE CVE CVE-2023-45288 page", url: "https://www.suse.com/security/cve/CVE-2023-45288/", }, { category: "self", summary: "SUSE CVE CVE-2023-45289 page", url: "https://www.suse.com/security/cve/CVE-2023-45289/", }, { category: "self", summary: "SUSE CVE CVE-2023-45290 page", url: "https://www.suse.com/security/cve/CVE-2023-45290/", }, { category: "self", summary: "SUSE CVE CVE-2024-24783 page", url: "https://www.suse.com/security/cve/CVE-2024-24783/", }, { category: "self", summary: "SUSE CVE CVE-2024-24784 page", url: "https://www.suse.com/security/cve/CVE-2024-24784/", }, { category: "self", summary: "SUSE CVE CVE-2024-24785 page", url: "https://www.suse.com/security/cve/CVE-2024-24785/", }, { category: "self", summary: "SUSE CVE CVE-2024-24787 page", url: "https://www.suse.com/security/cve/CVE-2024-24787/", }, { category: "self", summary: "SUSE CVE CVE-2024-24789 page", url: "https://www.suse.com/security/cve/CVE-2024-24789/", }, { category: "self", summary: "SUSE CVE CVE-2024-24790 page", url: "https://www.suse.com/security/cve/CVE-2024-24790/", }, { category: "self", summary: "SUSE CVE CVE-2024-24791 page", url: "https://www.suse.com/security/cve/CVE-2024-24791/", }, ], title: "Security update for go1.21-openssl", tracking: { current_release_date: "2024-09-03T13:52:11Z", generator: { date: "2024-09-03T13:52:11Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:3089-1", initial_release_date: "2024-09-03T13:52:11Z", revision_history: [ { date: "2024-09-03T13:52:11Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", product: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", product_id: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", }, }, { category: "product_version", name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", product: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", product_id: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", }, }, { category: "product_version", name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", product: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", product_id: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "go1.21-openssl-1.21.13.1-150000.1.11.1.i586", product: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.i586", product_id: "go1.21-openssl-1.21.13.1-150000.1.11.1.i586", }, }, { category: "product_version", name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.i586", product: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.i586", product_id: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", product: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", product_id: "go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", }, }, { category: "product_version", name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", product: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", product_id: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", }, }, { category: "product_version", name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", product: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", product_id: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", product: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", product_id: "go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", }, }, { category: "product_version", name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", product: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", product_id: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", }, }, { category: "product_version", name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", product: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", product_id: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", product: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", product_id: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", }, }, { category: "product_version", name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", product: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", product_id: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", }, }, { category: "product_version", name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", product: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", product_id: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-45288", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45288", }, ], notes: [ { category: "general", text: "An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45288", url: "https://www.suse.com/security/cve/CVE-2023-45288", }, { category: "external", summary: "SUSE Bug 1221400 for CVE-2023-45288", url: "https://bugzilla.suse.com/1221400", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-09-03T13:52:11Z", details: "moderate", }, ], title: "CVE-2023-45288", }, { cve: "CVE-2023-45289", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45289", }, ], notes: [ { category: "general", text: "When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45289", url: "https://www.suse.com/security/cve/CVE-2023-45289", }, { category: "external", summary: "SUSE Bug 1221000 for CVE-2023-45289", url: "https://bugzilla.suse.com/1221000", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-09-03T13:52:11Z", details: "important", }, ], title: "CVE-2023-45289", }, { cve: "CVE-2023-45290", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45290", }, ], notes: [ { category: "general", text: "When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45290", url: "https://www.suse.com/security/cve/CVE-2023-45290", }, { category: "external", summary: "SUSE Bug 1221001 for CVE-2023-45290", url: "https://bugzilla.suse.com/1221001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-09-03T13:52:11Z", details: "important", }, ], title: "CVE-2023-45290", }, { cve: "CVE-2024-24783", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24783", }, ], notes: [ { category: "general", text: "Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24783", url: "https://www.suse.com/security/cve/CVE-2024-24783", }, { category: "external", summary: "SUSE Bug 1220999 for CVE-2024-24783", url: "https://bugzilla.suse.com/1220999", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-09-03T13:52:11Z", details: "important", }, ], title: "CVE-2024-24783", }, { cve: "CVE-2024-24784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24784", }, ], notes: [ { category: "general", text: "The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24784", url: "https://www.suse.com/security/cve/CVE-2024-24784", }, { category: "external", summary: "SUSE Bug 1221002 for CVE-2024-24784", url: "https://bugzilla.suse.com/1221002", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-09-03T13:52:11Z", details: "important", }, ], title: "CVE-2024-24784", }, { cve: "CVE-2024-24785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24785", }, ], notes: [ { category: "general", text: "If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24785", url: "https://www.suse.com/security/cve/CVE-2024-24785", }, { category: "external", summary: "SUSE Bug 1221003 for CVE-2024-24785", url: "https://bugzilla.suse.com/1221003", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-09-03T13:52:11Z", details: "important", }, ], title: "CVE-2024-24785", }, { cve: "CVE-2024-24787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24787", }, ], notes: [ { category: "general", text: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24787", url: "https://www.suse.com/security/cve/CVE-2024-24787", }, { category: "external", summary: "SUSE Bug 1224017 for CVE-2024-24787", url: "https://bugzilla.suse.com/1224017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-09-03T13:52:11Z", details: "moderate", }, ], title: "CVE-2024-24787", }, { cve: "CVE-2024-24789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24789", }, ], notes: [ { category: "general", text: "The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24789", url: "https://www.suse.com/security/cve/CVE-2024-24789", }, { category: "external", summary: "SUSE Bug 1225973 for CVE-2024-24789", url: "https://bugzilla.suse.com/1225973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-09-03T13:52:11Z", details: "moderate", }, ], title: "CVE-2024-24789", }, { cve: "CVE-2024-24790", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24790", }, ], notes: [ { category: "general", text: "The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24790", url: "https://www.suse.com/security/cve/CVE-2024-24790", }, { category: "external", summary: "SUSE Bug 1225974 for CVE-2024-24790", url: "https://bugzilla.suse.com/1225974", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-09-03T13:52:11Z", details: "moderate", }, ], title: "CVE-2024-24790", }, { cve: "CVE-2024-24791", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24791", }, ], notes: [ { category: "general", text: "The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an \"Expect: 100-continue\" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending \"Expect: 100-continue\" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24791", url: "https://www.suse.com/security/cve/CVE-2024-24791", }, { category: "external", summary: "SUSE Bug 1227314 for CVE-2024-24791", url: "https://bugzilla.suse.com/1227314", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-doc-1.21.13.1-150000.1.11.1.x86_64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.aarch64", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.ppc64le", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.s390x", "openSUSE Leap 15.5:go1.21-openssl-race-1.21.13.1-150000.1.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-09-03T13:52:11Z", details: "moderate", }, ], title: "CVE-2024-24791", }, ], }
suse-su-2024:3755-1
Vulnerability from csaf_suse
Published
2024-10-24 07:54
Modified
2024-10-24 07:54
Summary
Security update for go1.21-openssl
Notes
Title of the patch
Security update for go1.21-openssl
Description of the patch
This update for go1.21-openssl fixes the following issues:
- CVE-2024-24791: Fixed denial of service due to improper 100-continue handling (bsc#1227314)
- CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973)
- CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip (bsc#1225974)
- CVE-2024-24787: Fixed arbitrary code execution during build on darwin in cmd/go (bsc#1224017)
- CVE-2023-45288: Fixed denial of service due to close connections when receiving too many headers in net/http and x/net/http2 (bsc#1221400)
- CVE-2023-45289: Fixed incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http and net/http/cookiejar (bsc#1221000)
- CVE-2023-45290: Fixed memory exhaustion in Request.ParseMultipartForm in net/http (bsc#1221001)
- CVE-2024-24783: Fixed denial of service on certificates with an unknown public key algorithm in crypto/x509 (bsc#1220999)
- CVE-2024-24784: Fixed comments in display names are incorrectly handled in net/mail (bsc#1221002)
- CVE-2024-24785: Fixed errors returned from MarshalJSON methods may break template escaping in html/template (bsc#1221003)
Other fixes:
- Update to version 1.21.13.1 cut from the go1.21-fips-release (jsc#SLE-18320)
- Update to version 1.21.13 (bsc#1212475)
- Remove subpackage go1.x-openssl-libstd for compiled shared object libstd.so. (jsc#PED-1962)
- Ensure VERSION file is present in GOROOT as required by go tool dist and go tool distpack (bsc#1219988)
Patchnames
SUSE-2024-3755,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3755,openSUSE-SLE-15.6-2024-3755
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for go1.21-openssl", title: "Title of the patch", }, { category: "description", text: "This update for go1.21-openssl fixes the following issues:\n \n- CVE-2024-24791: Fixed denial of service due to improper 100-continue handling (bsc#1227314)\n- CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973)\n- CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip (bsc#1225974)\n- CVE-2024-24787: Fixed arbitrary code execution during build on darwin in cmd/go (bsc#1224017)\n- CVE-2023-45288: Fixed denial of service due to close connections when receiving too many headers in net/http and x/net/http2 (bsc#1221400)\n- CVE-2023-45289: Fixed incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http and net/http/cookiejar (bsc#1221000) \n- CVE-2023-45290: Fixed memory exhaustion in Request.ParseMultipartForm in net/http (bsc#1221001)\n- CVE-2024-24783: Fixed denial of service on certificates with an unknown public key algorithm in crypto/x509 (bsc#1220999)\n- CVE-2024-24784: Fixed comments in display names are incorrectly handled in net/mail (bsc#1221002)\n- CVE-2024-24785: Fixed errors returned from MarshalJSON methods may break template escaping in html/template (bsc#1221003)\n\nOther fixes:\n- Update to version 1.21.13.1 cut from the go1.21-fips-release (jsc#SLE-18320)\n- Update to version 1.21.13 (bsc#1212475)\n- Remove subpackage go1.x-openssl-libstd for compiled shared object libstd.so. (jsc#PED-1962)\n- Ensure VERSION file is present in GOROOT as required by go tool dist and go tool distpack (bsc#1219988)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-3755,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3755,openSUSE-SLE-15.6-2024-3755", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3755-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:3755-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20243755-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:3755-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html", }, { category: "self", summary: "SUSE Bug 1212475", url: "https://bugzilla.suse.com/1212475", }, { category: "self", summary: "SUSE Bug 1219988", url: "https://bugzilla.suse.com/1219988", }, { category: "self", summary: "SUSE Bug 1220999", url: "https://bugzilla.suse.com/1220999", }, { category: "self", summary: "SUSE Bug 1221000", url: "https://bugzilla.suse.com/1221000", }, { category: "self", summary: "SUSE Bug 1221001", url: "https://bugzilla.suse.com/1221001", }, { category: "self", summary: "SUSE Bug 1221002", url: "https://bugzilla.suse.com/1221002", }, { category: "self", summary: "SUSE Bug 1221003", url: "https://bugzilla.suse.com/1221003", }, { category: "self", summary: "SUSE Bug 1221400", url: "https://bugzilla.suse.com/1221400", }, { category: "self", summary: "SUSE Bug 1224017", url: "https://bugzilla.suse.com/1224017", }, { category: "self", summary: "SUSE Bug 1225973", url: "https://bugzilla.suse.com/1225973", }, { category: "self", summary: "SUSE Bug 1225974", url: "https://bugzilla.suse.com/1225974", }, { category: "self", summary: "SUSE Bug 1227314", url: "https://bugzilla.suse.com/1227314", }, { category: "self", summary: "SUSE CVE CVE-2023-45288 page", url: "https://www.suse.com/security/cve/CVE-2023-45288/", }, { category: "self", summary: "SUSE CVE CVE-2023-45289 page", url: "https://www.suse.com/security/cve/CVE-2023-45289/", }, { category: "self", summary: "SUSE CVE CVE-2023-45290 page", url: "https://www.suse.com/security/cve/CVE-2023-45290/", }, { category: "self", summary: "SUSE CVE CVE-2024-24783 page", url: "https://www.suse.com/security/cve/CVE-2024-24783/", }, { category: "self", summary: "SUSE CVE CVE-2024-24784 page", url: "https://www.suse.com/security/cve/CVE-2024-24784/", }, { category: "self", summary: "SUSE CVE CVE-2024-24785 page", url: "https://www.suse.com/security/cve/CVE-2024-24785/", }, { category: "self", summary: "SUSE CVE CVE-2024-24787 page", url: "https://www.suse.com/security/cve/CVE-2024-24787/", }, { category: "self", summary: "SUSE CVE CVE-2024-24789 page", url: "https://www.suse.com/security/cve/CVE-2024-24789/", }, { category: "self", summary: "SUSE CVE CVE-2024-24790 page", url: "https://www.suse.com/security/cve/CVE-2024-24790/", }, { category: "self", summary: "SUSE CVE CVE-2024-24791 page", url: "https://www.suse.com/security/cve/CVE-2024-24791/", }, ], title: "Security update for go1.21-openssl", tracking: { current_release_date: "2024-10-24T07:54:03Z", generator: { date: "2024-10-24T07:54:03Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:3755-1", initial_release_date: "2024-10-24T07:54:03Z", revision_history: [ { date: "2024-10-24T07:54:03Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", product: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", product_id: "go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", }, }, { category: "product_version", name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", product: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", product_id: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", }, }, { category: "product_version", name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", product: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", product_id: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "go1.21-openssl-1.21.13.1-150600.16.3.1.i586", product: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.i586", product_id: "go1.21-openssl-1.21.13.1-150600.16.3.1.i586", }, }, { category: "product_version", name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.i586", product: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.i586", product_id: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", product: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", product_id: "go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", }, }, { category: "product_version", name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", product: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", product_id: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", }, }, { category: "product_version", name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", product: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", product_id: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", product: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", product_id: "go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", }, }, { category: "product_version", name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", product: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", product_id: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", }, }, { category: "product_version", name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", product: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", product_id: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", product: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", product_id: "go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", }, }, { category: "product_version", name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", product: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", product_id: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", }, }, { category: "product_version", name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", product: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", product_id: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP6", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp6", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", }, product_reference: "go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", }, product_reference: "go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", }, product_reference: "go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", }, product_reference: "go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", }, product_reference: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", }, product_reference: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", }, product_reference: "go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", }, product_reference: "go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", }, product_reference: "go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", }, product_reference: "go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", }, product_reference: "go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", }, product_reference: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", }, product_reference: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", }, product_reference: "go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2023-45288", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45288", }, ], notes: [ { category: "general", text: "An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45288", url: "https://www.suse.com/security/cve/CVE-2023-45288", }, { category: "external", summary: "SUSE Bug 1221400 for CVE-2023-45288", url: "https://bugzilla.suse.com/1221400", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-24T07:54:03Z", details: "moderate", }, ], title: "CVE-2023-45288", }, { cve: "CVE-2023-45289", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45289", }, ], notes: [ { category: "general", text: "When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45289", url: "https://www.suse.com/security/cve/CVE-2023-45289", }, { category: "external", summary: "SUSE Bug 1221000 for CVE-2023-45289", url: "https://bugzilla.suse.com/1221000", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-24T07:54:03Z", details: "important", }, ], title: "CVE-2023-45289", }, { cve: "CVE-2023-45290", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45290", }, ], notes: [ { category: "general", text: "When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45290", url: "https://www.suse.com/security/cve/CVE-2023-45290", }, { category: "external", summary: "SUSE Bug 1221001 for CVE-2023-45290", url: "https://bugzilla.suse.com/1221001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-24T07:54:03Z", details: "important", }, ], title: "CVE-2023-45290", }, { cve: "CVE-2024-24783", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24783", }, ], notes: [ { category: "general", text: "Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24783", url: "https://www.suse.com/security/cve/CVE-2024-24783", }, { category: "external", summary: "SUSE Bug 1220999 for CVE-2024-24783", url: "https://bugzilla.suse.com/1220999", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-24T07:54:03Z", details: "important", }, ], title: "CVE-2024-24783", }, { cve: "CVE-2024-24784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24784", }, ], notes: [ { category: "general", text: "The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24784", url: "https://www.suse.com/security/cve/CVE-2024-24784", }, { category: "external", summary: "SUSE Bug 1221002 for CVE-2024-24784", url: "https://bugzilla.suse.com/1221002", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-24T07:54:03Z", details: "important", }, ], title: "CVE-2024-24784", }, { cve: "CVE-2024-24785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24785", }, ], notes: [ { category: "general", text: "If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24785", url: "https://www.suse.com/security/cve/CVE-2024-24785", }, { category: "external", summary: "SUSE Bug 1221003 for CVE-2024-24785", url: "https://bugzilla.suse.com/1221003", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-24T07:54:03Z", details: "important", }, ], title: "CVE-2024-24785", }, { cve: "CVE-2024-24787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24787", }, ], notes: [ { category: "general", text: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24787", url: "https://www.suse.com/security/cve/CVE-2024-24787", }, { category: "external", summary: "SUSE Bug 1224017 for CVE-2024-24787", url: "https://bugzilla.suse.com/1224017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-24T07:54:03Z", details: "moderate", }, ], title: "CVE-2024-24787", }, { cve: "CVE-2024-24789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24789", }, ], notes: [ { category: "general", text: "The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24789", url: "https://www.suse.com/security/cve/CVE-2024-24789", }, { category: "external", summary: "SUSE Bug 1225973 for CVE-2024-24789", url: "https://bugzilla.suse.com/1225973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-24T07:54:03Z", details: "moderate", }, ], title: "CVE-2024-24789", }, { cve: "CVE-2024-24790", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24790", }, ], notes: [ { category: "general", text: "The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24790", url: "https://www.suse.com/security/cve/CVE-2024-24790", }, { category: "external", summary: "SUSE Bug 1225974 for CVE-2024-24790", url: "https://bugzilla.suse.com/1225974", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-24T07:54:03Z", details: "moderate", }, ], title: "CVE-2024-24790", }, { cve: "CVE-2024-24791", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24791", }, ], notes: [ { category: "general", text: "The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an \"Expect: 100-continue\" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending \"Expect: 100-continue\" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24791", url: "https://www.suse.com/security/cve/CVE-2024-24791", }, { category: "external", summary: "SUSE Bug 1227314 for CVE-2024-24791", url: "https://bugzilla.suse.com/1227314", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-doc-1.21.13.1-150600.16.3.1.x86_64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.aarch64", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.ppc64le", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.s390x", "openSUSE Leap 15.6:go1.21-openssl-race-1.21.13.1-150600.16.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-24T07:54:03Z", details: "moderate", }, ], title: "CVE-2024-24791", }, ], }
suse-su-2024:3772-1
Vulnerability from csaf_suse
Published
2024-10-29 13:54
Modified
2024-10-29 13:54
Summary
Security update for go1.22-openssl
Notes
Title of the patch
Security update for go1.22-openssl
Description of the patch
This update for go1.22-openssl fixes the following issues:
This update ships go1.22-openssl 1.22.7.1 (jsc#SLE-18320)
- Update to version 1.22.7.1 cut from the go1.22-fips-release
branch at the revision tagged go1.22.7-1-openssl-fips.
* Update to Go 1.22.7 (#229)
- go1.22.7 (released 2024-09-05) includes security fixes to the
encoding/gob, go/build/constraint, and go/parser packages, as
well as bug fixes to the fix command and the runtime.
CVE-2024-34155 CVE-2024-34156 CVE-2024-34158:
- go#69142 go#69138 bsc#1230252 security: fix CVE-2024-34155 go/parser: stack exhaustion in all Parse* functions (CVE-2024-34155)
- go#69144 go#69139 bsc#1230253 security: fix CVE-2024-34156 encoding/gob: stack exhaustion in Decoder.Decode (CVE-2024-34156)
- go#69148 go#69141 bsc#1230254 security: fix CVE-2024-34158 go/build/constraint: stack exhaustion in Parse (CVE-2024-34158)
- go#68811 os: TestChtimes failures
- go#68825 cmd/fix: fails to run on modules whose go directive value is in '1.n.m' format introduced in Go 1.21.0
- go#68972 cmd/cgo: aix c-archive corrupting stack
- go1.22.6 (released 2024-08-06) includes fixes to the go command,
the compiler, the linker, the trace command, the covdata command,
and the bytes, go/types, and os/exec packages.
* go#68594 cmd/compile: internal compiler error with zero-size types
* go#68546 cmd/trace/v2: pprof profiles always empty
* go#68492 cmd/covdata: too many open files due to defer f.Close() in for loop
* go#68475 bytes: IndexByte can return -4294967295 when memory usage is above 2^31 on js/wasm
* go#68370 go/types: assertion failure in recent range statement checking logic
* go#68331 os/exec: modifications to Path ignored when *Cmd is created using Command with an absolute path on Windows
* go#68230 cmd/compile: inconsistent integer arithmetic result on Go 1.22+arm64 with/without -race
* go#68222 cmd/go: list with -export and -covermode=atomic fails to build
* go#68198 cmd/link: issues with Xcode 16 beta
- Update to version 1.22.5.3 cut from the go1.22-fips-release
branch at the revision tagged go1.22.5-3-openssl-fips.
* Only load openssl if fips == '1'
Avoid loading openssl whenever GOLANG_FIPS is not 1.
Previously only an unset variable would cause the library load
to be skipped, but users may also expect to be able to set eg.
GOLANG_FIPS=0 in environments without openssl.
- Update to version 1.22.5.2 cut from the go1.22-fips-release
branch at the revision tagged go1.22.5-2-openssl-fips.
* Only load OpenSSL when in FIPS mode
- Update to version 1.22.5.1 cut from the go1.22-fips-release
branch at the revision tagged go1.22.5-1-openssl-fips.
* Update to go1.22.5
- go1.22.5 (released 2024-07-02) includes security fixes to the
net/http package, as well as bug fixes to the compiler, cgo, the
go command, the linker, the runtime, and the crypto/tls,
go/types, net, net/http, and os/exec packages.
CVE-2024-24791:
* go#68200 go#67555 bsc#1227314 security: fix CVE CVE-2024-24791 net/http: expect: 100-continue handling is broken in various ways
* go#65983 cmd/compile: hash of unhashable type
* go#65994 crypto/tls: segfault when calling tlsrsakex.IncNonDefault()
* go#66598 os/exec: calling Cmd.Start after setting Cmd.Path manually to absolute path without '.exe' no longer implicitly adds '.exe' in Go 1.22
* go#67298 runtime: 'fatal: morestack on g0' on amd64 after upgrade to Go 1.21, stale bounds
* go#67715 cmd/cgo/internal/swig,cmd/go,x/build: swig cgo tests incompatible with C++ toolchain on builders
* go#67798 cmd/compile: internal compiler error: unexpected type: <nil> (<nil>) in for-range
* go#67820 cmd/compile: package-level variable initialization with constant dependencies doesn't match order specified in Go spec
* go#67850 go/internal/gccgoimporter: go building failing with gcc 14.1.0
* go#67934 net: go DNS resolver fails to connect to local DNS server
* go#67945 cmd/link: using -fuzz with test that links with cgo on darwin causes linker failure
* go#68052 cmd/go: go list -u -m all fails loading module retractions: module requires go >= 1.N+1 (running go 1.N)
* go#68122 cmd/link: runtime.mach_vm_region_trampoline: unsupported dynamic relocation for symbol libc_mach_task_self_ (type=29 (R_GOTPCREL) stype=46 (SDYNIMPORT))
- Update to version 1.22.4.1 cut from the go1.22-fips-release
branch at the revision tagged go1.22.4-1-openssl-fips.
* Update to go1.22.4
- go1.22.4 (released 2024-06-04) includes security fixes to the
archive/zip and net/netip packages, as well as bug fixes to the
compiler, the go command, the linker, the runtime, and the os
package.
CVE-2024-24789 CVE-2024-24790:
* go#67554 go#66869 bsc#1225973 security: fix CVE-2024-24789 archive/zip: EOCDR comment length handling is inconsistent with other ZIP implementations
* go#67682 go#67680 bsc#1225974 security: fix CVE-2024-24790 net/netip: unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
* go#67188 runtime/metrics: /memory/classes/heap/unused:bytes spikes
* go#67212 cmd/compile: SIGBUS unaligned access on mips64 via qemu-mips64
* go#67236 cmd/go: mod tidy reports toolchain not available with 'go 1.21'
* go#67258 runtime: unexpected fault address 0
* go#67311 cmd/go: TestScript/gotoolchain_issue66175 fails on tip locally
* go#67314 cmd/go,cmd/link: TestScript/build_issue48319 and TestScript/build_plugin_reproducible failing on LUCI gotip-darwin-amd64-longtest builder due to non-reproducible LC_UUID
* go#67352 crypto/x509: TestPlatformVerifier failures on Windows due to broken connections
* go#67460 cmd/compile: internal compiler error: panic with range over integer value
* go#67527 cmd/link: panic: machorelocsect: size mismatch
* go#67650 runtime: SIGSEGV after performing clone(CLONE_PARENT) via C constructor prior to runtime start
* go#67696 os: RemoveAll susceptible to symlink race
- Update to version 1.22.3.3 cut from the go1.22-fips-release
branch at the revision tagged go1.22.3-3-openssl-fips.
* config: update openssl backend (#201)
- Update to version 1.22.3.2 cut from the go1.22-fips-release
branch at the revision tagged go1.22.3-2-openssl-fips.
* patches: restore signature of HashSign/HashVerify (#199)
- Update to version 1.22.3.1 cut from the go1.22-fips-release
branch at the revision tagged go1.22.3-1-openssl-fips.
* Update to go1.22.3
* fix: rename patch file
* Backport change https://go-review.googlesource.com/c/go/+/554615 to Go1.22 (#193)
runtime: crash asap and extend total sleep time for slow machine in test
Running with few threads usually does not need 500ms to crash, so let it
crash as soon as possible. While the test may caused more time on slow
machine, try to expand the sleep time in test.
* cmd/go: re-enable CGO for Go toolchain commands (#190)
* crypto/ecdsa: Restore HashSign and HashVerify (#189)
- go1.22.3 (released 2024-05-07) includes security fixes to the go
command and the net package, as well as bug fixes to the
compiler, the runtime, and the net/http package.
CVE-2024-24787 CVE-2024-24788:
* go#67122 go#67119 bsc#1224017 security: fix CVE-2024-24787 cmd/go: arbitrary code execution during build on darwin
* go#67040 go#66754 bsc#1224018 security: fix CVE-2024-24788 net: high cpu usage in extractExtendedRCode
* go#67018 cmd/compile: Go 1.22.x failed to be bootstrapped from 386 to ppc64le
* go#67017 cmd/compile: changing a hot concrete method to interface method triggers a PGO ICE
* go#66886 runtime: deterministic fallback hashes across process boundary
* go#66698 net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0
- Update to version 1.22.2.1 cut from the go1.22-fips-release
branch at the revision tagged go1.22.2-1-openssl-fips.
* Update to go1.22.2
- go1.22.2 (released 2024-04-03) includes a security fix to the
net/http package, as well as bug fixes to the compiler, the go
command, the linker, and the encoding/gob, go/types, net/http,
and runtime/trace packages.
CVE-2023-45288:
* go#66298 go#65051 bsc#1221400 security: fix CVE-2023-45288 net/http, x/net/http2: close connections when receiving too many headers
* go#65858 cmd/compile: unreachable panic with GODEBUG=gotypesalias=1
* go#66060 cmd/link: RISC-V external link, failed to find text symbol for HI20 relocation
* go#66076 cmd/compile: out-of-bounds panic with uint32 conversion and modulus operation in Go 1.22.0 on arm64
* go#66134 cmd/compile: go test . results in CLOSURE ... <unknown line number>: internal compiler error: assertion failed
* go#66137 cmd/go: go 1.22.0: go test throws errors when processing folders not listed in coverpkg argument
* go#66178 cmd/compile: ICE: panic: interface conversion: ir.Node is *ir.ConvExpr, not *ir.IndexExpr
* go#66201 runtime/trace: v2 traces contain an incorrect timestamp scaling factor on Windows
* go#66255 net/http: http2 round tripper nil pointer dereference causes panic causing deadlock
* go#66256 cmd/go: git shallow fetches broken at CL 556358
* go#66273 crypto/x509: Certificate no longer encodable using encoding/gob in Go1.22
* go#66412 cmd/link: bad carrier sym for symbol runtime.elf_savegpr0.args_stackmap on ppc64le
- Update to version 1.22.1.2 cut from the go1.22-fips-release
branch at the revision tagged go1.22.1-2-openssl-fips.
* config: Update openssl v2 module (#178)
- Remove subpackage go1.x-openssl-libstd for compiled shared object
libstd.so.
* Continue to build experimental libstd only on go1.x Tumbleweed.
* Removal fixes build errors on go1.x-openssl Factory and ALP.
* Use of libstd.so is experimental and not recommended for
general use, Go currently has no ABI.
* Feature go build -buildmode=shared is deprecated by upstream,
but not yet removed.
- Initial package go1.22-openssl version 1.22.1.1 cut from the
go1.22-fips-release branch at the revision tagged
go1.22.1-1-openssl-fips.
* Go upstream merged branch dev.boringcrypto in go1.19+.
* In go1.x enable BoringCrypto via GOEXPERIMENT=boringcrypto.
* In go1.x-openssl enable FIPS mode (or boring mode as the
package is named) either via an environment variable
GOLANG_FIPS=1 or by virtue of booting the host in FIPS mode.
* When the operating system is operating in FIPS mode, Go
applications which import crypto/tls/fipsonly limit operations
to the FIPS ciphersuite.
* go1.x-openssl is delivered as two large patches to go1.x
applying necessary modifications from the golang-fips/go GitHub
project for the Go crypto library to use OpenSSL as the
external cryptographic library in a FIPS compliant way.
* go1.x-openssl modifies the crypto/* packages to use OpenSSL for
cryptographic operations.
* go1.x-openssl uses dlopen() to call into OpenSSL.
* SUSE RPM packaging introduces a fourth version digit go1.x.y.z
corresponding to the golang-fips/go patchset tagged revision.
* Patchset improvements can be updated independently of upstream
Go maintenance releases.
- go1.22.1 (released 2024-03-05) includes security fixes to the
crypto/x509, html/template, net/http, net/http/cookiejar, and
net/mail packages, as well as bug fixes to the compiler, the go
command, the runtime, the trace command, and the go/types and
net/http packages.
CVE-2023-45289 CVE-2023-45290 CVE-2024-24783 CVE-2024-24784 CVE-2024-24785:
* go#65831 go#65390 bsc#1220999 security: fix CVE-2024-24783 crypto/x509: Verify panics on certificates with an unknown public key algorithm
* go#65849 go#65083 bsc#1221002 security: fix CVE-2024-24784 net/mail: comments in display names are incorrectly handled
* go#65850 go#65383 bsc#1221001 security: fix CVE-2023-45290 net/http: memory exhaustion in Request.ParseMultipartForm
* go#65859 go#65065 bsc#1221000 security: fix CVE-2023-45289 net/http, net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect
* go#65969 go#65697 bsc#1221003 security: fix CVE-2024-24785 html/template: errors returned from MarshalJSON methods may break template escaping
* go#65352 cmd/go: go generate fails silently when run on a package in a nested workspace module
* go#65471 internal/testenv: TestHasGoBuild failures on the LUCI noopt builders
* go#65474 internal/testenv: support LUCI mobile builders in testenv tests
* go#65577 cmd/trace/v2: goroutine analysis page doesn't identify goroutines consistently
* go#65618 cmd/compile: Go 1.22 build fails with 1.21 PGO profile on internal/saferio change
* go#65619 cmd/compile: Go 1.22 changes support for modules that declare go 1.0
* go#65641 cmd/cgo/internal/testsanitizers,x/build: LUCI clang15 builders failing
* go#65644 runtime: crash in race detector when execution tracer reads from CPU profile buffer
* go#65728 go/types: nil pointer dereference in Alias.Underlying()
* go#65759 net/http: context cancellation can leave HTTP client with deadlocked HTTP/1.1 connections in Go1.22
* go#65760 runtime: Go 1.22.0 fails to build from source on armv7 Alpine Linux
* go#65818 runtime: go1.22.0 test with -race will SIGSEGV or SIGBUS or Bad Pointer
* go#65852 cmd/go: 'missing ziphash' error with go.work
* go#65883 runtime: scheduler sometimes starves a runnable goroutine on wasm platforms
* bsc#1219988 ensure VERSION file is present in GOROOT
as required by go tool dist and go tool distpack
- go1.22 (released 2024-02-06) is a major release of Go.
go1.22.x minor releases will be provided through February 2024.
https://github.com/golang/go/wiki/Go-Release-Cycle
go1.22 arrives six months after go1.21. Most of its changes are
in the implementation of the toolchain, runtime, and libraries.
As always, the release maintains the Go 1 promise of
compatibility. We expect almost all Go programs to continue to
compile and run as before.
* Language change: go1.22 makes two changes to for loops.
Previously, the variables declared by a for loop were created
once and updated by each iteration. In go1.22, each iteration
of the loop creates new variables, to avoid accidental sharing
bugs. The transition support tooling described in the proposal
continues to work in the same way it did in Go 1.21.
* Language change: For loops may now range over integers
* Language change: go1.22 includes a preview of a language change
we are considering for a future version of Go:
range-over-function iterators. Building with
GOEXPERIMENT=rangefunc enables this feature.
* go command: Commands in workspaces can now use a vendor
directory containing the dependencies of the workspace. The
directory is created by go work vendor, and used by build
commands when the -mod flag is set to vendor, which is the
default when a workspace vendor directory is present. Note
that the vendor directory's contents for a workspace are
different from those of a single module: if the directory at
the root of a workspace also contains one of the modules in the
workspace, its vendor directory can contain the dependencies of
either the workspace or of the module, but not both.
* go get is no longer supported outside of a module in the legacy
GOPATH mode (that is, with GO111MODULE=off). Other build
commands, such as go build and go test, will continue to work
indefinitely for legacy GOPATH programs.
* go mod init no longer attempts to import module requirements
from configuration files for other vendoring tools (such as
Gopkg.lock).
* go test -cover now prints coverage summaries for covered
packages that do not have their own test files. Prior to Go
1.22 a go test -cover run for such a package would report: ?
mymod/mypack [no test files] and now with go1.22, functions in
the package are treated as uncovered: mymod/mypack coverage:
0.0% of statements Note that if a package contains no
executable code at all, we can't report a meaningful coverage
percentage; for such packages the go tool will continue to
report that there are no test files.
* trace: The trace tool's web UI has been gently refreshed as
part of the work to support the new tracer, resolving several
issues and improving the readability of various sub-pages. The
web UI now supports exploring traces in a thread-oriented
view. The trace viewer also now displays the full duration of
all system calls. These improvements only apply for viewing
traces produced by programs built with go1.22 or newer. A
future release will bring some of these improvements to traces
produced by older version of Go.
* vet: References to loop variables The behavior of the vet tool
has changed to match the new semantics (see above) of loop
variables in go1.22. When analyzing a file that requires go1.22
or newer (due to its go.mod file or a per-file build
constraint), vetcode> no longer reports references to loop
variables from within a function literal that might outlive the
iteration of the loop. In Go 1.22, loop variables are created
anew for each iteration, so such references are no longer at
risk of using a variable after it has been updated by the loop.
* vet: New warnings for missing values after append The vet tool
now reports calls to append that pass no values to be appended
to the slice, such as slice = append(slice). Such a statement
has no effect, and experience has shown that is nearly always a
mistake.
* vet: New warnings for deferring time.Since The vet tool now
reports a non-deferred call to time.Since(t) within a defer
statement. This is equivalent to calling time.Now().Sub(t)
before the defer statement, not when the deferred function is
called. In nearly all cases, the correct code requires
deferring the time.Since call.
* vet: New warnings for mismatched key-value pairs in log/slog
calls The vet tool now reports invalid arguments in calls to
functions and methods in the structured logging package,
log/slog, that accept alternating key/value pairs. It reports
calls where an argument in a key position is neither a string
nor a slog.Attr, and where a final key is missing its value.
* runtime: The runtime now keeps type-based garbage collection
metadata nearer to each heap object, improving the CPU
performance (latency or throughput) of Go programs by
1-3%. This change also reduces the memory overhead of the
majority Go programs by approximately 1% by deduplicating
redundant metadata. Some programs may see a smaller improvement
because this change adjusts the size class boundaries of the
memory allocator, so some objects may be moved up a size class.
A consequence of this change is that some objects' addresses
that were previously always aligned to a 16 byte (or higher)
boundary will now only be aligned to an 8 byte boundary. Some
programs that use assembly instructions that require memory
addresses to be more than 8-byte aligned and rely on the memory
allocator's previous alignment behavior may break, but we
expect such programs to be rare. Such programs may be built
with GOEXPERIMENT=noallocheaders to revert to the old metadata
layout and restore the previous alignment behavior, but package
owners should update their assembly code to avoid the alignment
assumption, as this workaround will be removed in a future
release.
* runtime: On the windows/amd64 port, programs linking or loading
Go libraries built with -buildmode=c-archive or
-buildmode=c-shared can now use the SetUnhandledExceptionFilter
Win32 function to catch exceptions not handled by the Go
runtime. Note that this was already supported on the
windows/386 port.
* compiler: Profile-guided Optimization (PGO) builds can now
devirtualize a higher proportion of calls than previously
possible. Most programs from a representative set of Go
programs now see between 2 and 14% improvement from enabling
PGO.
* compiler: The compiler now interleaves devirtualization and
inlining, so interface method calls are better optimized.
* compiler: go1.22 also includes a preview of an enhanced
implementation of the compiler's inlining phase that uses
heuristics to boost inlinability at call sites deemed
'important' (for example, in loops) and discourage inlining at
call sites deemed 'unimportant' (for example, on panic
paths). Building with GOEXPERIMENT=newinliner enables the new
call-site heuristics; see issue #61502 for more info and to
provide feedback.
* linker: The linker's -s and -w flags are now behave more
consistently across all platforms. The -w flag suppresses DWARF
debug information generation. The -s flag suppresses symbol
table generation. The -s flag also implies the -w flag, which
can be negated with -w=0. That is, -s -w=0 will generate a
binary with DWARF debug information generation but without the
symbol table.
* linker: On ELF platforms, the -B linker flag now accepts a
special form: with -B gobuildid, the linker will generate a GNU
build ID (the ELF NT_GNU_BUILD_ID note) derived from the Go
build ID.
* linker: On Windows, when building with -linkmode=internal, the
linker now preserves SEH information from C object files by
copying the .pdata and .xdata sections into the final
binary. This helps with debugging and profiling binaries using
native tools, such as WinDbg. Note that until now, C functions'
SEH exception handlers were not being honored, so this change
may cause some programs to behave differently.
-linkmode=external is not affected by this change, as external
linkers already preserve SEH information.
* bootstrap: As mentioned in the Go 1.20 release notes, go1.22
now requires the final point release of Go 1.20 or later for
bootstrap. We expect that Go 1.24 will require the final point
release of go1.22 or later for bootstrap.
* core library: New math/rand/v2 package: go1.22 includes the
first “v2” package in the standard library, math/rand/v2. The
changes compared to math/rand are detailed in proposal
go#61716. The most important changes are:
- The Read method, deprecated in math/rand, was not carried
forward for math/rand/v2. (It remains available in
math/rand.) The vast majority of calls to Read should use
crypto/rand’s Read instead. Otherwise a custom Read can be
constructed using the Uint64 method.
- The global generator accessed by top-level functions is
unconditionally randomly seeded. Because the API guarantees
no fixed sequence of results, optimizations like per-thread
random generator states are now possible.
- The Source interface now has a single Uint64 method; there is
no Source64 interface.
- Many methods now use faster algorithms that were not possible
to adopt in math/rand because they changed the output
streams.
- The Intn, Int31, Int31n, Int63, and Int64n top-level
functions and methods from math/rand are spelled more
idiomatically in math/rand/v2: IntN, Int32, Int32N, Int64,
and Int64N. There are also new top-level functions and
methods Uint32, Uint32N, Uint64, Uint64N, Uint, and UintN.
- The new generic function N is like Int64N or Uint64N but
works for any integer type. For example a random duration
from 0 up to 5 minutes is rand.N(5*time.Minute).
- The Mitchell & Reeds LFSR generator provided by math/rand’s
Source has been replaced by two more modern pseudo-random
generator sources: ChaCha8 PCG. ChaCha8 is a new,
cryptographically strong random number generator roughly
similar to PCG in efficiency. ChaCha8 is the algorithm used
for the top-level functions in math/rand/v2. As of go1.22,
math/rand's top-level functions (when not explicitly seeded)
and the Go runtime also use ChaCha8 for randomness.
- We plan to include an API migration tool in a future release,
likely Go 1.23.
* core library: New go/version package: The new go/version
package implements functions for validating and comparing Go
version strings.
* core library: Enhanced routing patterns: HTTP routing in the
standard library is now more expressive. The patterns used by
net/http.ServeMux have been enhanced to accept methods and
wildcards. This change breaks backwards compatibility in small
ways, some obvious—patterns with '{' and '}' behave
differently— and some less so—treatment of escaped paths has
been improved. The change is controlled by a GODEBUG field
named httpmuxgo121. Set httpmuxgo121=1 to restore the old
behavior.
* Minor changes to the library As always, there are various minor
changes and updates to the library, made with the Go 1 promise
of compatibility in mind. There are also various performance
improvements, not enumerated here.
* archive/tar: The new method Writer.AddFS adds all of the files
from an fs.FS to the archive.
* archive/zip: The new method Writer.AddFS adds all of the files
from an fs.FS to the archive.
* bufio: When a SplitFunc returns ErrFinalToken with a nil token,
Scanner will now stop immediately. Previously, it would report
a final empty token before stopping, which was usually not
desired. Callers that do want to report a final empty token can
do so by returning []byte{} rather than nil.
* cmp: The new function Or returns the first in a sequence of
values that is not the zero value.
* crypto/tls: ConnectionState.ExportKeyingMaterial will now
return an error unless TLS 1.3 is in use, or the
extended_master_secret extension is supported by both the
server and client. crypto/tls has supported this extension
since Go 1.20. This can be disabled with the tlsunsafeekm=1
GODEBUG setting.
* crypto/tls: By default, the minimum version offered by
crypto/tls servers is now TLS 1.2 if not specified with
config.MinimumVersion, matching the behavior of crypto/tls
clients. This change can be reverted with the tls10server=1
GODEBUG setting.
* crypto/tls: By default, cipher suites without ECDHE support are
no longer offered by either clients or servers during pre-TLS
1.3 handshakes. This change can be reverted with the
tlsrsakex=1 GODEBUG setting.
* crypto/x509: The new CertPool.AddCertWithConstraint method can
be used to add customized constraints to root certificates to
be applied during chain building.
* crypto/x509: On Android, root certificates will now be loaded
from /data/misc/keychain/certs-added as well as
/system/etc/security/cacerts.
* crypto/x509: A new type, OID, supports ASN.1 Object Identifiers
with individual components larger than 31 bits. A new field
which uses this type, Policies, is added to the Certificate
struct, and is now populated during parsing. Any OIDs which
cannot be represented using a asn1.ObjectIdentifier will appear
in Policies, but not in the old PolicyIdentifiers field. When
calling CreateCertificate, the Policies field is ignored, and
policies are taken from the PolicyIdentifiers field. Using the
x509usepolicies=1 GODEBUG setting inverts this, populating
certificate policies from the Policies field, and ignoring the
PolicyIdentifiers field. We may change the default value of
x509usepolicies in Go 1.23, making Policies the default field
for marshaling.
* database/sql: The new Null[T] type provide a way to scan
nullable columns for any column types.
* debug/elf: Constant R_MIPS_PC32 is defined for use with MIPS64
systems. Additional R_LARCH_* constants are defined for use
with LoongArch systems.
* encoding: The new methods AppendEncode and AppendDecode added
to each of the Encoding types in the packages encoding/base32,
encoding/base64, and encoding/hex simplify encoding and
decoding from and to byte slices by taking care of byte slice
buffer management.
* encoding: The methods base32.Encoding.WithPadding and
base64.Encoding.WithPadding now panic if the padding argument
is a negative value other than NoPadding.
* encoding/json: Marshaling and encoding functionality now
escapes '\b' and '\f' characters as \b and \f instead of \u0008
and \u000c.
* go/ast: The following declarations related to syntactic
identifier resolution are now deprecated: Ident.Obj, Object,
Scope, File.Scope, File.Unresolved, Importer, Package,
NewPackage. In general, identifiers cannot be accurately
resolved without type information. Consider, for example, the
identifier K in T{K: ''}: it could be the name of a local
variable if T is a map type, or the name of a field if T is a
struct type. New programs should use the go/types package to
resolve identifiers; see Object, Info.Uses, and Info.Defs for
details.
* go/ast: The new ast.Unparen function removes any enclosing
parentheses from an expression.
* go/types: The new Alias type represents type
aliases. Previously, type aliases were not represented
explicitly, so a reference to a type alias was equivalent to
spelling out the aliased type, and the name of the alias was
lost. The new representation retains the intermediate
Alias. This enables improved error reporting (the name of a
type alias can be reported), and allows for better handling of
cyclic type declarations involving type aliases. In a future
release, Alias types will also carry type parameter
information. The new function Unalias returns the actual type
denoted by an Alias type (or any other Type for that matter).
* go/types: Because Alias types may break existing type switches
that do not know to check for them, this functionality is
controlled by a GODEBUG field named gotypesalias. With
gotypesalias=0, everything behaves as before, and Alias types
are never created. With gotypesalias=1, Alias types are created
and clients must expect them. The default is gotypesalias=0. In
a future release, the default will be changed to
gotypesalias=1. Clients of go/types are urged to adjust their
code as soon as possible to work with gotypesalias=1 to
eliminate problems early.
* go/types: The Info struct now exports the FileVersions map
which provides per-file Go version information.
* go/types: The new helper method PkgNameOf returns the local
package name for the given import declaration.
* go/types: The implementation of SizesFor has been adjusted to
compute the same type sizes as the compiler when the compiler
argument for SizesFor is 'gc'. The default Sizes implementation
used by the type checker is now types.SizesFor('gc', 'amd64').
* go/types: The start position (Pos) of the lexical environment
block (Scope) that represents a function body has changed: it
used to start at the opening curly brace of the function body,
but now starts at the function's func token.
* html/template: Javascript template literals may now contain Go
template actions, and parsing a template containing one will no
longer return ErrJSTemplate. Similarly the GODEBUG setting
jstmpllitinterp no longer has any effect.
* io: The new SectionReader.Outer method returns the ReaderAt,
offset, and size passed to NewSectionReader.
* log/slog: The new SetLogLoggerLevel function controls the level
for the bridge between the `slog` and `log` packages. It sets
the minimum level for calls to the top-level `slog` logging
functions, and it sets the level for calls to `log.Logger` that
go through `slog`.
* math/big: The new method Rat.FloatPrec computes the number of
fractional decimal digits required to represent a rational
number accurately as a floating-point number, and whether
accurate decimal representation is possible in the first place.
* net: When io.Copy copies from a TCPConn to a UnixConn, it will
now use Linux's splice(2) system call if possible, using the
new method TCPConn.WriteTo.
* net: The Go DNS Resolver, used when building with
'-tags=netgo', now searches for a matching name in the Windows
hosts file, located at %SystemRoot%\System32\drivers\etc\hosts,
before making a DNS query.
* net/http: The new functions ServeFileFS, FileServerFS, and
NewFileTransportFS are versions of the existing ServeFile,
FileServer, and NewFileTransport, operating on an fs.FS.
* net/http: The HTTP server and client now reject requests and
responses containing an invalid empty Content-Length
header. The previous behavior may be restored by setting
GODEBUG field httplaxcontentlength=1.
* net/http: The new method Request.PathValue returns path
wildcard values from a request and the new method
Request.SetPathValue sets path wildcard values on a request.
* net/http/cgi: When executing a CGI process, the PATH_INFO
variable is now always set to the empty string or a value
starting with a / character, as required by RFC 3875. It was
previously possible for some combinations of Handler.Root and
request URL to violate this requirement.
* net/netip: The new AddrPort.Compare method compares two
AddrPorts.
* os: On Windows, the Stat function now follows all reparse
points that link to another named entity in the system. It was
previously only following IO_REPARSE_TAG_SYMLINK and
IO_REPARSE_TAG_MOUNT_POINT reparse points.
* os: On Windows, passing O_SYNC to OpenFile now causes write
operations to go directly to disk, equivalent to O_SYNC on Unix
platforms.
* os: On Windows, the ReadDir, File.ReadDir, File.Readdir, and
File.Readdirnames functions now read directory entries in
batches to reduce the number of system calls, improving
performance up to 30%.
* os: When io.Copy copies from a File to a net.UnixConn, it will
now use Linux's sendfile(2) system call if possible, using the
new method File.WriteTo.
* os/exec: On Windows, LookPath now ignores empty entries
in %PATH%, and returns ErrNotFound (instead of ErrNotExist)
if no executable file extension is found to resolve an
otherwise-unambiguous name.
* os/exec: On Windows, Command and Cmd.Start no longer call
LookPath if the path to the executable is already absolute and
has an executable file extension. In addition, Cmd.Start no
longer writes the resolved extension back to the Path field, so
it is now safe to call the String method concurrently with a
call to Start.
* reflect: The Value.IsZero method will now return true for a
floating-point or complex negative zero, and will return true
for a struct value if a blank field (a field named _) somehow
has a non-zero value. These changes make IsZero consistent with
comparing a value to zero using the language == operator.
* reflect: The PtrTo function is deprecated, in favor of
PointerTo.
* reflect: The new function TypeFor returns the Type that
represents the type argument T. Previously, to get the
reflect.Type value for a type, one had to use
reflect.TypeOf((*T)(nil)).Elem(). This may now be written as
reflect.TypeFor[T]().
* runtime/metrics: Four new histogram metrics
/sched/pauses/stopping/gc:seconds,
/sched/pauses/stopping/other:seconds,
/sched/pauses/total/gc:seconds, and
/sched/pauses/total/other:seconds provide additional details
about stop-the-world pauses. The 'stopping' metrics report the
time taken from deciding to stop the world until all goroutines
are stopped. The 'total' metrics report the time taken from
deciding to stop the world until it is started again.
* runtime/metrics: The /gc/pauses:seconds metric is deprecated,
as it is equivalent to the new /sched/pauses/total/gc:seconds
metric.
* runtime/metrics: /sync/mutex/wait/total:seconds now includes
contention on runtime-internal locks in addition to sync.Mutex
and sync.RWMutex.
* runtime/pprof: Mutex profiles now scale contention by the
number of goroutines blocked on the mutex. This provides a more
accurate representation of the degree to which a mutex is a
bottleneck in a Go program. For instance, if 100 goroutines are
blocked on a mutex for 10 milliseconds, a mutex profile will
now record 1 second of delay instead of 10 milliseconds of
delay.
* runtime/pprof: Mutex profiles also now include contention on
runtime-internal locks in addition to sync.Mutex and
sync.RWMutex. Contention on runtime-internal locks is always
reported at runtime._LostContendedRuntimeLock. A future release
will add complete stack traces in these cases.
* runtime/pprof: CPU profiles on Darwin platforms now contain the
process's memory map, enabling the disassembly view in the
pprof tool.
* runtime/trace: The execution tracer has been completely
overhauled in this release, resolving several long-standing
issues and paving the way for new use-cases for execution
traces.
* runtime/trace: Execution traces now use the operating system's
clock on most platforms (Windows excluded) so it is possible to
correlate them with traces produced by lower-level
components. Execution traces no longer depend on the
reliability of the platform's clock to produce a correct
trace. Execution traces are now partitioned regularly
on-the-fly and as a result may be processed in a streamable
way. Execution traces now contain complete durations for all
system calls. Execution traces now contain information about
the operating system threads that goroutines executed on. The
latency impact of starting and stopping execution traces has
been dramatically reduced. Execution traces may now begin or
end during the garbage collection mark phase.
* runtime/trace: To allow Go developers to take advantage of
these improvements, an experimental trace reading package is
available at golang.org/x/exp/trace. Note that this package
only works on traces produced by programs built with go1.22 at
the moment. Please try out the package and provide feedback on
the corresponding proposal issue.
* runtime/trace: If you experience any issues with the new
execution tracer implementation, you may switch back to the old
implementation by building your Go program with
GOEXPERIMENT=noexectracer2. If you do, please file an issue,
otherwise this option will be removed in a future release.
* slices: The new function Concat concatenates multiple slices.
* slices: Functions that shrink the size of a slice (Delete,
DeleteFunc, Compact, CompactFunc, and Replace) now zero the
elements between the new length and the old length.
* slices: Insert now always panics if the argument i is out of
range. Previously it did not panic in this situation if there
were no elements to be inserted.
* syscall: The syscall package has been frozen since Go 1.4 and
was marked as deprecated in Go 1.11, causing many editors to
warn about any use of the package. However, some non-deprecated
functionality requires use of the syscall package, such as the
os/exec.Cmd.SysProcAttr field. To avoid unnecessary complaints
on such code, the syscall package is no longer marked as
deprecated. The package remains frozen to most new
functionality, and new code remains encouraged to use
golang.org/x/sys/unix or golang.org/x/sys/windows where
possible.
* syscall: On Linux, the new SysProcAttr.PidFD field allows
obtaining a PID FD when starting a child process via
StartProcess or os/exec.
* syscall: On Windows, passing O_SYNC to Open now causes write
operations to go directly to disk, equivalent to O_SYNC on Unix
platforms.
* testing/slogtest: The new Run function uses sub-tests to run
test cases, providing finer-grained control.
* Ports: Darwin: On macOS on 64-bit x86 architecture (the
darwin/amd64 port), the Go toolchain now generates
position-independent executables (PIE) by default. Non-PIE
binaries can be generated by specifying the -buildmode=exe
build flag. On 64-bit ARM-based macOS (the darwin/arm64 port),
the Go toolchain already generates PIE by default. go1.22 is
the last release that will run on macOS 10.15 Catalina. Go 1.23
will require macOS 11 Big Sur or later.
* Ports: Arm: The GOARM environment variable now allows you to
select whether to use software or hardware floating
point. Previously, valid GOARM values were 5, 6, or 7. Now
those same values can be optionally followed by ,softfloat or
,hardfloat to select the floating-point implementation. This
new option defaults to softfloat for version 5 and hardfloat
for versions 6 and 7.
* Ports: Loong64: The loong64 port now supports passing function
arguments and results using registers. The linux/loong64 port
now supports the address sanitizer, memory sanitizer, new-style
linker relocations, and the plugin build mode.
* OpenBSD go1.22 adds an experimental port to OpenBSD on
big-endian 64-bit PowerPC (openbsd/ppc64).
Patchnames
SUSE-2024-3772,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3772,openSUSE-SLE-15.5-2024-3772
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for go1.22-openssl", title: "Title of the patch", }, { category: "description", text: "This update for go1.22-openssl fixes the following issues:\n\nThis update ships go1.22-openssl 1.22.7.1 (jsc#SLE-18320)\n\n- Update to version 1.22.7.1 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.7-1-openssl-fips.\n\n * Update to Go 1.22.7 (#229)\n\n- go1.22.7 (released 2024-09-05) includes security fixes to the\n encoding/gob, go/build/constraint, and go/parser packages, as\n well as bug fixes to the fix command and the runtime.\n\n CVE-2024-34155 CVE-2024-34156 CVE-2024-34158:\n - go#69142 go#69138 bsc#1230252 security: fix CVE-2024-34155 go/parser: stack exhaustion in all Parse* functions (CVE-2024-34155)\n - go#69144 go#69139 bsc#1230253 security: fix CVE-2024-34156 encoding/gob: stack exhaustion in Decoder.Decode (CVE-2024-34156)\n - go#69148 go#69141 bsc#1230254 security: fix CVE-2024-34158 go/build/constraint: stack exhaustion in Parse (CVE-2024-34158)\n - go#68811 os: TestChtimes failures\n - go#68825 cmd/fix: fails to run on modules whose go directive value is in '1.n.m' format introduced in Go 1.21.0\n - go#68972 cmd/cgo: aix c-archive corrupting stack\n\n- go1.22.6 (released 2024-08-06) includes fixes to the go command,\n the compiler, the linker, the trace command, the covdata command,\n and the bytes, go/types, and os/exec packages.\n\n * go#68594 cmd/compile: internal compiler error with zero-size types\n * go#68546 cmd/trace/v2: pprof profiles always empty\n * go#68492 cmd/covdata: too many open files due to defer f.Close() in for loop\n * go#68475 bytes: IndexByte can return -4294967295 when memory usage is above 2^31 on js/wasm\n * go#68370 go/types: assertion failure in recent range statement checking logic\n * go#68331 os/exec: modifications to Path ignored when *Cmd is created using Command with an absolute path on Windows\n * go#68230 cmd/compile: inconsistent integer arithmetic result on Go 1.22+arm64 with/without -race\n * go#68222 cmd/go: list with -export and -covermode=atomic fails to build\n * go#68198 cmd/link: issues with Xcode 16 beta\n\n- Update to version 1.22.5.3 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.5-3-openssl-fips.\n\n * Only load openssl if fips == '1'\n Avoid loading openssl whenever GOLANG_FIPS is not 1.\n Previously only an unset variable would cause the library load\n to be skipped, but users may also expect to be able to set eg.\n GOLANG_FIPS=0 in environments without openssl.\n\n- Update to version 1.22.5.2 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.5-2-openssl-fips.\n\n * Only load OpenSSL when in FIPS mode\n\n- Update to version 1.22.5.1 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.5-1-openssl-fips.\n\n * Update to go1.22.5\n\n- go1.22.5 (released 2024-07-02) includes security fixes to the\n net/http package, as well as bug fixes to the compiler, cgo, the\n go command, the linker, the runtime, and the crypto/tls,\n go/types, net, net/http, and os/exec packages.\n\n CVE-2024-24791:\n * go#68200 go#67555 bsc#1227314 security: fix CVE CVE-2024-24791 net/http: expect: 100-continue handling is broken in various ways\n * go#65983 cmd/compile: hash of unhashable type\n * go#65994 crypto/tls: segfault when calling tlsrsakex.IncNonDefault()\n * go#66598 os/exec: calling Cmd.Start after setting Cmd.Path manually to absolute path without '.exe' no longer implicitly adds '.exe' in Go 1.22\n * go#67298 runtime: 'fatal: morestack on g0' on amd64 after upgrade to Go 1.21, stale bounds\n * go#67715 cmd/cgo/internal/swig,cmd/go,x/build: swig cgo tests incompatible with C++ toolchain on builders\n * go#67798 cmd/compile: internal compiler error: unexpected type: <nil> (<nil>) in for-range\n * go#67820 cmd/compile: package-level variable initialization with constant dependencies doesn't match order specified in Go spec\n * go#67850 go/internal/gccgoimporter: go building failing with gcc 14.1.0\n * go#67934 net: go DNS resolver fails to connect to local DNS server\n * go#67945 cmd/link: using -fuzz with test that links with cgo on darwin causes linker failure\n * go#68052 cmd/go: go list -u -m all fails loading module retractions: module requires go >= 1.N+1 (running go 1.N)\n * go#68122 cmd/link: runtime.mach_vm_region_trampoline: unsupported dynamic relocation for symbol libc_mach_task_self_ (type=29 (R_GOTPCREL) stype=46 (SDYNIMPORT))\n\n- Update to version 1.22.4.1 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.4-1-openssl-fips.\n\n * Update to go1.22.4\n\n- go1.22.4 (released 2024-06-04) includes security fixes to the\n archive/zip and net/netip packages, as well as bug fixes to the\n compiler, the go command, the linker, the runtime, and the os\n package.\n\n CVE-2024-24789 CVE-2024-24790:\n * go#67554 go#66869 bsc#1225973 security: fix CVE-2024-24789 archive/zip: EOCDR comment length handling is inconsistent with other ZIP implementations\n * go#67682 go#67680 bsc#1225974 security: fix CVE-2024-24790 net/netip: unexpected behavior from Is methods for IPv4-mapped IPv6 addresses\n * go#67188 runtime/metrics: /memory/classes/heap/unused:bytes spikes\n * go#67212 cmd/compile: SIGBUS unaligned access on mips64 via qemu-mips64\n * go#67236 cmd/go: mod tidy reports toolchain not available with 'go 1.21'\n * go#67258 runtime: unexpected fault address 0\n * go#67311 cmd/go: TestScript/gotoolchain_issue66175 fails on tip locally\n * go#67314 cmd/go,cmd/link: TestScript/build_issue48319 and TestScript/build_plugin_reproducible failing on LUCI gotip-darwin-amd64-longtest builder due to non-reproducible LC_UUID\n * go#67352 crypto/x509: TestPlatformVerifier failures on Windows due to broken connections\n * go#67460 cmd/compile: internal compiler error: panic with range over integer value\n * go#67527 cmd/link: panic: machorelocsect: size mismatch\n * go#67650 runtime: SIGSEGV after performing clone(CLONE_PARENT) via C constructor prior to runtime start\n * go#67696 os: RemoveAll susceptible to symlink race\n\n- Update to version 1.22.3.3 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.3-3-openssl-fips.\n\n * config: update openssl backend (#201)\n\n- Update to version 1.22.3.2 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.3-2-openssl-fips.\n\n * patches: restore signature of HashSign/HashVerify (#199)\n\n- Update to version 1.22.3.1 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.3-1-openssl-fips.\n\n * Update to go1.22.3\n * fix: rename patch file\n * Backport change https://go-review.googlesource.com/c/go/+/554615 to Go1.22 (#193)\n runtime: crash asap and extend total sleep time for slow machine in test\n Running with few threads usually does not need 500ms to crash, so let it\n crash as soon as possible. While the test may caused more time on slow\n machine, try to expand the sleep time in test.\n * cmd/go: re-enable CGO for Go toolchain commands (#190)\n * crypto/ecdsa: Restore HashSign and HashVerify (#189)\n\n- go1.22.3 (released 2024-05-07) includes security fixes to the go\n command and the net package, as well as bug fixes to the\n compiler, the runtime, and the net/http package.\n\n CVE-2024-24787 CVE-2024-24788:\n * go#67122 go#67119 bsc#1224017 security: fix CVE-2024-24787 cmd/go: arbitrary code execution during build on darwin\n * go#67040 go#66754 bsc#1224018 security: fix CVE-2024-24788 net: high cpu usage in extractExtendedRCode\n * go#67018 cmd/compile: Go 1.22.x failed to be bootstrapped from 386 to ppc64le\n * go#67017 cmd/compile: changing a hot concrete method to interface method triggers a PGO ICE\n * go#66886 runtime: deterministic fallback hashes across process boundary\n * go#66698 net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0\n\n- Update to version 1.22.2.1 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.2-1-openssl-fips.\n\n * Update to go1.22.2\n\n- go1.22.2 (released 2024-04-03) includes a security fix to the\n net/http package, as well as bug fixes to the compiler, the go\n command, the linker, and the encoding/gob, go/types, net/http,\n and runtime/trace packages.\n\n CVE-2023-45288:\n * go#66298 go#65051 bsc#1221400 security: fix CVE-2023-45288 net/http, x/net/http2: close connections when receiving too many headers\n * go#65858 cmd/compile: unreachable panic with GODEBUG=gotypesalias=1\n * go#66060 cmd/link: RISC-V external link, failed to find text symbol for HI20 relocation\n * go#66076 cmd/compile: out-of-bounds panic with uint32 conversion and modulus operation in Go 1.22.0 on arm64\n * go#66134 cmd/compile: go test . results in CLOSURE ... <unknown line number>: internal compiler error: assertion failed\n * go#66137 cmd/go: go 1.22.0: go test throws errors when processing folders not listed in coverpkg argument\n * go#66178 cmd/compile: ICE: panic: interface conversion: ir.Node is *ir.ConvExpr, not *ir.IndexExpr\n * go#66201 runtime/trace: v2 traces contain an incorrect timestamp scaling factor on Windows\n * go#66255 net/http: http2 round tripper nil pointer dereference causes panic causing deadlock\n * go#66256 cmd/go: git shallow fetches broken at CL 556358\n * go#66273 crypto/x509: Certificate no longer encodable using encoding/gob in Go1.22\n * go#66412 cmd/link: bad carrier sym for symbol runtime.elf_savegpr0.args_stackmap on ppc64le\n\n- Update to version 1.22.1.2 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.1-2-openssl-fips.\n\n * config: Update openssl v2 module (#178)\n\n- Remove subpackage go1.x-openssl-libstd for compiled shared object\n libstd.so.\n\n * Continue to build experimental libstd only on go1.x Tumbleweed.\n * Removal fixes build errors on go1.x-openssl Factory and ALP.\n * Use of libstd.so is experimental and not recommended for\n general use, Go currently has no ABI.\n * Feature go build -buildmode=shared is deprecated by upstream,\n but not yet removed.\n\n- Initial package go1.22-openssl version 1.22.1.1 cut from the\n go1.22-fips-release branch at the revision tagged\n go1.22.1-1-openssl-fips.\n\n * Go upstream merged branch dev.boringcrypto in go1.19+.\n * In go1.x enable BoringCrypto via GOEXPERIMENT=boringcrypto.\n * In go1.x-openssl enable FIPS mode (or boring mode as the\n package is named) either via an environment variable\n GOLANG_FIPS=1 or by virtue of booting the host in FIPS mode.\n * When the operating system is operating in FIPS mode, Go\n applications which import crypto/tls/fipsonly limit operations\n to the FIPS ciphersuite.\n * go1.x-openssl is delivered as two large patches to go1.x\n applying necessary modifications from the golang-fips/go GitHub\n project for the Go crypto library to use OpenSSL as the\n external cryptographic library in a FIPS compliant way.\n * go1.x-openssl modifies the crypto/* packages to use OpenSSL for\n cryptographic operations.\n * go1.x-openssl uses dlopen() to call into OpenSSL.\n * SUSE RPM packaging introduces a fourth version digit go1.x.y.z\n corresponding to the golang-fips/go patchset tagged revision.\n * Patchset improvements can be updated independently of upstream\n Go maintenance releases.\n\n- go1.22.1 (released 2024-03-05) includes security fixes to the\n crypto/x509, html/template, net/http, net/http/cookiejar, and\n net/mail packages, as well as bug fixes to the compiler, the go\n command, the runtime, the trace command, and the go/types and\n net/http packages.\n\n CVE-2023-45289 CVE-2023-45290 CVE-2024-24783 CVE-2024-24784 CVE-2024-24785:\n * go#65831 go#65390 bsc#1220999 security: fix CVE-2024-24783 crypto/x509: Verify panics on certificates with an unknown public key algorithm\n * go#65849 go#65083 bsc#1221002 security: fix CVE-2024-24784 net/mail: comments in display names are incorrectly handled\n * go#65850 go#65383 bsc#1221001 security: fix CVE-2023-45290 net/http: memory exhaustion in Request.ParseMultipartForm\n * go#65859 go#65065 bsc#1221000 security: fix CVE-2023-45289 net/http, net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect\n * go#65969 go#65697 bsc#1221003 security: fix CVE-2024-24785 html/template: errors returned from MarshalJSON methods may break template escaping\n * go#65352 cmd/go: go generate fails silently when run on a package in a nested workspace module\n * go#65471 internal/testenv: TestHasGoBuild failures on the LUCI noopt builders\n * go#65474 internal/testenv: support LUCI mobile builders in testenv tests\n * go#65577 cmd/trace/v2: goroutine analysis page doesn't identify goroutines consistently\n * go#65618 cmd/compile: Go 1.22 build fails with 1.21 PGO profile on internal/saferio change\n * go#65619 cmd/compile: Go 1.22 changes support for modules that declare go 1.0\n * go#65641 cmd/cgo/internal/testsanitizers,x/build: LUCI clang15 builders failing\n * go#65644 runtime: crash in race detector when execution tracer reads from CPU profile buffer\n * go#65728 go/types: nil pointer dereference in Alias.Underlying()\n * go#65759 net/http: context cancellation can leave HTTP client with deadlocked HTTP/1.1 connections in Go1.22\n * go#65760 runtime: Go 1.22.0 fails to build from source on armv7 Alpine Linux\n * go#65818 runtime: go1.22.0 test with -race will SIGSEGV or SIGBUS or Bad Pointer\n * go#65852 cmd/go: 'missing ziphash' error with go.work\n * go#65883 runtime: scheduler sometimes starves a runnable goroutine on wasm platforms\n\n * bsc#1219988 ensure VERSION file is present in GOROOT\n as required by go tool dist and go tool distpack\n\n- go1.22 (released 2024-02-06) is a major release of Go.\n go1.22.x minor releases will be provided through February 2024.\n https://github.com/golang/go/wiki/Go-Release-Cycle\n go1.22 arrives six months after go1.21. Most of its changes are\n in the implementation of the toolchain, runtime, and libraries.\n As always, the release maintains the Go 1 promise of\n compatibility. We expect almost all Go programs to continue to\n compile and run as before.\n\n * Language change: go1.22 makes two changes to for loops.\n Previously, the variables declared by a for loop were created\n once and updated by each iteration. In go1.22, each iteration\n of the loop creates new variables, to avoid accidental sharing\n bugs. The transition support tooling described in the proposal\n continues to work in the same way it did in Go 1.21.\n * Language change: For loops may now range over integers\n * Language change: go1.22 includes a preview of a language change\n we are considering for a future version of Go:\n range-over-function iterators. Building with\n GOEXPERIMENT=rangefunc enables this feature.\n * go command: Commands in workspaces can now use a vendor\n directory containing the dependencies of the workspace. The\n directory is created by go work vendor, and used by build\n commands when the -mod flag is set to vendor, which is the\n default when a workspace vendor directory is present. Note\n that the vendor directory's contents for a workspace are\n different from those of a single module: if the directory at\n the root of a workspace also contains one of the modules in the\n workspace, its vendor directory can contain the dependencies of\n either the workspace or of the module, but not both.\n * go get is no longer supported outside of a module in the legacy\n GOPATH mode (that is, with GO111MODULE=off). Other build\n commands, such as go build and go test, will continue to work\n indefinitely for legacy GOPATH programs.\n * go mod init no longer attempts to import module requirements\n from configuration files for other vendoring tools (such as\n Gopkg.lock).\n * go test -cover now prints coverage summaries for covered\n packages that do not have their own test files. Prior to Go\n 1.22 a go test -cover run for such a package would report: ?\n mymod/mypack [no test files] and now with go1.22, functions in\n the package are treated as uncovered: mymod/mypack coverage:\n 0.0% of statements Note that if a package contains no\n executable code at all, we can't report a meaningful coverage\n percentage; for such packages the go tool will continue to\n report that there are no test files.\n * trace: The trace tool's web UI has been gently refreshed as\n part of the work to support the new tracer, resolving several\n issues and improving the readability of various sub-pages. The\n web UI now supports exploring traces in a thread-oriented\n view. The trace viewer also now displays the full duration of\n all system calls. These improvements only apply for viewing\n traces produced by programs built with go1.22 or newer. A\n future release will bring some of these improvements to traces\n produced by older version of Go.\n * vet: References to loop variables The behavior of the vet tool\n has changed to match the new semantics (see above) of loop\n variables in go1.22. When analyzing a file that requires go1.22\n or newer (due to its go.mod file or a per-file build\n constraint), vetcode> no longer reports references to loop\n variables from within a function literal that might outlive the\n iteration of the loop. In Go 1.22, loop variables are created\n anew for each iteration, so such references are no longer at\n risk of using a variable after it has been updated by the loop.\n * vet: New warnings for missing values after append The vet tool\n now reports calls to append that pass no values to be appended\n to the slice, such as slice = append(slice). Such a statement\n has no effect, and experience has shown that is nearly always a\n mistake.\n * vet: New warnings for deferring time.Since The vet tool now\n reports a non-deferred call to time.Since(t) within a defer\n statement. This is equivalent to calling time.Now().Sub(t)\n before the defer statement, not when the deferred function is\n called. In nearly all cases, the correct code requires\n deferring the time.Since call.\n * vet: New warnings for mismatched key-value pairs in log/slog\n calls The vet tool now reports invalid arguments in calls to\n functions and methods in the structured logging package,\n log/slog, that accept alternating key/value pairs. It reports\n calls where an argument in a key position is neither a string\n nor a slog.Attr, and where a final key is missing its value.\n * runtime: The runtime now keeps type-based garbage collection\n metadata nearer to each heap object, improving the CPU\n performance (latency or throughput) of Go programs by\n 1-3%. This change also reduces the memory overhead of the\n majority Go programs by approximately 1% by deduplicating\n redundant metadata. Some programs may see a smaller improvement\n because this change adjusts the size class boundaries of the\n memory allocator, so some objects may be moved up a size class.\n A consequence of this change is that some objects' addresses\n that were previously always aligned to a 16 byte (or higher)\n boundary will now only be aligned to an 8 byte boundary. Some\n programs that use assembly instructions that require memory\n addresses to be more than 8-byte aligned and rely on the memory\n allocator's previous alignment behavior may break, but we\n expect such programs to be rare. Such programs may be built\n with GOEXPERIMENT=noallocheaders to revert to the old metadata\n layout and restore the previous alignment behavior, but package\n owners should update their assembly code to avoid the alignment\n assumption, as this workaround will be removed in a future\n release.\n * runtime: On the windows/amd64 port, programs linking or loading\n Go libraries built with -buildmode=c-archive or\n -buildmode=c-shared can now use the SetUnhandledExceptionFilter\n Win32 function to catch exceptions not handled by the Go\n runtime. Note that this was already supported on the\n windows/386 port.\n * compiler: Profile-guided Optimization (PGO) builds can now\n devirtualize a higher proportion of calls than previously\n possible. Most programs from a representative set of Go\n programs now see between 2 and 14% improvement from enabling\n PGO.\n * compiler: The compiler now interleaves devirtualization and\n inlining, so interface method calls are better optimized.\n * compiler: go1.22 also includes a preview of an enhanced\n implementation of the compiler's inlining phase that uses\n heuristics to boost inlinability at call sites deemed\n 'important' (for example, in loops) and discourage inlining at\n call sites deemed 'unimportant' (for example, on panic\n paths). Building with GOEXPERIMENT=newinliner enables the new\n call-site heuristics; see issue #61502 for more info and to\n provide feedback.\n * linker: The linker's -s and -w flags are now behave more\n consistently across all platforms. The -w flag suppresses DWARF\n debug information generation. The -s flag suppresses symbol\n table generation. The -s flag also implies the -w flag, which\n can be negated with -w=0. That is, -s -w=0 will generate a\n binary with DWARF debug information generation but without the\n symbol table.\n * linker: On ELF platforms, the -B linker flag now accepts a\n special form: with -B gobuildid, the linker will generate a GNU\n build ID (the ELF NT_GNU_BUILD_ID note) derived from the Go\n build ID.\n * linker: On Windows, when building with -linkmode=internal, the\n linker now preserves SEH information from C object files by\n copying the .pdata and .xdata sections into the final\n binary. This helps with debugging and profiling binaries using\n native tools, such as WinDbg. Note that until now, C functions'\n SEH exception handlers were not being honored, so this change\n may cause some programs to behave differently.\n -linkmode=external is not affected by this change, as external\n linkers already preserve SEH information.\n * bootstrap: As mentioned in the Go 1.20 release notes, go1.22\n now requires the final point release of Go 1.20 or later for\n bootstrap. We expect that Go 1.24 will require the final point\n release of go1.22 or later for bootstrap.\n * core library: New math/rand/v2 package: go1.22 includes the\n first “v2” package in the standard library, math/rand/v2. The\n changes compared to math/rand are detailed in proposal\n go#61716. The most important changes are:\n - The Read method, deprecated in math/rand, was not carried\n forward for math/rand/v2. (It remains available in\n math/rand.) The vast majority of calls to Read should use\n crypto/rand’s Read instead. Otherwise a custom Read can be\n constructed using the Uint64 method.\n - The global generator accessed by top-level functions is\n unconditionally randomly seeded. Because the API guarantees\n no fixed sequence of results, optimizations like per-thread\n random generator states are now possible.\n - The Source interface now has a single Uint64 method; there is\n no Source64 interface.\n - Many methods now use faster algorithms that were not possible\n to adopt in math/rand because they changed the output\n streams.\n - The Intn, Int31, Int31n, Int63, and Int64n top-level\n functions and methods from math/rand are spelled more\n idiomatically in math/rand/v2: IntN, Int32, Int32N, Int64,\n and Int64N. There are also new top-level functions and\n methods Uint32, Uint32N, Uint64, Uint64N, Uint, and UintN.\n - The new generic function N is like Int64N or Uint64N but\n works for any integer type. For example a random duration\n from 0 up to 5 minutes is rand.N(5*time.Minute).\n - The Mitchell & Reeds LFSR generator provided by math/rand’s\n Source has been replaced by two more modern pseudo-random\n generator sources: ChaCha8 PCG. ChaCha8 is a new,\n cryptographically strong random number generator roughly\n similar to PCG in efficiency. ChaCha8 is the algorithm used\n for the top-level functions in math/rand/v2. As of go1.22,\n math/rand's top-level functions (when not explicitly seeded)\n and the Go runtime also use ChaCha8 for randomness.\n - We plan to include an API migration tool in a future release,\n likely Go 1.23.\n * core library: New go/version package: The new go/version\n package implements functions for validating and comparing Go\n version strings.\n * core library: Enhanced routing patterns: HTTP routing in the\n standard library is now more expressive. The patterns used by\n net/http.ServeMux have been enhanced to accept methods and\n wildcards. This change breaks backwards compatibility in small\n ways, some obvious—patterns with '{' and '}' behave\n differently— and some less so—treatment of escaped paths has\n been improved. The change is controlled by a GODEBUG field\n named httpmuxgo121. Set httpmuxgo121=1 to restore the old\n behavior.\n * Minor changes to the library As always, there are various minor\n changes and updates to the library, made with the Go 1 promise\n of compatibility in mind. There are also various performance\n improvements, not enumerated here.\n * archive/tar: The new method Writer.AddFS adds all of the files\n from an fs.FS to the archive.\n * archive/zip: The new method Writer.AddFS adds all of the files\n from an fs.FS to the archive.\n * bufio: When a SplitFunc returns ErrFinalToken with a nil token,\n Scanner will now stop immediately. Previously, it would report\n a final empty token before stopping, which was usually not\n desired. Callers that do want to report a final empty token can\n do so by returning []byte{} rather than nil.\n * cmp: The new function Or returns the first in a sequence of\n values that is not the zero value.\n * crypto/tls: ConnectionState.ExportKeyingMaterial will now\n return an error unless TLS 1.3 is in use, or the\n extended_master_secret extension is supported by both the\n server and client. crypto/tls has supported this extension\n since Go 1.20. This can be disabled with the tlsunsafeekm=1\n GODEBUG setting.\n * crypto/tls: By default, the minimum version offered by\n crypto/tls servers is now TLS 1.2 if not specified with\n config.MinimumVersion, matching the behavior of crypto/tls\n clients. This change can be reverted with the tls10server=1\n GODEBUG setting.\n * crypto/tls: By default, cipher suites without ECDHE support are\n no longer offered by either clients or servers during pre-TLS\n 1.3 handshakes. This change can be reverted with the\n tlsrsakex=1 GODEBUG setting.\n * crypto/x509: The new CertPool.AddCertWithConstraint method can\n be used to add customized constraints to root certificates to\n be applied during chain building.\n * crypto/x509: On Android, root certificates will now be loaded\n from /data/misc/keychain/certs-added as well as\n /system/etc/security/cacerts.\n * crypto/x509: A new type, OID, supports ASN.1 Object Identifiers\n with individual components larger than 31 bits. A new field\n which uses this type, Policies, is added to the Certificate\n struct, and is now populated during parsing. Any OIDs which\n cannot be represented using a asn1.ObjectIdentifier will appear\n in Policies, but not in the old PolicyIdentifiers field. When\n calling CreateCertificate, the Policies field is ignored, and\n policies are taken from the PolicyIdentifiers field. Using the\n x509usepolicies=1 GODEBUG setting inverts this, populating\n certificate policies from the Policies field, and ignoring the\n PolicyIdentifiers field. We may change the default value of\n x509usepolicies in Go 1.23, making Policies the default field\n for marshaling.\n * database/sql: The new Null[T] type provide a way to scan\n nullable columns for any column types.\n * debug/elf: Constant R_MIPS_PC32 is defined for use with MIPS64\n systems. Additional R_LARCH_* constants are defined for use\n with LoongArch systems.\n * encoding: The new methods AppendEncode and AppendDecode added\n to each of the Encoding types in the packages encoding/base32,\n encoding/base64, and encoding/hex simplify encoding and\n decoding from and to byte slices by taking care of byte slice\n buffer management.\n * encoding: The methods base32.Encoding.WithPadding and\n base64.Encoding.WithPadding now panic if the padding argument\n is a negative value other than NoPadding.\n * encoding/json: Marshaling and encoding functionality now\n escapes '\\b' and '\\f' characters as \\b and \\f instead of \\u0008\n and \\u000c.\n * go/ast: The following declarations related to syntactic\n identifier resolution are now deprecated: Ident.Obj, Object,\n Scope, File.Scope, File.Unresolved, Importer, Package,\n NewPackage. In general, identifiers cannot be accurately\n resolved without type information. Consider, for example, the\n identifier K in T{K: ''}: it could be the name of a local\n variable if T is a map type, or the name of a field if T is a\n struct type. New programs should use the go/types package to\n resolve identifiers; see Object, Info.Uses, and Info.Defs for\n details.\n * go/ast: The new ast.Unparen function removes any enclosing\n parentheses from an expression.\n * go/types: The new Alias type represents type\n aliases. Previously, type aliases were not represented\n explicitly, so a reference to a type alias was equivalent to\n spelling out the aliased type, and the name of the alias was\n lost. The new representation retains the intermediate\n Alias. This enables improved error reporting (the name of a\n type alias can be reported), and allows for better handling of\n cyclic type declarations involving type aliases. In a future\n release, Alias types will also carry type parameter\n information. The new function Unalias returns the actual type\n denoted by an Alias type (or any other Type for that matter).\n * go/types: Because Alias types may break existing type switches\n that do not know to check for them, this functionality is\n controlled by a GODEBUG field named gotypesalias. With\n gotypesalias=0, everything behaves as before, and Alias types\n are never created. With gotypesalias=1, Alias types are created\n and clients must expect them. The default is gotypesalias=0. In\n a future release, the default will be changed to\n gotypesalias=1. Clients of go/types are urged to adjust their\n code as soon as possible to work with gotypesalias=1 to\n eliminate problems early.\n * go/types: The Info struct now exports the FileVersions map\n which provides per-file Go version information.\n * go/types: The new helper method PkgNameOf returns the local\n package name for the given import declaration.\n * go/types: The implementation of SizesFor has been adjusted to\n compute the same type sizes as the compiler when the compiler\n argument for SizesFor is 'gc'. The default Sizes implementation\n used by the type checker is now types.SizesFor('gc', 'amd64').\n * go/types: The start position (Pos) of the lexical environment\n block (Scope) that represents a function body has changed: it\n used to start at the opening curly brace of the function body,\n but now starts at the function's func token.\n * html/template: Javascript template literals may now contain Go\n template actions, and parsing a template containing one will no\n longer return ErrJSTemplate. Similarly the GODEBUG setting\n jstmpllitinterp no longer has any effect.\n * io: The new SectionReader.Outer method returns the ReaderAt,\n offset, and size passed to NewSectionReader.\n * log/slog: The new SetLogLoggerLevel function controls the level\n for the bridge between the `slog` and `log` packages. It sets\n the minimum level for calls to the top-level `slog` logging\n functions, and it sets the level for calls to `log.Logger` that\n go through `slog`.\n * math/big: The new method Rat.FloatPrec computes the number of\n fractional decimal digits required to represent a rational\n number accurately as a floating-point number, and whether\n accurate decimal representation is possible in the first place.\n * net: When io.Copy copies from a TCPConn to a UnixConn, it will\n now use Linux's splice(2) system call if possible, using the\n new method TCPConn.WriteTo.\n * net: The Go DNS Resolver, used when building with\n '-tags=netgo', now searches for a matching name in the Windows\n hosts file, located at %SystemRoot%\\System32\\drivers\\etc\\hosts,\n before making a DNS query.\n * net/http: The new functions ServeFileFS, FileServerFS, and\n NewFileTransportFS are versions of the existing ServeFile,\n FileServer, and NewFileTransport, operating on an fs.FS.\n * net/http: The HTTP server and client now reject requests and\n responses containing an invalid empty Content-Length\n header. The previous behavior may be restored by setting\n GODEBUG field httplaxcontentlength=1.\n * net/http: The new method Request.PathValue returns path\n wildcard values from a request and the new method\n Request.SetPathValue sets path wildcard values on a request.\n * net/http/cgi: When executing a CGI process, the PATH_INFO\n variable is now always set to the empty string or a value\n starting with a / character, as required by RFC 3875. It was\n previously possible for some combinations of Handler.Root and\n request URL to violate this requirement.\n * net/netip: The new AddrPort.Compare method compares two\n AddrPorts.\n * os: On Windows, the Stat function now follows all reparse\n points that link to another named entity in the system. It was\n previously only following IO_REPARSE_TAG_SYMLINK and\n IO_REPARSE_TAG_MOUNT_POINT reparse points.\n * os: On Windows, passing O_SYNC to OpenFile now causes write\n operations to go directly to disk, equivalent to O_SYNC on Unix\n platforms.\n * os: On Windows, the ReadDir, File.ReadDir, File.Readdir, and\n File.Readdirnames functions now read directory entries in\n batches to reduce the number of system calls, improving\n performance up to 30%.\n * os: When io.Copy copies from a File to a net.UnixConn, it will\n now use Linux's sendfile(2) system call if possible, using the\n new method File.WriteTo.\n * os/exec: On Windows, LookPath now ignores empty entries\n in %PATH%, and returns ErrNotFound (instead of ErrNotExist)\n if no executable file extension is found to resolve an\n otherwise-unambiguous name.\n * os/exec: On Windows, Command and Cmd.Start no longer call\n LookPath if the path to the executable is already absolute and\n has an executable file extension. In addition, Cmd.Start no\n longer writes the resolved extension back to the Path field, so\n it is now safe to call the String method concurrently with a\n call to Start.\n * reflect: The Value.IsZero method will now return true for a\n floating-point or complex negative zero, and will return true\n for a struct value if a blank field (a field named _) somehow\n has a non-zero value. These changes make IsZero consistent with\n comparing a value to zero using the language == operator.\n * reflect: The PtrTo function is deprecated, in favor of\n PointerTo.\n * reflect: The new function TypeFor returns the Type that\n represents the type argument T. Previously, to get the\n reflect.Type value for a type, one had to use\n reflect.TypeOf((*T)(nil)).Elem(). This may now be written as\n reflect.TypeFor[T]().\n * runtime/metrics: Four new histogram metrics\n /sched/pauses/stopping/gc:seconds,\n /sched/pauses/stopping/other:seconds,\n /sched/pauses/total/gc:seconds, and\n /sched/pauses/total/other:seconds provide additional details\n about stop-the-world pauses. The 'stopping' metrics report the\n time taken from deciding to stop the world until all goroutines\n are stopped. The 'total' metrics report the time taken from\n deciding to stop the world until it is started again.\n * runtime/metrics: The /gc/pauses:seconds metric is deprecated,\n as it is equivalent to the new /sched/pauses/total/gc:seconds\n metric.\n * runtime/metrics: /sync/mutex/wait/total:seconds now includes\n contention on runtime-internal locks in addition to sync.Mutex\n and sync.RWMutex.\n * runtime/pprof: Mutex profiles now scale contention by the\n number of goroutines blocked on the mutex. This provides a more\n accurate representation of the degree to which a mutex is a\n bottleneck in a Go program. For instance, if 100 goroutines are\n blocked on a mutex for 10 milliseconds, a mutex profile will\n now record 1 second of delay instead of 10 milliseconds of\n delay.\n * runtime/pprof: Mutex profiles also now include contention on\n runtime-internal locks in addition to sync.Mutex and\n sync.RWMutex. Contention on runtime-internal locks is always\n reported at runtime._LostContendedRuntimeLock. A future release\n will add complete stack traces in these cases.\n * runtime/pprof: CPU profiles on Darwin platforms now contain the\n process's memory map, enabling the disassembly view in the\n pprof tool.\n * runtime/trace: The execution tracer has been completely\n overhauled in this release, resolving several long-standing\n issues and paving the way for new use-cases for execution\n traces.\n * runtime/trace: Execution traces now use the operating system's\n clock on most platforms (Windows excluded) so it is possible to\n correlate them with traces produced by lower-level\n components. Execution traces no longer depend on the\n reliability of the platform's clock to produce a correct\n trace. Execution traces are now partitioned regularly\n on-the-fly and as a result may be processed in a streamable\n way. Execution traces now contain complete durations for all\n system calls. Execution traces now contain information about\n the operating system threads that goroutines executed on. The\n latency impact of starting and stopping execution traces has\n been dramatically reduced. Execution traces may now begin or\n end during the garbage collection mark phase.\n * runtime/trace: To allow Go developers to take advantage of\n these improvements, an experimental trace reading package is\n available at golang.org/x/exp/trace. Note that this package\n only works on traces produced by programs built with go1.22 at\n the moment. Please try out the package and provide feedback on\n the corresponding proposal issue.\n * runtime/trace: If you experience any issues with the new\n execution tracer implementation, you may switch back to the old\n implementation by building your Go program with\n GOEXPERIMENT=noexectracer2. If you do, please file an issue,\n otherwise this option will be removed in a future release.\n * slices: The new function Concat concatenates multiple slices.\n * slices: Functions that shrink the size of a slice (Delete,\n DeleteFunc, Compact, CompactFunc, and Replace) now zero the\n elements between the new length and the old length.\n * slices: Insert now always panics if the argument i is out of\n range. Previously it did not panic in this situation if there\n were no elements to be inserted.\n * syscall: The syscall package has been frozen since Go 1.4 and\n was marked as deprecated in Go 1.11, causing many editors to\n warn about any use of the package. However, some non-deprecated\n functionality requires use of the syscall package, such as the\n os/exec.Cmd.SysProcAttr field. To avoid unnecessary complaints\n on such code, the syscall package is no longer marked as\n deprecated. The package remains frozen to most new\n functionality, and new code remains encouraged to use\n golang.org/x/sys/unix or golang.org/x/sys/windows where\n possible.\n * syscall: On Linux, the new SysProcAttr.PidFD field allows\n obtaining a PID FD when starting a child process via\n StartProcess or os/exec.\n * syscall: On Windows, passing O_SYNC to Open now causes write\n operations to go directly to disk, equivalent to O_SYNC on Unix\n platforms.\n * testing/slogtest: The new Run function uses sub-tests to run\n test cases, providing finer-grained control.\n * Ports: Darwin: On macOS on 64-bit x86 architecture (the\n darwin/amd64 port), the Go toolchain now generates\n position-independent executables (PIE) by default. Non-PIE\n binaries can be generated by specifying the -buildmode=exe\n build flag. On 64-bit ARM-based macOS (the darwin/arm64 port),\n the Go toolchain already generates PIE by default. go1.22 is\n the last release that will run on macOS 10.15 Catalina. Go 1.23\n will require macOS 11 Big Sur or later.\n * Ports: Arm: The GOARM environment variable now allows you to\n select whether to use software or hardware floating\n point. Previously, valid GOARM values were 5, 6, or 7. Now\n those same values can be optionally followed by ,softfloat or\n ,hardfloat to select the floating-point implementation. This\n new option defaults to softfloat for version 5 and hardfloat\n for versions 6 and 7.\n * Ports: Loong64: The loong64 port now supports passing function\n arguments and results using registers. The linux/loong64 port\n now supports the address sanitizer, memory sanitizer, new-style\n linker relocations, and the plugin build mode.\n * OpenBSD go1.22 adds an experimental port to OpenBSD on\n big-endian 64-bit PowerPC (openbsd/ppc64).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-3772,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3772,openSUSE-SLE-15.5-2024-3772", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3772-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:3772-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20243772-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:3772-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html", }, { category: "self", summary: "SUSE Bug 1218424", url: "https://bugzilla.suse.com/1218424", }, { category: "self", summary: "SUSE Bug 1219988", url: "https://bugzilla.suse.com/1219988", }, { category: "self", summary: "SUSE Bug 1220999", url: "https://bugzilla.suse.com/1220999", }, { category: "self", summary: "SUSE Bug 1221000", url: "https://bugzilla.suse.com/1221000", }, { category: "self", summary: "SUSE Bug 1221001", url: "https://bugzilla.suse.com/1221001", }, { category: "self", summary: "SUSE Bug 1221002", url: "https://bugzilla.suse.com/1221002", }, { category: "self", summary: "SUSE Bug 1221003", url: "https://bugzilla.suse.com/1221003", }, { category: "self", summary: "SUSE Bug 1221400", url: "https://bugzilla.suse.com/1221400", }, { category: "self", summary: "SUSE Bug 1224017", url: "https://bugzilla.suse.com/1224017", }, { category: "self", summary: "SUSE Bug 1224018", url: "https://bugzilla.suse.com/1224018", }, { category: "self", summary: "SUSE Bug 1225973", url: "https://bugzilla.suse.com/1225973", }, { category: "self", summary: "SUSE Bug 1225974", url: "https://bugzilla.suse.com/1225974", }, { category: "self", summary: "SUSE Bug 1227314", url: "https://bugzilla.suse.com/1227314", }, { category: "self", summary: "SUSE Bug 1230252", url: "https://bugzilla.suse.com/1230252", }, { category: "self", summary: "SUSE Bug 1230253", url: "https://bugzilla.suse.com/1230253", }, { category: "self", summary: "SUSE Bug 1230254", url: "https://bugzilla.suse.com/1230254", }, { category: "self", summary: "SUSE CVE CVE-2023-45288 page", url: "https://www.suse.com/security/cve/CVE-2023-45288/", }, { category: "self", summary: "SUSE CVE CVE-2023-45289 page", url: "https://www.suse.com/security/cve/CVE-2023-45289/", }, { category: "self", summary: "SUSE CVE CVE-2023-45290 page", url: "https://www.suse.com/security/cve/CVE-2023-45290/", }, { category: "self", summary: "SUSE CVE CVE-2024-24783 page", url: "https://www.suse.com/security/cve/CVE-2024-24783/", }, { category: "self", summary: "SUSE CVE CVE-2024-24784 page", url: "https://www.suse.com/security/cve/CVE-2024-24784/", }, { category: "self", summary: "SUSE CVE CVE-2024-24785 page", url: "https://www.suse.com/security/cve/CVE-2024-24785/", }, { category: "self", summary: "SUSE CVE CVE-2024-24787 page", url: "https://www.suse.com/security/cve/CVE-2024-24787/", }, { category: "self", summary: "SUSE CVE CVE-2024-24788 page", url: "https://www.suse.com/security/cve/CVE-2024-24788/", }, { category: "self", summary: "SUSE CVE CVE-2024-24789 page", url: "https://www.suse.com/security/cve/CVE-2024-24789/", }, { category: "self", summary: "SUSE CVE CVE-2024-24790 page", url: "https://www.suse.com/security/cve/CVE-2024-24790/", }, { category: "self", summary: "SUSE CVE CVE-2024-24791 page", url: "https://www.suse.com/security/cve/CVE-2024-24791/", }, { category: "self", summary: "SUSE CVE CVE-2024-34155 page", url: "https://www.suse.com/security/cve/CVE-2024-34155/", }, { category: "self", summary: "SUSE CVE CVE-2024-34156 page", url: "https://www.suse.com/security/cve/CVE-2024-34156/", }, { category: "self", summary: "SUSE CVE CVE-2024-34158 page", url: "https://www.suse.com/security/cve/CVE-2024-34158/", }, ], title: "Security update for go1.22-openssl", tracking: { current_release_date: "2024-10-29T13:54:03Z", generator: { date: "2024-10-29T13:54:03Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:3772-1", initial_release_date: "2024-10-29T13:54:03Z", revision_history: [ { date: "2024-10-29T13:54:03Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", product: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", product_id: "go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", }, }, { category: "product_version", name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", product: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", product_id: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", }, }, { category: "product_version", name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", product: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", product_id: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "go1.22-openssl-1.22.7.1-150000.1.3.1.i586", product: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.i586", product_id: "go1.22-openssl-1.22.7.1-150000.1.3.1.i586", }, }, { category: "product_version", name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.i586", product: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.i586", product_id: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", product: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", product_id: "go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", }, }, { category: "product_version", name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", product: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", product_id: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", }, }, { category: "product_version", name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", product: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", product_id: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", product: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", product_id: "go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", }, }, { category: "product_version", name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", product: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", product_id: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", }, }, { category: "product_version", name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", product: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", product_id: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", product: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", product_id: "go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", }, }, { category: "product_version", name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", product: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", product_id: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", }, }, { category: "product_version", name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", product: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", product_id: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", }, product_reference: "go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", }, product_reference: "go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", }, product_reference: "go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", }, product_reference: "go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", }, product_reference: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", }, product_reference: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", }, product_reference: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", }, product_reference: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", }, product_reference: "go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", }, product_reference: "go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", }, product_reference: "go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", }, product_reference: "go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", }, product_reference: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", }, product_reference: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", }, product_reference: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", }, product_reference: "go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-45288", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45288", }, ], notes: [ { category: "general", text: "An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45288", url: "https://www.suse.com/security/cve/CVE-2023-45288", }, { category: "external", summary: "SUSE Bug 1221400 for CVE-2023-45288", url: "https://bugzilla.suse.com/1221400", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "moderate", }, ], title: "CVE-2023-45288", }, { cve: "CVE-2023-45289", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45289", }, ], notes: [ { category: "general", text: "When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45289", url: "https://www.suse.com/security/cve/CVE-2023-45289", }, { category: "external", summary: "SUSE Bug 1221000 for CVE-2023-45289", url: "https://bugzilla.suse.com/1221000", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "important", }, ], title: "CVE-2023-45289", }, { cve: "CVE-2023-45290", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45290", }, ], notes: [ { category: "general", text: "When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45290", url: "https://www.suse.com/security/cve/CVE-2023-45290", }, { category: "external", summary: "SUSE Bug 1221001 for CVE-2023-45290", url: "https://bugzilla.suse.com/1221001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "important", }, ], title: "CVE-2023-45290", }, { cve: "CVE-2024-24783", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24783", }, ], notes: [ { category: "general", text: "Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24783", url: "https://www.suse.com/security/cve/CVE-2024-24783", }, { category: "external", summary: "SUSE Bug 1220999 for CVE-2024-24783", url: "https://bugzilla.suse.com/1220999", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "important", }, ], title: "CVE-2024-24783", }, { cve: "CVE-2024-24784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24784", }, ], notes: [ { category: "general", text: "The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24784", url: "https://www.suse.com/security/cve/CVE-2024-24784", }, { category: "external", summary: "SUSE Bug 1221002 for CVE-2024-24784", url: "https://bugzilla.suse.com/1221002", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "important", }, ], title: "CVE-2024-24784", }, { cve: "CVE-2024-24785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24785", }, ], notes: [ { category: "general", text: "If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24785", url: "https://www.suse.com/security/cve/CVE-2024-24785", }, { category: "external", summary: "SUSE Bug 1221003 for CVE-2024-24785", url: "https://bugzilla.suse.com/1221003", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "important", }, ], title: "CVE-2024-24785", }, { cve: "CVE-2024-24787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24787", }, ], notes: [ { category: "general", text: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24787", url: "https://www.suse.com/security/cve/CVE-2024-24787", }, { category: "external", summary: "SUSE Bug 1224017 for CVE-2024-24787", url: "https://bugzilla.suse.com/1224017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "moderate", }, ], title: "CVE-2024-24787", }, { cve: "CVE-2024-24788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24788", }, ], notes: [ { category: "general", text: "A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24788", url: "https://www.suse.com/security/cve/CVE-2024-24788", }, { category: "external", summary: "SUSE Bug 1224018 for CVE-2024-24788", url: "https://bugzilla.suse.com/1224018", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "moderate", }, ], title: "CVE-2024-24788", }, { cve: "CVE-2024-24789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24789", }, ], notes: [ { category: "general", text: "The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24789", url: "https://www.suse.com/security/cve/CVE-2024-24789", }, { category: "external", summary: "SUSE Bug 1225973 for CVE-2024-24789", url: "https://bugzilla.suse.com/1225973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "moderate", }, ], title: "CVE-2024-24789", }, { cve: "CVE-2024-24790", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24790", }, ], notes: [ { category: "general", text: "The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24790", url: "https://www.suse.com/security/cve/CVE-2024-24790", }, { category: "external", summary: "SUSE Bug 1225974 for CVE-2024-24790", url: "https://bugzilla.suse.com/1225974", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "moderate", }, ], title: "CVE-2024-24790", }, { cve: "CVE-2024-24791", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24791", }, ], notes: [ { category: "general", text: "The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an \"Expect: 100-continue\" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending \"Expect: 100-continue\" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24791", url: "https://www.suse.com/security/cve/CVE-2024-24791", }, { category: "external", summary: "SUSE Bug 1227314 for CVE-2024-24791", url: "https://bugzilla.suse.com/1227314", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "moderate", }, ], title: "CVE-2024-24791", }, { cve: "CVE-2024-34155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-34155", }, ], notes: [ { category: "general", text: "Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-34155", url: "https://www.suse.com/security/cve/CVE-2024-34155", }, { category: "external", summary: "SUSE Bug 1230252 for CVE-2024-34155", url: "https://bugzilla.suse.com/1230252", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "moderate", }, ], title: "CVE-2024-34155", }, { cve: "CVE-2024-34156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-34156", }, ], notes: [ { category: "general", text: "Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-34156", url: "https://www.suse.com/security/cve/CVE-2024-34156", }, { category: "external", summary: "SUSE Bug 1230253 for CVE-2024-34156", url: "https://bugzilla.suse.com/1230253", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "moderate", }, ], title: "CVE-2024-34156", }, { cve: "CVE-2024-34158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-34158", }, ], notes: [ { category: "general", text: "Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-34158", url: "https://www.suse.com/security/cve/CVE-2024-34158", }, { category: "external", summary: "SUSE Bug 1230254 for CVE-2024-34158", url: "https://bugzilla.suse.com/1230254", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1.x86_64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.aarch64", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.ppc64le", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.s390x", "openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-29T13:54:03Z", details: "moderate", }, ], title: "CVE-2024-34158", }, ], }
suse-su-2024:1588-1
Vulnerability from csaf_suse
Published
2024-05-10 07:19
Modified
2024-05-10 07:19
Summary
Security update for go1.21
Notes
Title of the patch
Security update for go1.21
Description of the patch
This update for go1.21 fixes the following issues:
Update to go1.21.10:
- CVE-2024-24787: cmd/go: arbitrary code execution during build on darwin (bsc#1224017)
- net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0
Patchnames
SUSE-2024-1588,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1588,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1588,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1588,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1588,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1588,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1588,openSUSE-SLE-15.5-2024-1588,openSUSE-SLE-15.6-2024-1588
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for go1.21", title: "Title of the patch", }, { category: "description", text: "This update for go1.21 fixes the following issues:\n\nUpdate to go1.21.10:\n\n- CVE-2024-24787: cmd/go: arbitrary code execution during build on darwin (bsc#1224017)\n- net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-1588,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1588,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1588,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1588,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1588,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1588,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1588,openSUSE-SLE-15.5-2024-1588,openSUSE-SLE-15.6-2024-1588", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1588-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:1588-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20241588-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:1588-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018502.html", }, { category: "self", summary: "SUSE Bug 1212475", url: "https://bugzilla.suse.com/1212475", }, { category: "self", summary: "SUSE Bug 1224017", url: "https://bugzilla.suse.com/1224017", }, { category: "self", summary: "SUSE CVE CVE-2024-24787 page", url: "https://www.suse.com/security/cve/CVE-2024-24787/", }, ], title: "Security update for go1.21", tracking: { current_release_date: "2024-05-10T07:19:01Z", generator: { date: "2024-05-10T07:19:01Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:1588-1", initial_release_date: "2024-05-10T07:19:01Z", revision_history: [ { date: "2024-05-10T07:19:01Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "go1.21-1.21.10-150000.1.33.1.aarch64", product: { name: "go1.21-1.21.10-150000.1.33.1.aarch64", product_id: "go1.21-1.21.10-150000.1.33.1.aarch64", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-150000.1.33.1.aarch64", product: { name: "go1.21-doc-1.21.10-150000.1.33.1.aarch64", product_id: "go1.21-doc-1.21.10-150000.1.33.1.aarch64", }, }, { category: "product_version", name: "go1.21-race-1.21.10-150000.1.33.1.aarch64", product: { name: "go1.21-race-1.21.10-150000.1.33.1.aarch64", product_id: "go1.21-race-1.21.10-150000.1.33.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "go1.21-1.21.10-150000.1.33.1.i586", product: { name: "go1.21-1.21.10-150000.1.33.1.i586", product_id: "go1.21-1.21.10-150000.1.33.1.i586", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-150000.1.33.1.i586", product: { name: "go1.21-doc-1.21.10-150000.1.33.1.i586", product_id: "go1.21-doc-1.21.10-150000.1.33.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "go1.21-1.21.10-150000.1.33.1.ppc64le", product: { name: "go1.21-1.21.10-150000.1.33.1.ppc64le", product_id: "go1.21-1.21.10-150000.1.33.1.ppc64le", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le", product: { name: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le", product_id: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le", }, }, { category: "product_version", name: "go1.21-race-1.21.10-150000.1.33.1.ppc64le", product: { name: "go1.21-race-1.21.10-150000.1.33.1.ppc64le", product_id: "go1.21-race-1.21.10-150000.1.33.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "go1.21-1.21.10-150000.1.33.1.s390x", product: { name: "go1.21-1.21.10-150000.1.33.1.s390x", product_id: "go1.21-1.21.10-150000.1.33.1.s390x", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-150000.1.33.1.s390x", product: { name: "go1.21-doc-1.21.10-150000.1.33.1.s390x", product_id: "go1.21-doc-1.21.10-150000.1.33.1.s390x", }, }, { category: "product_version", name: "go1.21-race-1.21.10-150000.1.33.1.s390x", product: { name: "go1.21-race-1.21.10-150000.1.33.1.s390x", product_id: "go1.21-race-1.21.10-150000.1.33.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "go1.21-1.21.10-150000.1.33.1.x86_64", product: { name: "go1.21-1.21.10-150000.1.33.1.x86_64", product_id: "go1.21-1.21.10-150000.1.33.1.x86_64", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-150000.1.33.1.x86_64", product: { name: "go1.21-doc-1.21.10-150000.1.33.1.x86_64", product_id: "go1.21-doc-1.21.10-150000.1.33.1.x86_64", }, }, { category: "product_version", name: "go1.21-race-1.21.10-150000.1.33.1.x86_64", product: { name: "go1.21-race-1.21.10-150000.1.33.1.x86_64", product_id: "go1.21-race-1.21.10-150000.1.33.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.s390x", }, product_reference: "go1.21-1.21.10-150000.1.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.s390x", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.s390x", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-race-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-race-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.s390x", }, product_reference: "go1.21-1.21.10-150000.1.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.s390x", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-doc-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-race-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.s390x", }, product_reference: "go1.21-1.21.10-150000.1.33.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.s390x", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.s390x", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.s390x", }, product_reference: "go1.21-1.21.10-150000.1.33.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-150000.1.33.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.s390x", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-150000.1.33.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-doc-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.aarch64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.ppc64le", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.s390x", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-150000.1.33.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.x86_64", }, product_reference: "go1.21-race-1.21.10-150000.1.33.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2024-24787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24787", }, ], notes: [ { category: "general", text: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-race-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24787", url: "https://www.suse.com/security/cve/CVE-2024-24787", }, { category: "external", summary: "SUSE Bug 1224017 for CVE-2024-24787", url: "https://bugzilla.suse.com/1224017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-race-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.21-race-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.21-race-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.5:go1.21-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.5:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.5:go1.21-race-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.6:go1.21-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.6:go1.21-doc-1.21.10-150000.1.33.1.x86_64", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.aarch64", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.ppc64le", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.s390x", "openSUSE Leap 15.6:go1.21-race-1.21.10-150000.1.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-05-10T07:19:01Z", details: "moderate", }, ], title: "CVE-2024-24787", }, ], }
suse-su-2024:1573-1
Vulnerability from csaf_suse
Published
2024-05-09 11:18
Modified
2024-05-09 11:18
Summary
Security update for go1.22
Notes
Title of the patch
Security update for go1.22
Description of the patch
This update for go1.22 fixes the following issues:
Update to go1.22.3:
- CVE-2024-24787: cmd/go: arbitrary code execution during build on darwin (bsc#1224017)
- CVE-2024-24788: net: high cpu usage in extractExtendedRCode (bsc#1224018)
- cmd/compile: Go 1.22.x failed to be bootstrapped from 386 to ppc64le
- cmd/compile: changing a hot concrete method to interface method triggers a PGO ICE
- runtime: deterministic fallback hashes across process boundary
- net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0
Patchnames
SUSE-2024-1573,SUSE-SLE-SDK-12-SP5-2024-1573
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for go1.22", title: "Title of the patch", }, { category: "description", text: "This update for go1.22 fixes the following issues:\n\nUpdate to go1.22.3:\n\n- CVE-2024-24787: cmd/go: arbitrary code execution during build on darwin (bsc#1224017)\n- CVE-2024-24788: net: high cpu usage in extractExtendedRCode (bsc#1224018)\n- cmd/compile: Go 1.22.x failed to be bootstrapped from 386 to ppc64le\n- cmd/compile: changing a hot concrete method to interface method triggers a PGO ICE\n- runtime: deterministic fallback hashes across process boundary\n- net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-1573,SUSE-SLE-SDK-12-SP5-2024-1573", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1573-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:1573-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20241573-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:1573-1", url: "https://lists.suse.com/pipermail/sle-updates/2024-May/035205.html", }, { category: "self", summary: "SUSE Bug 1218424", url: "https://bugzilla.suse.com/1218424", }, { category: "self", summary: "SUSE Bug 1224017", url: "https://bugzilla.suse.com/1224017", }, { category: "self", summary: "SUSE Bug 1224018", url: "https://bugzilla.suse.com/1224018", }, { category: "self", summary: "SUSE CVE CVE-2024-24787 page", url: "https://www.suse.com/security/cve/CVE-2024-24787/", }, { category: "self", summary: "SUSE CVE CVE-2024-24788 page", url: "https://www.suse.com/security/cve/CVE-2024-24788/", }, ], title: "Security update for go1.22", tracking: { current_release_date: "2024-05-09T11:18:26Z", generator: { date: "2024-05-09T11:18:26Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:1573-1", initial_release_date: "2024-05-09T11:18:26Z", revision_history: [ { date: "2024-05-09T11:18:26Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "go1.22-1.22.3-1.9.1.aarch64", product: { name: "go1.22-1.22.3-1.9.1.aarch64", product_id: "go1.22-1.22.3-1.9.1.aarch64", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-1.9.1.aarch64", product: { name: "go1.22-doc-1.22.3-1.9.1.aarch64", product_id: "go1.22-doc-1.22.3-1.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "go1.22-1.22.3-1.9.1.i586", product: { name: "go1.22-1.22.3-1.9.1.i586", product_id: "go1.22-1.22.3-1.9.1.i586", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-1.9.1.i586", product: { name: "go1.22-doc-1.22.3-1.9.1.i586", product_id: "go1.22-doc-1.22.3-1.9.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "go1.22-1.22.3-1.9.1.ppc64le", product: { name: "go1.22-1.22.3-1.9.1.ppc64le", product_id: "go1.22-1.22.3-1.9.1.ppc64le", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-1.9.1.ppc64le", product: { name: "go1.22-doc-1.22.3-1.9.1.ppc64le", product_id: "go1.22-doc-1.22.3-1.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "go1.22-1.22.3-1.9.1.s390x", product: { name: "go1.22-1.22.3-1.9.1.s390x", product_id: "go1.22-1.22.3-1.9.1.s390x", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-1.9.1.s390x", product: { name: "go1.22-doc-1.22.3-1.9.1.s390x", product_id: "go1.22-doc-1.22.3-1.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "go1.22-1.22.3-1.9.1.x86_64", product: { name: "go1.22-1.22.3-1.9.1.x86_64", product_id: "go1.22-1.22.3-1.9.1.x86_64", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-1.9.1.x86_64", product: { name: "go1.22-doc-1.22.3-1.9.1.x86_64", product_id: "go1.22-doc-1.22.3-1.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-1.9.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.aarch64", }, product_reference: "go1.22-1.22.3-1.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-1.9.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.ppc64le", }, product_reference: "go1.22-1.22.3-1.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-1.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.s390x", }, product_reference: "go1.22-1.22.3-1.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-1.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.x86_64", }, product_reference: "go1.22-1.22.3-1.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-1.9.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.aarch64", }, product_reference: "go1.22-doc-1.22.3-1.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-1.9.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.ppc64le", }, product_reference: "go1.22-doc-1.22.3-1.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-1.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.s390x", }, product_reference: "go1.22-doc-1.22.3-1.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-1.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.x86_64", }, product_reference: "go1.22-doc-1.22.3-1.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2024-24787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24787", }, ], notes: [ { category: "general", text: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24787", url: "https://www.suse.com/security/cve/CVE-2024-24787", }, { category: "external", summary: "SUSE Bug 1224017 for CVE-2024-24787", url: "https://bugzilla.suse.com/1224017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-05-09T11:18:26Z", details: "moderate", }, ], title: "CVE-2024-24787", }, { cve: "CVE-2024-24788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24788", }, ], notes: [ { category: "general", text: "A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24788", url: "https://www.suse.com/security/cve/CVE-2024-24788", }, { category: "external", summary: "SUSE Bug 1224018 for CVE-2024-24788", url: "https://bugzilla.suse.com/1224018", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-1.22.3-1.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.22-doc-1.22.3-1.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-05-09T11:18:26Z", details: "moderate", }, ], title: "CVE-2024-24788", }, ], }
suse-su-2024:1574-1
Vulnerability from csaf_suse
Published
2024-05-09 11:18
Modified
2024-05-09 11:18
Summary
Security update for go1.21
Notes
Title of the patch
Security update for go1.21
Description of the patch
This update for go1.21 fixes the following issues:
Update to go1.21.10:
- CVE-2024-24787: cmd/go: arbitrary code execution during build on darwin (bsc#1224017)
- net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0
Patchnames
SUSE-2024-1574,SUSE-SLE-SDK-12-SP5-2024-1574
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for go1.21", title: "Title of the patch", }, { category: "description", text: "This update for go1.21 fixes the following issues:\n\nUpdate to go1.21.10:\n\n- CVE-2024-24787: cmd/go: arbitrary code execution during build on darwin (bsc#1224017)\n- net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-1574,SUSE-SLE-SDK-12-SP5-2024-1574", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1574-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:1574-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20241574-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:1574-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018486.html", }, { category: "self", summary: "SUSE Bug 1212475", url: "https://bugzilla.suse.com/1212475", }, { category: "self", summary: "SUSE Bug 1224017", url: "https://bugzilla.suse.com/1224017", }, { category: "self", summary: "SUSE CVE CVE-2024-24787 page", url: "https://www.suse.com/security/cve/CVE-2024-24787/", }, ], title: "Security update for go1.21", tracking: { current_release_date: "2024-05-09T11:18:39Z", generator: { date: "2024-05-09T11:18:39Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:1574-1", initial_release_date: "2024-05-09T11:18:39Z", revision_history: [ { date: "2024-05-09T11:18:39Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "go1.21-1.21.10-1.33.1.aarch64", product: { name: "go1.21-1.21.10-1.33.1.aarch64", product_id: "go1.21-1.21.10-1.33.1.aarch64", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-1.33.1.aarch64", product: { name: "go1.21-doc-1.21.10-1.33.1.aarch64", product_id: "go1.21-doc-1.21.10-1.33.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "go1.21-1.21.10-1.33.1.i586", product: { name: "go1.21-1.21.10-1.33.1.i586", product_id: "go1.21-1.21.10-1.33.1.i586", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-1.33.1.i586", product: { name: "go1.21-doc-1.21.10-1.33.1.i586", product_id: "go1.21-doc-1.21.10-1.33.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "go1.21-1.21.10-1.33.1.ppc64le", product: { name: "go1.21-1.21.10-1.33.1.ppc64le", product_id: "go1.21-1.21.10-1.33.1.ppc64le", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-1.33.1.ppc64le", product: { name: "go1.21-doc-1.21.10-1.33.1.ppc64le", product_id: "go1.21-doc-1.21.10-1.33.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "go1.21-1.21.10-1.33.1.s390x", product: { name: "go1.21-1.21.10-1.33.1.s390x", product_id: "go1.21-1.21.10-1.33.1.s390x", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-1.33.1.s390x", product: { name: "go1.21-doc-1.21.10-1.33.1.s390x", product_id: "go1.21-doc-1.21.10-1.33.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "go1.21-1.21.10-1.33.1.x86_64", product: { name: "go1.21-1.21.10-1.33.1.x86_64", product_id: "go1.21-1.21.10-1.33.1.x86_64", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-1.33.1.x86_64", product: { name: "go1.21-doc-1.21.10-1.33.1.x86_64", product_id: "go1.21-doc-1.21.10-1.33.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-1.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.aarch64", }, product_reference: "go1.21-1.21.10-1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-1.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.ppc64le", }, product_reference: "go1.21-1.21.10-1.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-1.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.s390x", }, product_reference: "go1.21-1.21.10-1.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-1.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.x86_64", }, product_reference: "go1.21-1.21.10-1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-1.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.aarch64", }, product_reference: "go1.21-doc-1.21.10-1.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-1.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.ppc64le", }, product_reference: "go1.21-doc-1.21.10-1.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-1.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.s390x", }, product_reference: "go1.21-doc-1.21.10-1.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-1.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.x86_64", }, product_reference: "go1.21-doc-1.21.10-1.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2024-24787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24787", }, ], notes: [ { category: "general", text: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24787", url: "https://www.suse.com/security/cve/CVE-2024-24787", }, { category: "external", summary: "SUSE Bug 1224017 for CVE-2024-24787", url: "https://bugzilla.suse.com/1224017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-1.21.10-1.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:go1.21-doc-1.21.10-1.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-05-09T11:18:39Z", details: "moderate", }, ], title: "CVE-2024-24787", }, ], }
suse-su-2024:3938-1
Vulnerability from csaf_suse
Published
2024-11-07 10:08
Modified
2024-11-07 10:08
Summary
Security update for go1.22-openssl
Notes
Title of the patch
Security update for go1.22-openssl
Description of the patch
This update for go1.22-openssl fixes the following issues:
This update ships go1.22-openssl 1.22.7.1 (jsc#SLE-18320)
- Update to version 1.22.7.1 cut from the go1.22-fips-release
branch at the revision tagged go1.22.7-1-openssl-fips.
* Update to Go 1.22.7 (#229)
- go1.22.7 (released 2024-09-05) includes security fixes to the
encoding/gob, go/build/constraint, and go/parser packages, as
well as bug fixes to the fix command and the runtime.
CVE-2024-34155 CVE-2024-34156 CVE-2024-34158:
- go#69142 go#69138 bsc#1230252 security: fix CVE-2024-34155 go/parser: stack exhaustion in all Parse* functions (CVE-2024-34155)
- go#69144 go#69139 bsc#1230253 security: fix CVE-2024-34156 encoding/gob: stack exhaustion in Decoder.Decode (CVE-2024-34156)
- go#69148 go#69141 bsc#1230254 security: fix CVE-2024-34158 go/build/constraint: stack exhaustion in Parse (CVE-2024-34158)
- go#68811 os: TestChtimes failures
- go#68825 cmd/fix: fails to run on modules whose go directive value is in '1.n.m' format introduced in Go 1.21.0
- go#68972 cmd/cgo: aix c-archive corrupting stack
- go1.22.6 (released 2024-08-06) includes fixes to the go command,
the compiler, the linker, the trace command, the covdata command,
and the bytes, go/types, and os/exec packages.
* go#68594 cmd/compile: internal compiler error with zero-size types
* go#68546 cmd/trace/v2: pprof profiles always empty
* go#68492 cmd/covdata: too many open files due to defer f.Close() in for loop
* go#68475 bytes: IndexByte can return -4294967295 when memory usage is above 2^31 on js/wasm
* go#68370 go/types: assertion failure in recent range statement checking logic
* go#68331 os/exec: modifications to Path ignored when *Cmd is created using Command with an absolute path on Windows
* go#68230 cmd/compile: inconsistent integer arithmetic result on Go 1.22+arm64 with/without -race
* go#68222 cmd/go: list with -export and -covermode=atomic fails to build
* go#68198 cmd/link: issues with Xcode 16 beta
- Update to version 1.22.5.3 cut from the go1.22-fips-release
branch at the revision tagged go1.22.5-3-openssl-fips.
* Only load openssl if fips == '1'
Avoid loading openssl whenever GOLANG_FIPS is not 1.
Previously only an unset variable would cause the library load
to be skipped, but users may also expect to be able to set eg.
GOLANG_FIPS=0 in environments without openssl.
- Update to version 1.22.5.2 cut from the go1.22-fips-release
branch at the revision tagged go1.22.5-2-openssl-fips.
* Only load OpenSSL when in FIPS mode
- Update to version 1.22.5.1 cut from the go1.22-fips-release
branch at the revision tagged go1.22.5-1-openssl-fips.
* Update to go1.22.5
- go1.22.5 (released 2024-07-02) includes security fixes to the
net/http package, as well as bug fixes to the compiler, cgo, the
go command, the linker, the runtime, and the crypto/tls,
go/types, net, net/http, and os/exec packages.
CVE-2024-24791:
* go#68200 go#67555 bsc#1227314 security: fix CVE CVE-2024-24791 net/http: expect: 100-continue handling is broken in various ways
* go#65983 cmd/compile: hash of unhashable type
* go#65994 crypto/tls: segfault when calling tlsrsakex.IncNonDefault()
* go#66598 os/exec: calling Cmd.Start after setting Cmd.Path manually to absolute path without '.exe' no longer implicitly adds '.exe' in Go 1.22
* go#67298 runtime: 'fatal: morestack on g0' on amd64 after upgrade to Go 1.21, stale bounds
* go#67715 cmd/cgo/internal/swig,cmd/go,x/build: swig cgo tests incompatible with C++ toolchain on builders
* go#67798 cmd/compile: internal compiler error: unexpected type: <nil> (<nil>) in for-range
* go#67820 cmd/compile: package-level variable initialization with constant dependencies doesn't match order specified in Go spec
* go#67850 go/internal/gccgoimporter: go building failing with gcc 14.1.0
* go#67934 net: go DNS resolver fails to connect to local DNS server
* go#67945 cmd/link: using -fuzz with test that links with cgo on darwin causes linker failure
* go#68052 cmd/go: go list -u -m all fails loading module retractions: module requires go >= 1.N+1 (running go 1.N)
* go#68122 cmd/link: runtime.mach_vm_region_trampoline: unsupported dynamic relocation for symbol libc_mach_task_self_ (type=29 (R_GOTPCREL) stype=46 (SDYNIMPORT))
- Update to version 1.22.4.1 cut from the go1.22-fips-release
branch at the revision tagged go1.22.4-1-openssl-fips.
* Update to go1.22.4
- go1.22.4 (released 2024-06-04) includes security fixes to the
archive/zip and net/netip packages, as well as bug fixes to the
compiler, the go command, the linker, the runtime, and the os
package.
CVE-2024-24789 CVE-2024-24790:
* go#67554 go#66869 bsc#1225973 security: fix CVE-2024-24789 archive/zip: EOCDR comment length handling is inconsistent with other ZIP implementations
* go#67682 go#67680 bsc#1225974 security: fix CVE-2024-24790 net/netip: unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
* go#67188 runtime/metrics: /memory/classes/heap/unused:bytes spikes
* go#67212 cmd/compile: SIGBUS unaligned access on mips64 via qemu-mips64
* go#67236 cmd/go: mod tidy reports toolchain not available with 'go 1.21'
* go#67258 runtime: unexpected fault address 0
* go#67311 cmd/go: TestScript/gotoolchain_issue66175 fails on tip locally
* go#67314 cmd/go,cmd/link: TestScript/build_issue48319 and TestScript/build_plugin_reproducible failing on LUCI gotip-darwin-amd64-longtest builder due to non-reproducible LC_UUID
* go#67352 crypto/x509: TestPlatformVerifier failures on Windows due to broken connections
* go#67460 cmd/compile: internal compiler error: panic with range over integer value
* go#67527 cmd/link: panic: machorelocsect: size mismatch
* go#67650 runtime: SIGSEGV after performing clone(CLONE_PARENT) via C constructor prior to runtime start
* go#67696 os: RemoveAll susceptible to symlink race
- Update to version 1.22.3.3 cut from the go1.22-fips-release
branch at the revision tagged go1.22.3-3-openssl-fips.
* config: update openssl backend (#201)
- Update to version 1.22.3.2 cut from the go1.22-fips-release
branch at the revision tagged go1.22.3-2-openssl-fips.
* patches: restore signature of HashSign/HashVerify (#199)
- Update to version 1.22.3.1 cut from the go1.22-fips-release
branch at the revision tagged go1.22.3-1-openssl-fips.
* Update to go1.22.3
* fix: rename patch file
* Backport change https://go-review.googlesource.com/c/go/+/554615 to Go1.22 (#193)
runtime: crash asap and extend total sleep time for slow machine in test
Running with few threads usually does not need 500ms to crash, so let it
crash as soon as possible. While the test may caused more time on slow
machine, try to expand the sleep time in test.
* cmd/go: re-enable CGO for Go toolchain commands (#190)
* crypto/ecdsa: Restore HashSign and HashVerify (#189)
- go1.22.3 (released 2024-05-07) includes security fixes to the go
command and the net package, as well as bug fixes to the
compiler, the runtime, and the net/http package.
CVE-2024-24787 CVE-2024-24788:
* go#67122 go#67119 bsc#1224017 security: fix CVE-2024-24787 cmd/go: arbitrary code execution during build on darwin
* go#67040 go#66754 bsc#1224018 security: fix CVE-2024-24788 net: high cpu usage in extractExtendedRCode
* go#67018 cmd/compile: Go 1.22.x failed to be bootstrapped from 386 to ppc64le
* go#67017 cmd/compile: changing a hot concrete method to interface method triggers a PGO ICE
* go#66886 runtime: deterministic fallback hashes across process boundary
* go#66698 net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0
- Update to version 1.22.2.1 cut from the go1.22-fips-release
branch at the revision tagged go1.22.2-1-openssl-fips.
* Update to go1.22.2
- go1.22.2 (released 2024-04-03) includes a security fix to the
net/http package, as well as bug fixes to the compiler, the go
command, the linker, and the encoding/gob, go/types, net/http,
and runtime/trace packages.
CVE-2023-45288:
* go#66298 go#65051 bsc#1221400 security: fix CVE-2023-45288 net/http, x/net/http2: close connections when receiving too many headers
* go#65858 cmd/compile: unreachable panic with GODEBUG=gotypesalias=1
* go#66060 cmd/link: RISC-V external link, failed to find text symbol for HI20 relocation
* go#66076 cmd/compile: out-of-bounds panic with uint32 conversion and modulus operation in Go 1.22.0 on arm64
* go#66134 cmd/compile: go test . results in CLOSURE ... <unknown line number>: internal compiler error: assertion failed
* go#66137 cmd/go: go 1.22.0: go test throws errors when processing folders not listed in coverpkg argument
* go#66178 cmd/compile: ICE: panic: interface conversion: ir.Node is *ir.ConvExpr, not *ir.IndexExpr
* go#66201 runtime/trace: v2 traces contain an incorrect timestamp scaling factor on Windows
* go#66255 net/http: http2 round tripper nil pointer dereference causes panic causing deadlock
* go#66256 cmd/go: git shallow fetches broken at CL 556358
* go#66273 crypto/x509: Certificate no longer encodable using encoding/gob in Go1.22
* go#66412 cmd/link: bad carrier sym for symbol runtime.elf_savegpr0.args_stackmap on ppc64le
- Update to version 1.22.1.2 cut from the go1.22-fips-release
branch at the revision tagged go1.22.1-2-openssl-fips.
* config: Update openssl v2 module (#178)
- Remove subpackage go1.x-openssl-libstd for compiled shared object
libstd.so.
* Continue to build experimental libstd only on go1.x Tumbleweed.
* Removal fixes build errors on go1.x-openssl Factory and ALP.
* Use of libstd.so is experimental and not recommended for
general use, Go currently has no ABI.
* Feature go build -buildmode=shared is deprecated by upstream,
but not yet removed.
- Initial package go1.22-openssl version 1.22.1.1 cut from the
go1.22-fips-release branch at the revision tagged
go1.22.1-1-openssl-fips.
* Go upstream merged branch dev.boringcrypto in go1.19+.
* In go1.x enable BoringCrypto via GOEXPERIMENT=boringcrypto.
* In go1.x-openssl enable FIPS mode (or boring mode as the
package is named) either via an environment variable
GOLANG_FIPS=1 or by virtue of booting the host in FIPS mode.
* When the operating system is operating in FIPS mode, Go
applications which import crypto/tls/fipsonly limit operations
to the FIPS ciphersuite.
* go1.x-openssl is delivered as two large patches to go1.x
applying necessary modifications from the golang-fips/go GitHub
project for the Go crypto library to use OpenSSL as the
external cryptographic library in a FIPS compliant way.
* go1.x-openssl modifies the crypto/* packages to use OpenSSL for
cryptographic operations.
* go1.x-openssl uses dlopen() to call into OpenSSL.
* SUSE RPM packaging introduces a fourth version digit go1.x.y.z
corresponding to the golang-fips/go patchset tagged revision.
* Patchset improvements can be updated independently of upstream
Go maintenance releases.
- go1.22.1 (released 2024-03-05) includes security fixes to the
crypto/x509, html/template, net/http, net/http/cookiejar, and
net/mail packages, as well as bug fixes to the compiler, the go
command, the runtime, the trace command, and the go/types and
net/http packages.
CVE-2023-45289 CVE-2023-45290 CVE-2024-24783 CVE-2024-24784 CVE-2024-24785:
* go#65831 go#65390 bsc#1220999 security: fix CVE-2024-24783 crypto/x509: Verify panics on certificates with an unknown public key algorithm
* go#65849 go#65083 bsc#1221002 security: fix CVE-2024-24784 net/mail: comments in display names are incorrectly handled
* go#65850 go#65383 bsc#1221001 security: fix CVE-2023-45290 net/http: memory exhaustion in Request.ParseMultipartForm
* go#65859 go#65065 bsc#1221000 security: fix CVE-2023-45289 net/http, net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect
* go#65969 go#65697 bsc#1221003 security: fix CVE-2024-24785 html/template: errors returned from MarshalJSON methods may break template escaping
* go#65352 cmd/go: go generate fails silently when run on a package in a nested workspace module
* go#65471 internal/testenv: TestHasGoBuild failures on the LUCI noopt builders
* go#65474 internal/testenv: support LUCI mobile builders in testenv tests
* go#65577 cmd/trace/v2: goroutine analysis page doesn't identify goroutines consistently
* go#65618 cmd/compile: Go 1.22 build fails with 1.21 PGO profile on internal/saferio change
* go#65619 cmd/compile: Go 1.22 changes support for modules that declare go 1.0
* go#65641 cmd/cgo/internal/testsanitizers,x/build: LUCI clang15 builders failing
* go#65644 runtime: crash in race detector when execution tracer reads from CPU profile buffer
* go#65728 go/types: nil pointer dereference in Alias.Underlying()
* go#65759 net/http: context cancellation can leave HTTP client with deadlocked HTTP/1.1 connections in Go1.22
* go#65760 runtime: Go 1.22.0 fails to build from source on armv7 Alpine Linux
* go#65818 runtime: go1.22.0 test with -race will SIGSEGV or SIGBUS or Bad Pointer
* go#65852 cmd/go: 'missing ziphash' error with go.work
* go#65883 runtime: scheduler sometimes starves a runnable goroutine on wasm platforms
* bsc#1219988 ensure VERSION file is present in GOROOT
as required by go tool dist and go tool distpack
- go1.22 (released 2024-02-06) is a major release of Go.
go1.22.x minor releases will be provided through February 2024.
https://github.com/golang/go/wiki/Go-Release-Cycle
go1.22 arrives six months after go1.21. Most of its changes are
in the implementation of the toolchain, runtime, and libraries.
As always, the release maintains the Go 1 promise of
compatibility. We expect almost all Go programs to continue to
compile and run as before.
* Language change: go1.22 makes two changes to for loops.
Previously, the variables declared by a for loop were created
once and updated by each iteration. In go1.22, each iteration
of the loop creates new variables, to avoid accidental sharing
bugs. The transition support tooling described in the proposal
continues to work in the same way it did in Go 1.21.
* Language change: For loops may now range over integers
* Language change: go1.22 includes a preview of a language change
we are considering for a future version of Go:
range-over-function iterators. Building with
GOEXPERIMENT=rangefunc enables this feature.
* go command: Commands in workspaces can now use a vendor
directory containing the dependencies of the workspace. The
directory is created by go work vendor, and used by build
commands when the -mod flag is set to vendor, which is the
default when a workspace vendor directory is present. Note
that the vendor directory's contents for a workspace are
different from those of a single module: if the directory at
the root of a workspace also contains one of the modules in the
workspace, its vendor directory can contain the dependencies of
either the workspace or of the module, but not both.
* go get is no longer supported outside of a module in the legacy
GOPATH mode (that is, with GO111MODULE=off). Other build
commands, such as go build and go test, will continue to work
indefinitely for legacy GOPATH programs.
* go mod init no longer attempts to import module requirements
from configuration files for other vendoring tools (such as
Gopkg.lock).
* go test -cover now prints coverage summaries for covered
packages that do not have their own test files. Prior to Go
1.22 a go test -cover run for such a package would report: ?
mymod/mypack [no test files] and now with go1.22, functions in
the package are treated as uncovered: mymod/mypack coverage:
0.0% of statements Note that if a package contains no
executable code at all, we can't report a meaningful coverage
percentage; for such packages the go tool will continue to
report that there are no test files.
* trace: The trace tool's web UI has been gently refreshed as
part of the work to support the new tracer, resolving several
issues and improving the readability of various sub-pages. The
web UI now supports exploring traces in a thread-oriented
view. The trace viewer also now displays the full duration of
all system calls. These improvements only apply for viewing
traces produced by programs built with go1.22 or newer. A
future release will bring some of these improvements to traces
produced by older version of Go.
* vet: References to loop variables The behavior of the vet tool
has changed to match the new semantics (see above) of loop
variables in go1.22. When analyzing a file that requires go1.22
or newer (due to its go.mod file or a per-file build
constraint), vetcode> no longer reports references to loop
variables from within a function literal that might outlive the
iteration of the loop. In Go 1.22, loop variables are created
anew for each iteration, so such references are no longer at
risk of using a variable after it has been updated by the loop.
* vet: New warnings for missing values after append The vet tool
now reports calls to append that pass no values to be appended
to the slice, such as slice = append(slice). Such a statement
has no effect, and experience has shown that is nearly always a
mistake.
* vet: New warnings for deferring time.Since The vet tool now
reports a non-deferred call to time.Since(t) within a defer
statement. This is equivalent to calling time.Now().Sub(t)
before the defer statement, not when the deferred function is
called. In nearly all cases, the correct code requires
deferring the time.Since call.
* vet: New warnings for mismatched key-value pairs in log/slog
calls The vet tool now reports invalid arguments in calls to
functions and methods in the structured logging package,
log/slog, that accept alternating key/value pairs. It reports
calls where an argument in a key position is neither a string
nor a slog.Attr, and where a final key is missing its value.
* runtime: The runtime now keeps type-based garbage collection
metadata nearer to each heap object, improving the CPU
performance (latency or throughput) of Go programs by
1-3%. This change also reduces the memory overhead of the
majority Go programs by approximately 1% by deduplicating
redundant metadata. Some programs may see a smaller improvement
because this change adjusts the size class boundaries of the
memory allocator, so some objects may be moved up a size class.
A consequence of this change is that some objects' addresses
that were previously always aligned to a 16 byte (or higher)
boundary will now only be aligned to an 8 byte boundary. Some
programs that use assembly instructions that require memory
addresses to be more than 8-byte aligned and rely on the memory
allocator's previous alignment behavior may break, but we
expect such programs to be rare. Such programs may be built
with GOEXPERIMENT=noallocheaders to revert to the old metadata
layout and restore the previous alignment behavior, but package
owners should update their assembly code to avoid the alignment
assumption, as this workaround will be removed in a future
release.
* runtime: On the windows/amd64 port, programs linking or loading
Go libraries built with -buildmode=c-archive or
-buildmode=c-shared can now use the SetUnhandledExceptionFilter
Win32 function to catch exceptions not handled by the Go
runtime. Note that this was already supported on the
windows/386 port.
* compiler: Profile-guided Optimization (PGO) builds can now
devirtualize a higher proportion of calls than previously
possible. Most programs from a representative set of Go
programs now see between 2 and 14% improvement from enabling
PGO.
* compiler: The compiler now interleaves devirtualization and
inlining, so interface method calls are better optimized.
* compiler: go1.22 also includes a preview of an enhanced
implementation of the compiler's inlining phase that uses
heuristics to boost inlinability at call sites deemed
'important' (for example, in loops) and discourage inlining at
call sites deemed 'unimportant' (for example, on panic
paths). Building with GOEXPERIMENT=newinliner enables the new
call-site heuristics; see issue #61502 for more info and to
provide feedback.
* linker: The linker's -s and -w flags are now behave more
consistently across all platforms. The -w flag suppresses DWARF
debug information generation. The -s flag suppresses symbol
table generation. The -s flag also implies the -w flag, which
can be negated with -w=0. That is, -s -w=0 will generate a
binary with DWARF debug information generation but without the
symbol table.
* linker: On ELF platforms, the -B linker flag now accepts a
special form: with -B gobuildid, the linker will generate a GNU
build ID (the ELF NT_GNU_BUILD_ID note) derived from the Go
build ID.
* linker: On Windows, when building with -linkmode=internal, the
linker now preserves SEH information from C object files by
copying the .pdata and .xdata sections into the final
binary. This helps with debugging and profiling binaries using
native tools, such as WinDbg. Note that until now, C functions'
SEH exception handlers were not being honored, so this change
may cause some programs to behave differently.
-linkmode=external is not affected by this change, as external
linkers already preserve SEH information.
* bootstrap: As mentioned in the Go 1.20 release notes, go1.22
now requires the final point release of Go 1.20 or later for
bootstrap. We expect that Go 1.24 will require the final point
release of go1.22 or later for bootstrap.
* core library: New math/rand/v2 package: go1.22 includes the
first “v2” package in the standard library, math/rand/v2. The
changes compared to math/rand are detailed in proposal
go#61716. The most important changes are:
- The Read method, deprecated in math/rand, was not carried
forward for math/rand/v2. (It remains available in
math/rand.) The vast majority of calls to Read should use
crypto/rand’s Read instead. Otherwise a custom Read can be
constructed using the Uint64 method.
- The global generator accessed by top-level functions is
unconditionally randomly seeded. Because the API guarantees
no fixed sequence of results, optimizations like per-thread
random generator states are now possible.
- The Source interface now has a single Uint64 method; there is
no Source64 interface.
- Many methods now use faster algorithms that were not possible
to adopt in math/rand because they changed the output
streams.
- The Intn, Int31, Int31n, Int63, and Int64n top-level
functions and methods from math/rand are spelled more
idiomatically in math/rand/v2: IntN, Int32, Int32N, Int64,
and Int64N. There are also new top-level functions and
methods Uint32, Uint32N, Uint64, Uint64N, Uint, and UintN.
- The new generic function N is like Int64N or Uint64N but
works for any integer type. For example a random duration
from 0 up to 5 minutes is rand.N(5*time.Minute).
- The Mitchell & Reeds LFSR generator provided by math/rand’s
Source has been replaced by two more modern pseudo-random
generator sources: ChaCha8 PCG. ChaCha8 is a new,
cryptographically strong random number generator roughly
similar to PCG in efficiency. ChaCha8 is the algorithm used
for the top-level functions in math/rand/v2. As of go1.22,
math/rand's top-level functions (when not explicitly seeded)
and the Go runtime also use ChaCha8 for randomness.
- We plan to include an API migration tool in a future release,
likely Go 1.23.
* core library: New go/version package: The new go/version
package implements functions for validating and comparing Go
version strings.
* core library: Enhanced routing patterns: HTTP routing in the
standard library is now more expressive. The patterns used by
net/http.ServeMux have been enhanced to accept methods and
wildcards. This change breaks backwards compatibility in small
ways, some obvious—patterns with '{' and '}' behave
differently— and some less so—treatment of escaped paths has
been improved. The change is controlled by a GODEBUG field
named httpmuxgo121. Set httpmuxgo121=1 to restore the old
behavior.
* Minor changes to the library As always, there are various minor
changes and updates to the library, made with the Go 1 promise
of compatibility in mind. There are also various performance
improvements, not enumerated here.
* archive/tar: The new method Writer.AddFS adds all of the files
from an fs.FS to the archive.
* archive/zip: The new method Writer.AddFS adds all of the files
from an fs.FS to the archive.
* bufio: When a SplitFunc returns ErrFinalToken with a nil token,
Scanner will now stop immediately. Previously, it would report
a final empty token before stopping, which was usually not
desired. Callers that do want to report a final empty token can
do so by returning []byte{} rather than nil.
* cmp: The new function Or returns the first in a sequence of
values that is not the zero value.
* crypto/tls: ConnectionState.ExportKeyingMaterial will now
return an error unless TLS 1.3 is in use, or the
extended_master_secret extension is supported by both the
server and client. crypto/tls has supported this extension
since Go 1.20. This can be disabled with the tlsunsafeekm=1
GODEBUG setting.
* crypto/tls: By default, the minimum version offered by
crypto/tls servers is now TLS 1.2 if not specified with
config.MinimumVersion, matching the behavior of crypto/tls
clients. This change can be reverted with the tls10server=1
GODEBUG setting.
* crypto/tls: By default, cipher suites without ECDHE support are
no longer offered by either clients or servers during pre-TLS
1.3 handshakes. This change can be reverted with the
tlsrsakex=1 GODEBUG setting.
* crypto/x509: The new CertPool.AddCertWithConstraint method can
be used to add customized constraints to root certificates to
be applied during chain building.
* crypto/x509: On Android, root certificates will now be loaded
from /data/misc/keychain/certs-added as well as
/system/etc/security/cacerts.
* crypto/x509: A new type, OID, supports ASN.1 Object Identifiers
with individual components larger than 31 bits. A new field
which uses this type, Policies, is added to the Certificate
struct, and is now populated during parsing. Any OIDs which
cannot be represented using a asn1.ObjectIdentifier will appear
in Policies, but not in the old PolicyIdentifiers field. When
calling CreateCertificate, the Policies field is ignored, and
policies are taken from the PolicyIdentifiers field. Using the
x509usepolicies=1 GODEBUG setting inverts this, populating
certificate policies from the Policies field, and ignoring the
PolicyIdentifiers field. We may change the default value of
x509usepolicies in Go 1.23, making Policies the default field
for marshaling.
* database/sql: The new Null[T] type provide a way to scan
nullable columns for any column types.
* debug/elf: Constant R_MIPS_PC32 is defined for use with MIPS64
systems. Additional R_LARCH_* constants are defined for use
with LoongArch systems.
* encoding: The new methods AppendEncode and AppendDecode added
to each of the Encoding types in the packages encoding/base32,
encoding/base64, and encoding/hex simplify encoding and
decoding from and to byte slices by taking care of byte slice
buffer management.
* encoding: The methods base32.Encoding.WithPadding and
base64.Encoding.WithPadding now panic if the padding argument
is a negative value other than NoPadding.
* encoding/json: Marshaling and encoding functionality now
escapes '\b' and '\f' characters as \b and \f instead of \u0008
and \u000c.
* go/ast: The following declarations related to syntactic
identifier resolution are now deprecated: Ident.Obj, Object,
Scope, File.Scope, File.Unresolved, Importer, Package,
NewPackage. In general, identifiers cannot be accurately
resolved without type information. Consider, for example, the
identifier K in T{K: ''}: it could be the name of a local
variable if T is a map type, or the name of a field if T is a
struct type. New programs should use the go/types package to
resolve identifiers; see Object, Info.Uses, and Info.Defs for
details.
* go/ast: The new ast.Unparen function removes any enclosing
parentheses from an expression.
* go/types: The new Alias type represents type
aliases. Previously, type aliases were not represented
explicitly, so a reference to a type alias was equivalent to
spelling out the aliased type, and the name of the alias was
lost. The new representation retains the intermediate
Alias. This enables improved error reporting (the name of a
type alias can be reported), and allows for better handling of
cyclic type declarations involving type aliases. In a future
release, Alias types will also carry type parameter
information. The new function Unalias returns the actual type
denoted by an Alias type (or any other Type for that matter).
* go/types: Because Alias types may break existing type switches
that do not know to check for them, this functionality is
controlled by a GODEBUG field named gotypesalias. With
gotypesalias=0, everything behaves as before, and Alias types
are never created. With gotypesalias=1, Alias types are created
and clients must expect them. The default is gotypesalias=0. In
a future release, the default will be changed to
gotypesalias=1. Clients of go/types are urged to adjust their
code as soon as possible to work with gotypesalias=1 to
eliminate problems early.
* go/types: The Info struct now exports the FileVersions map
which provides per-file Go version information.
* go/types: The new helper method PkgNameOf returns the local
package name for the given import declaration.
* go/types: The implementation of SizesFor has been adjusted to
compute the same type sizes as the compiler when the compiler
argument for SizesFor is 'gc'. The default Sizes implementation
used by the type checker is now types.SizesFor('gc', 'amd64').
* go/types: The start position (Pos) of the lexical environment
block (Scope) that represents a function body has changed: it
used to start at the opening curly brace of the function body,
but now starts at the function's func token.
* html/template: Javascript template literals may now contain Go
template actions, and parsing a template containing one will no
longer return ErrJSTemplate. Similarly the GODEBUG setting
jstmpllitinterp no longer has any effect.
* io: The new SectionReader.Outer method returns the ReaderAt,
offset, and size passed to NewSectionReader.
* log/slog: The new SetLogLoggerLevel function controls the level
for the bridge between the `slog` and `log` packages. It sets
the minimum level for calls to the top-level `slog` logging
functions, and it sets the level for calls to `log.Logger` that
go through `slog`.
* math/big: The new method Rat.FloatPrec computes the number of
fractional decimal digits required to represent a rational
number accurately as a floating-point number, and whether
accurate decimal representation is possible in the first place.
* net: When io.Copy copies from a TCPConn to a UnixConn, it will
now use Linux's splice(2) system call if possible, using the
new method TCPConn.WriteTo.
* net: The Go DNS Resolver, used when building with
'-tags=netgo', now searches for a matching name in the Windows
hosts file, located at %SystemRoot%\System32\drivers\etc\hosts,
before making a DNS query.
* net/http: The new functions ServeFileFS, FileServerFS, and
NewFileTransportFS are versions of the existing ServeFile,
FileServer, and NewFileTransport, operating on an fs.FS.
* net/http: The HTTP server and client now reject requests and
responses containing an invalid empty Content-Length
header. The previous behavior may be restored by setting
GODEBUG field httplaxcontentlength=1.
* net/http: The new method Request.PathValue returns path
wildcard values from a request and the new method
Request.SetPathValue sets path wildcard values on a request.
* net/http/cgi: When executing a CGI process, the PATH_INFO
variable is now always set to the empty string or a value
starting with a / character, as required by RFC 3875. It was
previously possible for some combinations of Handler.Root and
request URL to violate this requirement.
* net/netip: The new AddrPort.Compare method compares two
AddrPorts.
* os: On Windows, the Stat function now follows all reparse
points that link to another named entity in the system. It was
previously only following IO_REPARSE_TAG_SYMLINK and
IO_REPARSE_TAG_MOUNT_POINT reparse points.
* os: On Windows, passing O_SYNC to OpenFile now causes write
operations to go directly to disk, equivalent to O_SYNC on Unix
platforms.
* os: On Windows, the ReadDir, File.ReadDir, File.Readdir, and
File.Readdirnames functions now read directory entries in
batches to reduce the number of system calls, improving
performance up to 30%.
* os: When io.Copy copies from a File to a net.UnixConn, it will
now use Linux's sendfile(2) system call if possible, using the
new method File.WriteTo.
* os/exec: On Windows, LookPath now ignores empty entries
in %PATH%, and returns ErrNotFound (instead of ErrNotExist)
if no executable file extension is found to resolve an
otherwise-unambiguous name.
* os/exec: On Windows, Command and Cmd.Start no longer call
LookPath if the path to the executable is already absolute and
has an executable file extension. In addition, Cmd.Start no
longer writes the resolved extension back to the Path field, so
it is now safe to call the String method concurrently with a
call to Start.
* reflect: The Value.IsZero method will now return true for a
floating-point or complex negative zero, and will return true
for a struct value if a blank field (a field named _) somehow
has a non-zero value. These changes make IsZero consistent with
comparing a value to zero using the language == operator.
* reflect: The PtrTo function is deprecated, in favor of
PointerTo.
* reflect: The new function TypeFor returns the Type that
represents the type argument T. Previously, to get the
reflect.Type value for a type, one had to use
reflect.TypeOf((*T)(nil)).Elem(). This may now be written as
reflect.TypeFor[T]().
* runtime/metrics: Four new histogram metrics
/sched/pauses/stopping/gc:seconds,
/sched/pauses/stopping/other:seconds,
/sched/pauses/total/gc:seconds, and
/sched/pauses/total/other:seconds provide additional details
about stop-the-world pauses. The 'stopping' metrics report the
time taken from deciding to stop the world until all goroutines
are stopped. The 'total' metrics report the time taken from
deciding to stop the world until it is started again.
* runtime/metrics: The /gc/pauses:seconds metric is deprecated,
as it is equivalent to the new /sched/pauses/total/gc:seconds
metric.
* runtime/metrics: /sync/mutex/wait/total:seconds now includes
contention on runtime-internal locks in addition to sync.Mutex
and sync.RWMutex.
* runtime/pprof: Mutex profiles now scale contention by the
number of goroutines blocked on the mutex. This provides a more
accurate representation of the degree to which a mutex is a
bottleneck in a Go program. For instance, if 100 goroutines are
blocked on a mutex for 10 milliseconds, a mutex profile will
now record 1 second of delay instead of 10 milliseconds of
delay.
* runtime/pprof: Mutex profiles also now include contention on
runtime-internal locks in addition to sync.Mutex and
sync.RWMutex. Contention on runtime-internal locks is always
reported at runtime._LostContendedRuntimeLock. A future release
will add complete stack traces in these cases.
* runtime/pprof: CPU profiles on Darwin platforms now contain the
process's memory map, enabling the disassembly view in the
pprof tool.
* runtime/trace: The execution tracer has been completely
overhauled in this release, resolving several long-standing
issues and paving the way for new use-cases for execution
traces.
* runtime/trace: Execution traces now use the operating system's
clock on most platforms (Windows excluded) so it is possible to
correlate them with traces produced by lower-level
components. Execution traces no longer depend on the
reliability of the platform's clock to produce a correct
trace. Execution traces are now partitioned regularly
on-the-fly and as a result may be processed in a streamable
way. Execution traces now contain complete durations for all
system calls. Execution traces now contain information about
the operating system threads that goroutines executed on. The
latency impact of starting and stopping execution traces has
been dramatically reduced. Execution traces may now begin or
end during the garbage collection mark phase.
* runtime/trace: To allow Go developers to take advantage of
these improvements, an experimental trace reading package is
available at golang.org/x/exp/trace. Note that this package
only works on traces produced by programs built with go1.22 at
the moment. Please try out the package and provide feedback on
the corresponding proposal issue.
* runtime/trace: If you experience any issues with the new
execution tracer implementation, you may switch back to the old
implementation by building your Go program with
GOEXPERIMENT=noexectracer2. If you do, please file an issue,
otherwise this option will be removed in a future release.
* slices: The new function Concat concatenates multiple slices.
* slices: Functions that shrink the size of a slice (Delete,
DeleteFunc, Compact, CompactFunc, and Replace) now zero the
elements between the new length and the old length.
* slices: Insert now always panics if the argument i is out of
range. Previously it did not panic in this situation if there
were no elements to be inserted.
* syscall: The syscall package has been frozen since Go 1.4 and
was marked as deprecated in Go 1.11, causing many editors to
warn about any use of the package. However, some non-deprecated
functionality requires use of the syscall package, such as the
os/exec.Cmd.SysProcAttr field. To avoid unnecessary complaints
on such code, the syscall package is no longer marked as
deprecated. The package remains frozen to most new
functionality, and new code remains encouraged to use
golang.org/x/sys/unix or golang.org/x/sys/windows where
possible.
* syscall: On Linux, the new SysProcAttr.PidFD field allows
obtaining a PID FD when starting a child process via
StartProcess or os/exec.
* syscall: On Windows, passing O_SYNC to Open now causes write
operations to go directly to disk, equivalent to O_SYNC on Unix
platforms.
* testing/slogtest: The new Run function uses sub-tests to run
test cases, providing finer-grained control.
* Ports: Darwin: On macOS on 64-bit x86 architecture (the
darwin/amd64 port), the Go toolchain now generates
position-independent executables (PIE) by default. Non-PIE
binaries can be generated by specifying the -buildmode=exe
build flag. On 64-bit ARM-based macOS (the darwin/arm64 port),
the Go toolchain already generates PIE by default. go1.22 is
the last release that will run on macOS 10.15 Catalina. Go 1.23
will require macOS 11 Big Sur or later.
* Ports: Arm: The GOARM environment variable now allows you to
select whether to use software or hardware floating
point. Previously, valid GOARM values were 5, 6, or 7. Now
those same values can be optionally followed by ,softfloat or
,hardfloat to select the floating-point implementation. This
new option defaults to softfloat for version 5 and hardfloat
for versions 6 and 7.
* Ports: Loong64: The loong64 port now supports passing function
arguments and results using registers. The linux/loong64 port
now supports the address sanitizer, memory sanitizer, new-style
linker relocations, and the plugin build mode.
* OpenBSD go1.22 adds an experimental port to OpenBSD on
big-endian 64-bit PowerPC (openbsd/ppc64).
Patchnames
SUSE-2024-3938,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3938,openSUSE-SLE-15.6-2024-3938
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for go1.22-openssl", title: "Title of the patch", }, { category: "description", text: "This update for go1.22-openssl fixes the following issues:\n\nThis update ships go1.22-openssl 1.22.7.1 (jsc#SLE-18320)\n\n- Update to version 1.22.7.1 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.7-1-openssl-fips.\n\n * Update to Go 1.22.7 (#229)\n\n- go1.22.7 (released 2024-09-05) includes security fixes to the\n encoding/gob, go/build/constraint, and go/parser packages, as\n well as bug fixes to the fix command and the runtime.\n\n CVE-2024-34155 CVE-2024-34156 CVE-2024-34158:\n - go#69142 go#69138 bsc#1230252 security: fix CVE-2024-34155 go/parser: stack exhaustion in all Parse* functions (CVE-2024-34155)\n - go#69144 go#69139 bsc#1230253 security: fix CVE-2024-34156 encoding/gob: stack exhaustion in Decoder.Decode (CVE-2024-34156)\n - go#69148 go#69141 bsc#1230254 security: fix CVE-2024-34158 go/build/constraint: stack exhaustion in Parse (CVE-2024-34158)\n - go#68811 os: TestChtimes failures\n - go#68825 cmd/fix: fails to run on modules whose go directive value is in '1.n.m' format introduced in Go 1.21.0\n - go#68972 cmd/cgo: aix c-archive corrupting stack\n\n- go1.22.6 (released 2024-08-06) includes fixes to the go command,\n the compiler, the linker, the trace command, the covdata command,\n and the bytes, go/types, and os/exec packages.\n\n * go#68594 cmd/compile: internal compiler error with zero-size types\n * go#68546 cmd/trace/v2: pprof profiles always empty\n * go#68492 cmd/covdata: too many open files due to defer f.Close() in for loop\n * go#68475 bytes: IndexByte can return -4294967295 when memory usage is above 2^31 on js/wasm\n * go#68370 go/types: assertion failure in recent range statement checking logic\n * go#68331 os/exec: modifications to Path ignored when *Cmd is created using Command with an absolute path on Windows\n * go#68230 cmd/compile: inconsistent integer arithmetic result on Go 1.22+arm64 with/without -race\n * go#68222 cmd/go: list with -export and -covermode=atomic fails to build\n * go#68198 cmd/link: issues with Xcode 16 beta\n\n- Update to version 1.22.5.3 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.5-3-openssl-fips.\n\n * Only load openssl if fips == '1'\n Avoid loading openssl whenever GOLANG_FIPS is not 1.\n Previously only an unset variable would cause the library load\n to be skipped, but users may also expect to be able to set eg.\n GOLANG_FIPS=0 in environments without openssl.\n\n- Update to version 1.22.5.2 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.5-2-openssl-fips.\n\n * Only load OpenSSL when in FIPS mode\n\n- Update to version 1.22.5.1 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.5-1-openssl-fips.\n\n * Update to go1.22.5\n\n- go1.22.5 (released 2024-07-02) includes security fixes to the\n net/http package, as well as bug fixes to the compiler, cgo, the\n go command, the linker, the runtime, and the crypto/tls,\n go/types, net, net/http, and os/exec packages.\n\n CVE-2024-24791:\n * go#68200 go#67555 bsc#1227314 security: fix CVE CVE-2024-24791 net/http: expect: 100-continue handling is broken in various ways\n * go#65983 cmd/compile: hash of unhashable type\n * go#65994 crypto/tls: segfault when calling tlsrsakex.IncNonDefault()\n * go#66598 os/exec: calling Cmd.Start after setting Cmd.Path manually to absolute path without '.exe' no longer implicitly adds '.exe' in Go 1.22\n * go#67298 runtime: 'fatal: morestack on g0' on amd64 after upgrade to Go 1.21, stale bounds\n * go#67715 cmd/cgo/internal/swig,cmd/go,x/build: swig cgo tests incompatible with C++ toolchain on builders\n * go#67798 cmd/compile: internal compiler error: unexpected type: <nil> (<nil>) in for-range\n * go#67820 cmd/compile: package-level variable initialization with constant dependencies doesn't match order specified in Go spec\n * go#67850 go/internal/gccgoimporter: go building failing with gcc 14.1.0\n * go#67934 net: go DNS resolver fails to connect to local DNS server\n * go#67945 cmd/link: using -fuzz with test that links with cgo on darwin causes linker failure\n * go#68052 cmd/go: go list -u -m all fails loading module retractions: module requires go >= 1.N+1 (running go 1.N)\n * go#68122 cmd/link: runtime.mach_vm_region_trampoline: unsupported dynamic relocation for symbol libc_mach_task_self_ (type=29 (R_GOTPCREL) stype=46 (SDYNIMPORT))\n\n- Update to version 1.22.4.1 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.4-1-openssl-fips.\n\n * Update to go1.22.4\n\n- go1.22.4 (released 2024-06-04) includes security fixes to the\n archive/zip and net/netip packages, as well as bug fixes to the\n compiler, the go command, the linker, the runtime, and the os\n package.\n\n CVE-2024-24789 CVE-2024-24790:\n * go#67554 go#66869 bsc#1225973 security: fix CVE-2024-24789 archive/zip: EOCDR comment length handling is inconsistent with other ZIP implementations\n * go#67682 go#67680 bsc#1225974 security: fix CVE-2024-24790 net/netip: unexpected behavior from Is methods for IPv4-mapped IPv6 addresses\n * go#67188 runtime/metrics: /memory/classes/heap/unused:bytes spikes\n * go#67212 cmd/compile: SIGBUS unaligned access on mips64 via qemu-mips64\n * go#67236 cmd/go: mod tidy reports toolchain not available with 'go 1.21'\n * go#67258 runtime: unexpected fault address 0\n * go#67311 cmd/go: TestScript/gotoolchain_issue66175 fails on tip locally\n * go#67314 cmd/go,cmd/link: TestScript/build_issue48319 and TestScript/build_plugin_reproducible failing on LUCI gotip-darwin-amd64-longtest builder due to non-reproducible LC_UUID\n * go#67352 crypto/x509: TestPlatformVerifier failures on Windows due to broken connections\n * go#67460 cmd/compile: internal compiler error: panic with range over integer value\n * go#67527 cmd/link: panic: machorelocsect: size mismatch\n * go#67650 runtime: SIGSEGV after performing clone(CLONE_PARENT) via C constructor prior to runtime start\n * go#67696 os: RemoveAll susceptible to symlink race\n\n- Update to version 1.22.3.3 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.3-3-openssl-fips.\n\n * config: update openssl backend (#201)\n\n- Update to version 1.22.3.2 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.3-2-openssl-fips.\n\n * patches: restore signature of HashSign/HashVerify (#199)\n\n- Update to version 1.22.3.1 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.3-1-openssl-fips.\n\n * Update to go1.22.3\n * fix: rename patch file\n * Backport change https://go-review.googlesource.com/c/go/+/554615 to Go1.22 (#193)\n runtime: crash asap and extend total sleep time for slow machine in test\n Running with few threads usually does not need 500ms to crash, so let it\n crash as soon as possible. While the test may caused more time on slow\n machine, try to expand the sleep time in test.\n * cmd/go: re-enable CGO for Go toolchain commands (#190)\n * crypto/ecdsa: Restore HashSign and HashVerify (#189)\n\n- go1.22.3 (released 2024-05-07) includes security fixes to the go\n command and the net package, as well as bug fixes to the\n compiler, the runtime, and the net/http package.\n\n CVE-2024-24787 CVE-2024-24788:\n * go#67122 go#67119 bsc#1224017 security: fix CVE-2024-24787 cmd/go: arbitrary code execution during build on darwin\n * go#67040 go#66754 bsc#1224018 security: fix CVE-2024-24788 net: high cpu usage in extractExtendedRCode\n * go#67018 cmd/compile: Go 1.22.x failed to be bootstrapped from 386 to ppc64le\n * go#67017 cmd/compile: changing a hot concrete method to interface method triggers a PGO ICE\n * go#66886 runtime: deterministic fallback hashes across process boundary\n * go#66698 net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0\n\n- Update to version 1.22.2.1 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.2-1-openssl-fips.\n\n * Update to go1.22.2\n\n- go1.22.2 (released 2024-04-03) includes a security fix to the\n net/http package, as well as bug fixes to the compiler, the go\n command, the linker, and the encoding/gob, go/types, net/http,\n and runtime/trace packages.\n\n CVE-2023-45288:\n * go#66298 go#65051 bsc#1221400 security: fix CVE-2023-45288 net/http, x/net/http2: close connections when receiving too many headers\n * go#65858 cmd/compile: unreachable panic with GODEBUG=gotypesalias=1\n * go#66060 cmd/link: RISC-V external link, failed to find text symbol for HI20 relocation\n * go#66076 cmd/compile: out-of-bounds panic with uint32 conversion and modulus operation in Go 1.22.0 on arm64\n * go#66134 cmd/compile: go test . results in CLOSURE ... <unknown line number>: internal compiler error: assertion failed\n * go#66137 cmd/go: go 1.22.0: go test throws errors when processing folders not listed in coverpkg argument\n * go#66178 cmd/compile: ICE: panic: interface conversion: ir.Node is *ir.ConvExpr, not *ir.IndexExpr\n * go#66201 runtime/trace: v2 traces contain an incorrect timestamp scaling factor on Windows\n * go#66255 net/http: http2 round tripper nil pointer dereference causes panic causing deadlock\n * go#66256 cmd/go: git shallow fetches broken at CL 556358\n * go#66273 crypto/x509: Certificate no longer encodable using encoding/gob in Go1.22\n * go#66412 cmd/link: bad carrier sym for symbol runtime.elf_savegpr0.args_stackmap on ppc64le\n\n- Update to version 1.22.1.2 cut from the go1.22-fips-release\n branch at the revision tagged go1.22.1-2-openssl-fips.\n\n * config: Update openssl v2 module (#178)\n\n- Remove subpackage go1.x-openssl-libstd for compiled shared object\n libstd.so.\n\n * Continue to build experimental libstd only on go1.x Tumbleweed.\n * Removal fixes build errors on go1.x-openssl Factory and ALP.\n * Use of libstd.so is experimental and not recommended for\n general use, Go currently has no ABI.\n * Feature go build -buildmode=shared is deprecated by upstream,\n but not yet removed.\n\n- Initial package go1.22-openssl version 1.22.1.1 cut from the\n go1.22-fips-release branch at the revision tagged\n go1.22.1-1-openssl-fips.\n\n * Go upstream merged branch dev.boringcrypto in go1.19+.\n * In go1.x enable BoringCrypto via GOEXPERIMENT=boringcrypto.\n * In go1.x-openssl enable FIPS mode (or boring mode as the\n package is named) either via an environment variable\n GOLANG_FIPS=1 or by virtue of booting the host in FIPS mode.\n * When the operating system is operating in FIPS mode, Go\n applications which import crypto/tls/fipsonly limit operations\n to the FIPS ciphersuite.\n * go1.x-openssl is delivered as two large patches to go1.x\n applying necessary modifications from the golang-fips/go GitHub\n project for the Go crypto library to use OpenSSL as the\n external cryptographic library in a FIPS compliant way.\n * go1.x-openssl modifies the crypto/* packages to use OpenSSL for\n cryptographic operations.\n * go1.x-openssl uses dlopen() to call into OpenSSL.\n * SUSE RPM packaging introduces a fourth version digit go1.x.y.z\n corresponding to the golang-fips/go patchset tagged revision.\n * Patchset improvements can be updated independently of upstream\n Go maintenance releases.\n\n- go1.22.1 (released 2024-03-05) includes security fixes to the\n crypto/x509, html/template, net/http, net/http/cookiejar, and\n net/mail packages, as well as bug fixes to the compiler, the go\n command, the runtime, the trace command, and the go/types and\n net/http packages.\n\n CVE-2023-45289 CVE-2023-45290 CVE-2024-24783 CVE-2024-24784 CVE-2024-24785:\n * go#65831 go#65390 bsc#1220999 security: fix CVE-2024-24783 crypto/x509: Verify panics on certificates with an unknown public key algorithm\n * go#65849 go#65083 bsc#1221002 security: fix CVE-2024-24784 net/mail: comments in display names are incorrectly handled\n * go#65850 go#65383 bsc#1221001 security: fix CVE-2023-45290 net/http: memory exhaustion in Request.ParseMultipartForm\n * go#65859 go#65065 bsc#1221000 security: fix CVE-2023-45289 net/http, net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect\n * go#65969 go#65697 bsc#1221003 security: fix CVE-2024-24785 html/template: errors returned from MarshalJSON methods may break template escaping\n * go#65352 cmd/go: go generate fails silently when run on a package in a nested workspace module\n * go#65471 internal/testenv: TestHasGoBuild failures on the LUCI noopt builders\n * go#65474 internal/testenv: support LUCI mobile builders in testenv tests\n * go#65577 cmd/trace/v2: goroutine analysis page doesn't identify goroutines consistently\n * go#65618 cmd/compile: Go 1.22 build fails with 1.21 PGO profile on internal/saferio change\n * go#65619 cmd/compile: Go 1.22 changes support for modules that declare go 1.0\n * go#65641 cmd/cgo/internal/testsanitizers,x/build: LUCI clang15 builders failing\n * go#65644 runtime: crash in race detector when execution tracer reads from CPU profile buffer\n * go#65728 go/types: nil pointer dereference in Alias.Underlying()\n * go#65759 net/http: context cancellation can leave HTTP client with deadlocked HTTP/1.1 connections in Go1.22\n * go#65760 runtime: Go 1.22.0 fails to build from source on armv7 Alpine Linux\n * go#65818 runtime: go1.22.0 test with -race will SIGSEGV or SIGBUS or Bad Pointer\n * go#65852 cmd/go: 'missing ziphash' error with go.work\n * go#65883 runtime: scheduler sometimes starves a runnable goroutine on wasm platforms\n\n * bsc#1219988 ensure VERSION file is present in GOROOT\n as required by go tool dist and go tool distpack\n\n- go1.22 (released 2024-02-06) is a major release of Go.\n go1.22.x minor releases will be provided through February 2024.\n https://github.com/golang/go/wiki/Go-Release-Cycle\n go1.22 arrives six months after go1.21. Most of its changes are\n in the implementation of the toolchain, runtime, and libraries.\n As always, the release maintains the Go 1 promise of\n compatibility. We expect almost all Go programs to continue to\n compile and run as before.\n\n * Language change: go1.22 makes two changes to for loops.\n Previously, the variables declared by a for loop were created\n once and updated by each iteration. In go1.22, each iteration\n of the loop creates new variables, to avoid accidental sharing\n bugs. The transition support tooling described in the proposal\n continues to work in the same way it did in Go 1.21.\n * Language change: For loops may now range over integers\n * Language change: go1.22 includes a preview of a language change\n we are considering for a future version of Go:\n range-over-function iterators. Building with\n GOEXPERIMENT=rangefunc enables this feature.\n * go command: Commands in workspaces can now use a vendor\n directory containing the dependencies of the workspace. The\n directory is created by go work vendor, and used by build\n commands when the -mod flag is set to vendor, which is the\n default when a workspace vendor directory is present. Note\n that the vendor directory's contents for a workspace are\n different from those of a single module: if the directory at\n the root of a workspace also contains one of the modules in the\n workspace, its vendor directory can contain the dependencies of\n either the workspace or of the module, but not both.\n * go get is no longer supported outside of a module in the legacy\n GOPATH mode (that is, with GO111MODULE=off). Other build\n commands, such as go build and go test, will continue to work\n indefinitely for legacy GOPATH programs.\n * go mod init no longer attempts to import module requirements\n from configuration files for other vendoring tools (such as\n Gopkg.lock).\n * go test -cover now prints coverage summaries for covered\n packages that do not have their own test files. Prior to Go\n 1.22 a go test -cover run for such a package would report: ?\n mymod/mypack [no test files] and now with go1.22, functions in\n the package are treated as uncovered: mymod/mypack coverage:\n 0.0% of statements Note that if a package contains no\n executable code at all, we can't report a meaningful coverage\n percentage; for such packages the go tool will continue to\n report that there are no test files.\n * trace: The trace tool's web UI has been gently refreshed as\n part of the work to support the new tracer, resolving several\n issues and improving the readability of various sub-pages. The\n web UI now supports exploring traces in a thread-oriented\n view. The trace viewer also now displays the full duration of\n all system calls. These improvements only apply for viewing\n traces produced by programs built with go1.22 or newer. A\n future release will bring some of these improvements to traces\n produced by older version of Go.\n * vet: References to loop variables The behavior of the vet tool\n has changed to match the new semantics (see above) of loop\n variables in go1.22. When analyzing a file that requires go1.22\n or newer (due to its go.mod file or a per-file build\n constraint), vetcode> no longer reports references to loop\n variables from within a function literal that might outlive the\n iteration of the loop. In Go 1.22, loop variables are created\n anew for each iteration, so such references are no longer at\n risk of using a variable after it has been updated by the loop.\n * vet: New warnings for missing values after append The vet tool\n now reports calls to append that pass no values to be appended\n to the slice, such as slice = append(slice). Such a statement\n has no effect, and experience has shown that is nearly always a\n mistake.\n * vet: New warnings for deferring time.Since The vet tool now\n reports a non-deferred call to time.Since(t) within a defer\n statement. This is equivalent to calling time.Now().Sub(t)\n before the defer statement, not when the deferred function is\n called. In nearly all cases, the correct code requires\n deferring the time.Since call.\n * vet: New warnings for mismatched key-value pairs in log/slog\n calls The vet tool now reports invalid arguments in calls to\n functions and methods in the structured logging package,\n log/slog, that accept alternating key/value pairs. It reports\n calls where an argument in a key position is neither a string\n nor a slog.Attr, and where a final key is missing its value.\n * runtime: The runtime now keeps type-based garbage collection\n metadata nearer to each heap object, improving the CPU\n performance (latency or throughput) of Go programs by\n 1-3%. This change also reduces the memory overhead of the\n majority Go programs by approximately 1% by deduplicating\n redundant metadata. Some programs may see a smaller improvement\n because this change adjusts the size class boundaries of the\n memory allocator, so some objects may be moved up a size class.\n A consequence of this change is that some objects' addresses\n that were previously always aligned to a 16 byte (or higher)\n boundary will now only be aligned to an 8 byte boundary. Some\n programs that use assembly instructions that require memory\n addresses to be more than 8-byte aligned and rely on the memory\n allocator's previous alignment behavior may break, but we\n expect such programs to be rare. Such programs may be built\n with GOEXPERIMENT=noallocheaders to revert to the old metadata\n layout and restore the previous alignment behavior, but package\n owners should update their assembly code to avoid the alignment\n assumption, as this workaround will be removed in a future\n release.\n * runtime: On the windows/amd64 port, programs linking or loading\n Go libraries built with -buildmode=c-archive or\n -buildmode=c-shared can now use the SetUnhandledExceptionFilter\n Win32 function to catch exceptions not handled by the Go\n runtime. Note that this was already supported on the\n windows/386 port.\n * compiler: Profile-guided Optimization (PGO) builds can now\n devirtualize a higher proportion of calls than previously\n possible. Most programs from a representative set of Go\n programs now see between 2 and 14% improvement from enabling\n PGO.\n * compiler: The compiler now interleaves devirtualization and\n inlining, so interface method calls are better optimized.\n * compiler: go1.22 also includes a preview of an enhanced\n implementation of the compiler's inlining phase that uses\n heuristics to boost inlinability at call sites deemed\n 'important' (for example, in loops) and discourage inlining at\n call sites deemed 'unimportant' (for example, on panic\n paths). Building with GOEXPERIMENT=newinliner enables the new\n call-site heuristics; see issue #61502 for more info and to\n provide feedback.\n * linker: The linker's -s and -w flags are now behave more\n consistently across all platforms. The -w flag suppresses DWARF\n debug information generation. The -s flag suppresses symbol\n table generation. The -s flag also implies the -w flag, which\n can be negated with -w=0. That is, -s -w=0 will generate a\n binary with DWARF debug information generation but without the\n symbol table.\n * linker: On ELF platforms, the -B linker flag now accepts a\n special form: with -B gobuildid, the linker will generate a GNU\n build ID (the ELF NT_GNU_BUILD_ID note) derived from the Go\n build ID.\n * linker: On Windows, when building with -linkmode=internal, the\n linker now preserves SEH information from C object files by\n copying the .pdata and .xdata sections into the final\n binary. This helps with debugging and profiling binaries using\n native tools, such as WinDbg. Note that until now, C functions'\n SEH exception handlers were not being honored, so this change\n may cause some programs to behave differently.\n -linkmode=external is not affected by this change, as external\n linkers already preserve SEH information.\n * bootstrap: As mentioned in the Go 1.20 release notes, go1.22\n now requires the final point release of Go 1.20 or later for\n bootstrap. We expect that Go 1.24 will require the final point\n release of go1.22 or later for bootstrap.\n * core library: New math/rand/v2 package: go1.22 includes the\n first “v2” package in the standard library, math/rand/v2. The\n changes compared to math/rand are detailed in proposal\n go#61716. The most important changes are:\n - The Read method, deprecated in math/rand, was not carried\n forward for math/rand/v2. (It remains available in\n math/rand.) The vast majority of calls to Read should use\n crypto/rand’s Read instead. Otherwise a custom Read can be\n constructed using the Uint64 method.\n - The global generator accessed by top-level functions is\n unconditionally randomly seeded. Because the API guarantees\n no fixed sequence of results, optimizations like per-thread\n random generator states are now possible.\n - The Source interface now has a single Uint64 method; there is\n no Source64 interface.\n - Many methods now use faster algorithms that were not possible\n to adopt in math/rand because they changed the output\n streams.\n - The Intn, Int31, Int31n, Int63, and Int64n top-level\n functions and methods from math/rand are spelled more\n idiomatically in math/rand/v2: IntN, Int32, Int32N, Int64,\n and Int64N. There are also new top-level functions and\n methods Uint32, Uint32N, Uint64, Uint64N, Uint, and UintN.\n - The new generic function N is like Int64N or Uint64N but\n works for any integer type. For example a random duration\n from 0 up to 5 minutes is rand.N(5*time.Minute).\n - The Mitchell & Reeds LFSR generator provided by math/rand’s\n Source has been replaced by two more modern pseudo-random\n generator sources: ChaCha8 PCG. ChaCha8 is a new,\n cryptographically strong random number generator roughly\n similar to PCG in efficiency. ChaCha8 is the algorithm used\n for the top-level functions in math/rand/v2. As of go1.22,\n math/rand's top-level functions (when not explicitly seeded)\n and the Go runtime also use ChaCha8 for randomness.\n - We plan to include an API migration tool in a future release,\n likely Go 1.23.\n * core library: New go/version package: The new go/version\n package implements functions for validating and comparing Go\n version strings.\n * core library: Enhanced routing patterns: HTTP routing in the\n standard library is now more expressive. The patterns used by\n net/http.ServeMux have been enhanced to accept methods and\n wildcards. This change breaks backwards compatibility in small\n ways, some obvious—patterns with '{' and '}' behave\n differently— and some less so—treatment of escaped paths has\n been improved. The change is controlled by a GODEBUG field\n named httpmuxgo121. Set httpmuxgo121=1 to restore the old\n behavior.\n * Minor changes to the library As always, there are various minor\n changes and updates to the library, made with the Go 1 promise\n of compatibility in mind. There are also various performance\n improvements, not enumerated here.\n * archive/tar: The new method Writer.AddFS adds all of the files\n from an fs.FS to the archive.\n * archive/zip: The new method Writer.AddFS adds all of the files\n from an fs.FS to the archive.\n * bufio: When a SplitFunc returns ErrFinalToken with a nil token,\n Scanner will now stop immediately. Previously, it would report\n a final empty token before stopping, which was usually not\n desired. Callers that do want to report a final empty token can\n do so by returning []byte{} rather than nil.\n * cmp: The new function Or returns the first in a sequence of\n values that is not the zero value.\n * crypto/tls: ConnectionState.ExportKeyingMaterial will now\n return an error unless TLS 1.3 is in use, or the\n extended_master_secret extension is supported by both the\n server and client. crypto/tls has supported this extension\n since Go 1.20. This can be disabled with the tlsunsafeekm=1\n GODEBUG setting.\n * crypto/tls: By default, the minimum version offered by\n crypto/tls servers is now TLS 1.2 if not specified with\n config.MinimumVersion, matching the behavior of crypto/tls\n clients. This change can be reverted with the tls10server=1\n GODEBUG setting.\n * crypto/tls: By default, cipher suites without ECDHE support are\n no longer offered by either clients or servers during pre-TLS\n 1.3 handshakes. This change can be reverted with the\n tlsrsakex=1 GODEBUG setting.\n * crypto/x509: The new CertPool.AddCertWithConstraint method can\n be used to add customized constraints to root certificates to\n be applied during chain building.\n * crypto/x509: On Android, root certificates will now be loaded\n from /data/misc/keychain/certs-added as well as\n /system/etc/security/cacerts.\n * crypto/x509: A new type, OID, supports ASN.1 Object Identifiers\n with individual components larger than 31 bits. A new field\n which uses this type, Policies, is added to the Certificate\n struct, and is now populated during parsing. Any OIDs which\n cannot be represented using a asn1.ObjectIdentifier will appear\n in Policies, but not in the old PolicyIdentifiers field. When\n calling CreateCertificate, the Policies field is ignored, and\n policies are taken from the PolicyIdentifiers field. Using the\n x509usepolicies=1 GODEBUG setting inverts this, populating\n certificate policies from the Policies field, and ignoring the\n PolicyIdentifiers field. We may change the default value of\n x509usepolicies in Go 1.23, making Policies the default field\n for marshaling.\n * database/sql: The new Null[T] type provide a way to scan\n nullable columns for any column types.\n * debug/elf: Constant R_MIPS_PC32 is defined for use with MIPS64\n systems. Additional R_LARCH_* constants are defined for use\n with LoongArch systems.\n * encoding: The new methods AppendEncode and AppendDecode added\n to each of the Encoding types in the packages encoding/base32,\n encoding/base64, and encoding/hex simplify encoding and\n decoding from and to byte slices by taking care of byte slice\n buffer management.\n * encoding: The methods base32.Encoding.WithPadding and\n base64.Encoding.WithPadding now panic if the padding argument\n is a negative value other than NoPadding.\n * encoding/json: Marshaling and encoding functionality now\n escapes '\\b' and '\\f' characters as \\b and \\f instead of \\u0008\n and \\u000c.\n * go/ast: The following declarations related to syntactic\n identifier resolution are now deprecated: Ident.Obj, Object,\n Scope, File.Scope, File.Unresolved, Importer, Package,\n NewPackage. In general, identifiers cannot be accurately\n resolved without type information. Consider, for example, the\n identifier K in T{K: ''}: it could be the name of a local\n variable if T is a map type, or the name of a field if T is a\n struct type. New programs should use the go/types package to\n resolve identifiers; see Object, Info.Uses, and Info.Defs for\n details.\n * go/ast: The new ast.Unparen function removes any enclosing\n parentheses from an expression.\n * go/types: The new Alias type represents type\n aliases. Previously, type aliases were not represented\n explicitly, so a reference to a type alias was equivalent to\n spelling out the aliased type, and the name of the alias was\n lost. The new representation retains the intermediate\n Alias. This enables improved error reporting (the name of a\n type alias can be reported), and allows for better handling of\n cyclic type declarations involving type aliases. In a future\n release, Alias types will also carry type parameter\n information. The new function Unalias returns the actual type\n denoted by an Alias type (or any other Type for that matter).\n * go/types: Because Alias types may break existing type switches\n that do not know to check for them, this functionality is\n controlled by a GODEBUG field named gotypesalias. With\n gotypesalias=0, everything behaves as before, and Alias types\n are never created. With gotypesalias=1, Alias types are created\n and clients must expect them. The default is gotypesalias=0. In\n a future release, the default will be changed to\n gotypesalias=1. Clients of go/types are urged to adjust their\n code as soon as possible to work with gotypesalias=1 to\n eliminate problems early.\n * go/types: The Info struct now exports the FileVersions map\n which provides per-file Go version information.\n * go/types: The new helper method PkgNameOf returns the local\n package name for the given import declaration.\n * go/types: The implementation of SizesFor has been adjusted to\n compute the same type sizes as the compiler when the compiler\n argument for SizesFor is 'gc'. The default Sizes implementation\n used by the type checker is now types.SizesFor('gc', 'amd64').\n * go/types: The start position (Pos) of the lexical environment\n block (Scope) that represents a function body has changed: it\n used to start at the opening curly brace of the function body,\n but now starts at the function's func token.\n * html/template: Javascript template literals may now contain Go\n template actions, and parsing a template containing one will no\n longer return ErrJSTemplate. Similarly the GODEBUG setting\n jstmpllitinterp no longer has any effect.\n * io: The new SectionReader.Outer method returns the ReaderAt,\n offset, and size passed to NewSectionReader.\n * log/slog: The new SetLogLoggerLevel function controls the level\n for the bridge between the `slog` and `log` packages. It sets\n the minimum level for calls to the top-level `slog` logging\n functions, and it sets the level for calls to `log.Logger` that\n go through `slog`.\n * math/big: The new method Rat.FloatPrec computes the number of\n fractional decimal digits required to represent a rational\n number accurately as a floating-point number, and whether\n accurate decimal representation is possible in the first place.\n * net: When io.Copy copies from a TCPConn to a UnixConn, it will\n now use Linux's splice(2) system call if possible, using the\n new method TCPConn.WriteTo.\n * net: The Go DNS Resolver, used when building with\n '-tags=netgo', now searches for a matching name in the Windows\n hosts file, located at %SystemRoot%\\System32\\drivers\\etc\\hosts,\n before making a DNS query.\n * net/http: The new functions ServeFileFS, FileServerFS, and\n NewFileTransportFS are versions of the existing ServeFile,\n FileServer, and NewFileTransport, operating on an fs.FS.\n * net/http: The HTTP server and client now reject requests and\n responses containing an invalid empty Content-Length\n header. The previous behavior may be restored by setting\n GODEBUG field httplaxcontentlength=1.\n * net/http: The new method Request.PathValue returns path\n wildcard values from a request and the new method\n Request.SetPathValue sets path wildcard values on a request.\n * net/http/cgi: When executing a CGI process, the PATH_INFO\n variable is now always set to the empty string or a value\n starting with a / character, as required by RFC 3875. It was\n previously possible for some combinations of Handler.Root and\n request URL to violate this requirement.\n * net/netip: The new AddrPort.Compare method compares two\n AddrPorts.\n * os: On Windows, the Stat function now follows all reparse\n points that link to another named entity in the system. It was\n previously only following IO_REPARSE_TAG_SYMLINK and\n IO_REPARSE_TAG_MOUNT_POINT reparse points.\n * os: On Windows, passing O_SYNC to OpenFile now causes write\n operations to go directly to disk, equivalent to O_SYNC on Unix\n platforms.\n * os: On Windows, the ReadDir, File.ReadDir, File.Readdir, and\n File.Readdirnames functions now read directory entries in\n batches to reduce the number of system calls, improving\n performance up to 30%.\n * os: When io.Copy copies from a File to a net.UnixConn, it will\n now use Linux's sendfile(2) system call if possible, using the\n new method File.WriteTo.\n * os/exec: On Windows, LookPath now ignores empty entries\n in %PATH%, and returns ErrNotFound (instead of ErrNotExist)\n if no executable file extension is found to resolve an\n otherwise-unambiguous name.\n * os/exec: On Windows, Command and Cmd.Start no longer call\n LookPath if the path to the executable is already absolute and\n has an executable file extension. In addition, Cmd.Start no\n longer writes the resolved extension back to the Path field, so\n it is now safe to call the String method concurrently with a\n call to Start.\n * reflect: The Value.IsZero method will now return true for a\n floating-point or complex negative zero, and will return true\n for a struct value if a blank field (a field named _) somehow\n has a non-zero value. These changes make IsZero consistent with\n comparing a value to zero using the language == operator.\n * reflect: The PtrTo function is deprecated, in favor of\n PointerTo.\n * reflect: The new function TypeFor returns the Type that\n represents the type argument T. Previously, to get the\n reflect.Type value for a type, one had to use\n reflect.TypeOf((*T)(nil)).Elem(). This may now be written as\n reflect.TypeFor[T]().\n * runtime/metrics: Four new histogram metrics\n /sched/pauses/stopping/gc:seconds,\n /sched/pauses/stopping/other:seconds,\n /sched/pauses/total/gc:seconds, and\n /sched/pauses/total/other:seconds provide additional details\n about stop-the-world pauses. The 'stopping' metrics report the\n time taken from deciding to stop the world until all goroutines\n are stopped. The 'total' metrics report the time taken from\n deciding to stop the world until it is started again.\n * runtime/metrics: The /gc/pauses:seconds metric is deprecated,\n as it is equivalent to the new /sched/pauses/total/gc:seconds\n metric.\n * runtime/metrics: /sync/mutex/wait/total:seconds now includes\n contention on runtime-internal locks in addition to sync.Mutex\n and sync.RWMutex.\n * runtime/pprof: Mutex profiles now scale contention by the\n number of goroutines blocked on the mutex. This provides a more\n accurate representation of the degree to which a mutex is a\n bottleneck in a Go program. For instance, if 100 goroutines are\n blocked on a mutex for 10 milliseconds, a mutex profile will\n now record 1 second of delay instead of 10 milliseconds of\n delay.\n * runtime/pprof: Mutex profiles also now include contention on\n runtime-internal locks in addition to sync.Mutex and\n sync.RWMutex. Contention on runtime-internal locks is always\n reported at runtime._LostContendedRuntimeLock. A future release\n will add complete stack traces in these cases.\n * runtime/pprof: CPU profiles on Darwin platforms now contain the\n process's memory map, enabling the disassembly view in the\n pprof tool.\n * runtime/trace: The execution tracer has been completely\n overhauled in this release, resolving several long-standing\n issues and paving the way for new use-cases for execution\n traces.\n * runtime/trace: Execution traces now use the operating system's\n clock on most platforms (Windows excluded) so it is possible to\n correlate them with traces produced by lower-level\n components. Execution traces no longer depend on the\n reliability of the platform's clock to produce a correct\n trace. Execution traces are now partitioned regularly\n on-the-fly and as a result may be processed in a streamable\n way. Execution traces now contain complete durations for all\n system calls. Execution traces now contain information about\n the operating system threads that goroutines executed on. The\n latency impact of starting and stopping execution traces has\n been dramatically reduced. Execution traces may now begin or\n end during the garbage collection mark phase.\n * runtime/trace: To allow Go developers to take advantage of\n these improvements, an experimental trace reading package is\n available at golang.org/x/exp/trace. Note that this package\n only works on traces produced by programs built with go1.22 at\n the moment. Please try out the package and provide feedback on\n the corresponding proposal issue.\n * runtime/trace: If you experience any issues with the new\n execution tracer implementation, you may switch back to the old\n implementation by building your Go program with\n GOEXPERIMENT=noexectracer2. If you do, please file an issue,\n otherwise this option will be removed in a future release.\n * slices: The new function Concat concatenates multiple slices.\n * slices: Functions that shrink the size of a slice (Delete,\n DeleteFunc, Compact, CompactFunc, and Replace) now zero the\n elements between the new length and the old length.\n * slices: Insert now always panics if the argument i is out of\n range. Previously it did not panic in this situation if there\n were no elements to be inserted.\n * syscall: The syscall package has been frozen since Go 1.4 and\n was marked as deprecated in Go 1.11, causing many editors to\n warn about any use of the package. However, some non-deprecated\n functionality requires use of the syscall package, such as the\n os/exec.Cmd.SysProcAttr field. To avoid unnecessary complaints\n on such code, the syscall package is no longer marked as\n deprecated. The package remains frozen to most new\n functionality, and new code remains encouraged to use\n golang.org/x/sys/unix or golang.org/x/sys/windows where\n possible.\n * syscall: On Linux, the new SysProcAttr.PidFD field allows\n obtaining a PID FD when starting a child process via\n StartProcess or os/exec.\n * syscall: On Windows, passing O_SYNC to Open now causes write\n operations to go directly to disk, equivalent to O_SYNC on Unix\n platforms.\n * testing/slogtest: The new Run function uses sub-tests to run\n test cases, providing finer-grained control.\n * Ports: Darwin: On macOS on 64-bit x86 architecture (the\n darwin/amd64 port), the Go toolchain now generates\n position-independent executables (PIE) by default. Non-PIE\n binaries can be generated by specifying the -buildmode=exe\n build flag. On 64-bit ARM-based macOS (the darwin/arm64 port),\n the Go toolchain already generates PIE by default. go1.22 is\n the last release that will run on macOS 10.15 Catalina. Go 1.23\n will require macOS 11 Big Sur or later.\n * Ports: Arm: The GOARM environment variable now allows you to\n select whether to use software or hardware floating\n point. Previously, valid GOARM values were 5, 6, or 7. Now\n those same values can be optionally followed by ,softfloat or\n ,hardfloat to select the floating-point implementation. This\n new option defaults to softfloat for version 5 and hardfloat\n for versions 6 and 7.\n * Ports: Loong64: The loong64 port now supports passing function\n arguments and results using registers. The linux/loong64 port\n now supports the address sanitizer, memory sanitizer, new-style\n linker relocations, and the plugin build mode.\n * OpenBSD go1.22 adds an experimental port to OpenBSD on\n big-endian 64-bit PowerPC (openbsd/ppc64).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-3938,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3938,openSUSE-SLE-15.6-2024-3938", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3938-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:3938-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20243938-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:3938-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html", }, { category: "self", summary: "SUSE Bug 1218424", url: "https://bugzilla.suse.com/1218424", }, { category: "self", summary: "SUSE Bug 1219988", url: "https://bugzilla.suse.com/1219988", }, { category: "self", summary: "SUSE Bug 1220999", url: "https://bugzilla.suse.com/1220999", }, { category: "self", summary: "SUSE Bug 1221000", url: "https://bugzilla.suse.com/1221000", }, { category: "self", summary: "SUSE Bug 1221001", url: "https://bugzilla.suse.com/1221001", }, { category: "self", summary: "SUSE Bug 1221002", url: "https://bugzilla.suse.com/1221002", }, { category: "self", summary: "SUSE Bug 1221003", url: "https://bugzilla.suse.com/1221003", }, { category: "self", summary: "SUSE Bug 1221400", url: "https://bugzilla.suse.com/1221400", }, { category: "self", summary: "SUSE Bug 1224017", url: "https://bugzilla.suse.com/1224017", }, { category: "self", summary: "SUSE Bug 1224018", url: "https://bugzilla.suse.com/1224018", }, { category: "self", summary: "SUSE Bug 1225973", url: "https://bugzilla.suse.com/1225973", }, { category: "self", summary: "SUSE Bug 1225974", url: "https://bugzilla.suse.com/1225974", }, { category: "self", summary: "SUSE Bug 1227314", url: "https://bugzilla.suse.com/1227314", }, { category: "self", summary: "SUSE Bug 1230252", url: "https://bugzilla.suse.com/1230252", }, { category: "self", summary: "SUSE Bug 1230253", url: "https://bugzilla.suse.com/1230253", }, { category: "self", summary: "SUSE Bug 1230254", url: "https://bugzilla.suse.com/1230254", }, { category: "self", summary: "SUSE CVE CVE-2023-45288 page", url: "https://www.suse.com/security/cve/CVE-2023-45288/", }, { category: "self", summary: "SUSE CVE CVE-2023-45289 page", url: "https://www.suse.com/security/cve/CVE-2023-45289/", }, { category: "self", summary: "SUSE CVE CVE-2023-45290 page", url: "https://www.suse.com/security/cve/CVE-2023-45290/", }, { category: "self", summary: "SUSE CVE CVE-2024-24783 page", url: "https://www.suse.com/security/cve/CVE-2024-24783/", }, { category: "self", summary: "SUSE CVE CVE-2024-24784 page", url: "https://www.suse.com/security/cve/CVE-2024-24784/", }, { category: "self", summary: "SUSE CVE CVE-2024-24785 page", url: "https://www.suse.com/security/cve/CVE-2024-24785/", }, { category: "self", summary: "SUSE CVE CVE-2024-24787 page", url: "https://www.suse.com/security/cve/CVE-2024-24787/", }, { category: "self", summary: "SUSE CVE CVE-2024-24788 page", url: "https://www.suse.com/security/cve/CVE-2024-24788/", }, { category: "self", summary: "SUSE CVE CVE-2024-24789 page", url: "https://www.suse.com/security/cve/CVE-2024-24789/", }, { category: "self", summary: "SUSE CVE CVE-2024-24790 page", url: "https://www.suse.com/security/cve/CVE-2024-24790/", }, { category: "self", summary: "SUSE CVE CVE-2024-24791 page", url: "https://www.suse.com/security/cve/CVE-2024-24791/", }, { category: "self", summary: "SUSE CVE CVE-2024-34155 page", url: "https://www.suse.com/security/cve/CVE-2024-34155/", }, { category: "self", summary: "SUSE CVE CVE-2024-34156 page", url: "https://www.suse.com/security/cve/CVE-2024-34156/", }, { category: "self", summary: "SUSE CVE CVE-2024-34158 page", url: "https://www.suse.com/security/cve/CVE-2024-34158/", }, ], title: "Security update for go1.22-openssl", tracking: { current_release_date: "2024-11-07T10:08:23Z", generator: { date: "2024-11-07T10:08:23Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:3938-1", initial_release_date: "2024-11-07T10:08:23Z", revision_history: [ { date: "2024-11-07T10:08:23Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", product: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", product_id: "go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", }, }, { category: "product_version", name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", product: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", product_id: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", }, }, { category: "product_version", name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", product: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", product_id: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "go1.22-openssl-1.22.7.1-150600.13.3.1.i586", product: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.i586", product_id: "go1.22-openssl-1.22.7.1-150600.13.3.1.i586", }, }, { category: "product_version", name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.i586", product: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.i586", product_id: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", product: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", product_id: "go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", }, }, { category: "product_version", name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", product: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", product_id: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", }, }, { category: "product_version", name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", product: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", product_id: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", product: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", product_id: "go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", }, }, { category: "product_version", name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", product: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", product_id: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", }, }, { category: "product_version", name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", product: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", product_id: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", product: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", product_id: "go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", }, }, { category: "product_version", name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", product: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", product_id: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", }, }, { category: "product_version", name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", product: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", product_id: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP6", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp6", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", }, product_reference: "go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", }, product_reference: "go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", }, product_reference: "go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", }, product_reference: "go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", }, product_reference: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", }, product_reference: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", }, product_reference: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", }, product_reference: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", }, product_reference: "go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", }, product_reference: "go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", }, product_reference: "go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", }, product_reference: "go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", }, product_reference: "go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", }, product_reference: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", }, product_reference: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", }, product_reference: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64 as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", }, product_reference: "go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2023-45288", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45288", }, ], notes: [ { category: "general", text: "An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45288", url: "https://www.suse.com/security/cve/CVE-2023-45288", }, { category: "external", summary: "SUSE Bug 1221400 for CVE-2023-45288", url: "https://bugzilla.suse.com/1221400", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "moderate", }, ], title: "CVE-2023-45288", }, { cve: "CVE-2023-45289", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45289", }, ], notes: [ { category: "general", text: "When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45289", url: "https://www.suse.com/security/cve/CVE-2023-45289", }, { category: "external", summary: "SUSE Bug 1221000 for CVE-2023-45289", url: "https://bugzilla.suse.com/1221000", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "important", }, ], title: "CVE-2023-45289", }, { cve: "CVE-2023-45290", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45290", }, ], notes: [ { category: "general", text: "When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45290", url: "https://www.suse.com/security/cve/CVE-2023-45290", }, { category: "external", summary: "SUSE Bug 1221001 for CVE-2023-45290", url: "https://bugzilla.suse.com/1221001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "important", }, ], title: "CVE-2023-45290", }, { cve: "CVE-2024-24783", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24783", }, ], notes: [ { category: "general", text: "Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24783", url: "https://www.suse.com/security/cve/CVE-2024-24783", }, { category: "external", summary: "SUSE Bug 1220999 for CVE-2024-24783", url: "https://bugzilla.suse.com/1220999", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "important", }, ], title: "CVE-2024-24783", }, { cve: "CVE-2024-24784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24784", }, ], notes: [ { category: "general", text: "The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24784", url: "https://www.suse.com/security/cve/CVE-2024-24784", }, { category: "external", summary: "SUSE Bug 1221002 for CVE-2024-24784", url: "https://bugzilla.suse.com/1221002", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "important", }, ], title: "CVE-2024-24784", }, { cve: "CVE-2024-24785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24785", }, ], notes: [ { category: "general", text: "If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24785", url: "https://www.suse.com/security/cve/CVE-2024-24785", }, { category: "external", summary: "SUSE Bug 1221003 for CVE-2024-24785", url: "https://bugzilla.suse.com/1221003", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "important", }, ], title: "CVE-2024-24785", }, { cve: "CVE-2024-24787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24787", }, ], notes: [ { category: "general", text: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24787", url: "https://www.suse.com/security/cve/CVE-2024-24787", }, { category: "external", summary: "SUSE Bug 1224017 for CVE-2024-24787", url: "https://bugzilla.suse.com/1224017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "moderate", }, ], title: "CVE-2024-24787", }, { cve: "CVE-2024-24788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24788", }, ], notes: [ { category: "general", text: "A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24788", url: "https://www.suse.com/security/cve/CVE-2024-24788", }, { category: "external", summary: "SUSE Bug 1224018 for CVE-2024-24788", url: "https://bugzilla.suse.com/1224018", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "moderate", }, ], title: "CVE-2024-24788", }, { cve: "CVE-2024-24789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24789", }, ], notes: [ { category: "general", text: "The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24789", url: "https://www.suse.com/security/cve/CVE-2024-24789", }, { category: "external", summary: "SUSE Bug 1225973 for CVE-2024-24789", url: "https://bugzilla.suse.com/1225973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "moderate", }, ], title: "CVE-2024-24789", }, { cve: "CVE-2024-24790", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24790", }, ], notes: [ { category: "general", text: "The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24790", url: "https://www.suse.com/security/cve/CVE-2024-24790", }, { category: "external", summary: "SUSE Bug 1225974 for CVE-2024-24790", url: "https://bugzilla.suse.com/1225974", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "moderate", }, ], title: "CVE-2024-24790", }, { cve: "CVE-2024-24791", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24791", }, ], notes: [ { category: "general", text: "The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an \"Expect: 100-continue\" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending \"Expect: 100-continue\" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24791", url: "https://www.suse.com/security/cve/CVE-2024-24791", }, { category: "external", summary: "SUSE Bug 1227314 for CVE-2024-24791", url: "https://bugzilla.suse.com/1227314", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "moderate", }, ], title: "CVE-2024-24791", }, { cve: "CVE-2024-34155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-34155", }, ], notes: [ { category: "general", text: "Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-34155", url: "https://www.suse.com/security/cve/CVE-2024-34155", }, { category: "external", summary: "SUSE Bug 1230252 for CVE-2024-34155", url: "https://bugzilla.suse.com/1230252", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "moderate", }, ], title: "CVE-2024-34155", }, { cve: "CVE-2024-34156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-34156", }, ], notes: [ { category: "general", text: "Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-34156", url: "https://www.suse.com/security/cve/CVE-2024-34156", }, { category: "external", summary: "SUSE Bug 1230253 for CVE-2024-34156", url: "https://bugzilla.suse.com/1230253", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "moderate", }, ], title: "CVE-2024-34156", }, { cve: "CVE-2024-34158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-34158", }, ], notes: [ { category: "general", text: "Calling Parse on a \"// +build\" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-34158", url: "https://www.suse.com/security/cve/CVE-2024-34158", }, { category: "external", summary: "SUSE Bug 1230254 for CVE-2024-34158", url: "https://bugzilla.suse.com/1230254", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1.x86_64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.aarch64", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.ppc64le", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.s390x", "openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-07T10:08:23Z", details: "moderate", }, ], title: "CVE-2024-34158", }, ], }
opensuse-su-2024:13936-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
go1.22-1.22.3-1.1 on GA media
Notes
Title of the patch
go1.22-1.22.3-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.22-1.22.3-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13936
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "go1.22-1.22.3-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the go1.22-1.22.3-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-13936", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13936-1.json", }, { category: "self", summary: "SUSE CVE CVE-2024-24787 page", url: "https://www.suse.com/security/cve/CVE-2024-24787/", }, { category: "self", summary: "SUSE CVE CVE-2024-24788 page", url: "https://www.suse.com/security/cve/CVE-2024-24788/", }, ], title: "go1.22-1.22.3-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:13936-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "go1.22-1.22.3-1.1.aarch64", product: { name: "go1.22-1.22.3-1.1.aarch64", product_id: "go1.22-1.22.3-1.1.aarch64", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-1.1.aarch64", product: { name: "go1.22-doc-1.22.3-1.1.aarch64", product_id: "go1.22-doc-1.22.3-1.1.aarch64", }, }, { category: "product_version", name: "go1.22-libstd-1.22.3-1.1.aarch64", product: { name: "go1.22-libstd-1.22.3-1.1.aarch64", product_id: "go1.22-libstd-1.22.3-1.1.aarch64", }, }, { category: "product_version", name: "go1.22-race-1.22.3-1.1.aarch64", product: { name: "go1.22-race-1.22.3-1.1.aarch64", product_id: "go1.22-race-1.22.3-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "go1.22-1.22.3-1.1.ppc64le", product: { name: "go1.22-1.22.3-1.1.ppc64le", product_id: "go1.22-1.22.3-1.1.ppc64le", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-1.1.ppc64le", product: { name: "go1.22-doc-1.22.3-1.1.ppc64le", product_id: "go1.22-doc-1.22.3-1.1.ppc64le", }, }, { category: "product_version", name: "go1.22-libstd-1.22.3-1.1.ppc64le", product: { name: "go1.22-libstd-1.22.3-1.1.ppc64le", product_id: "go1.22-libstd-1.22.3-1.1.ppc64le", }, }, { category: "product_version", name: "go1.22-race-1.22.3-1.1.ppc64le", product: { name: "go1.22-race-1.22.3-1.1.ppc64le", product_id: "go1.22-race-1.22.3-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "go1.22-1.22.3-1.1.s390x", product: { name: "go1.22-1.22.3-1.1.s390x", product_id: "go1.22-1.22.3-1.1.s390x", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-1.1.s390x", product: { name: "go1.22-doc-1.22.3-1.1.s390x", product_id: "go1.22-doc-1.22.3-1.1.s390x", }, }, { category: "product_version", name: "go1.22-libstd-1.22.3-1.1.s390x", product: { name: "go1.22-libstd-1.22.3-1.1.s390x", product_id: "go1.22-libstd-1.22.3-1.1.s390x", }, }, { category: "product_version", name: "go1.22-race-1.22.3-1.1.s390x", product: { name: "go1.22-race-1.22.3-1.1.s390x", product_id: "go1.22-race-1.22.3-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "go1.22-1.22.3-1.1.x86_64", product: { name: "go1.22-1.22.3-1.1.x86_64", product_id: "go1.22-1.22.3-1.1.x86_64", }, }, { category: "product_version", name: "go1.22-doc-1.22.3-1.1.x86_64", product: { name: "go1.22-doc-1.22.3-1.1.x86_64", product_id: "go1.22-doc-1.22.3-1.1.x86_64", }, }, { category: "product_version", name: "go1.22-libstd-1.22.3-1.1.x86_64", product: { name: "go1.22-libstd-1.22.3-1.1.x86_64", product_id: "go1.22-libstd-1.22.3-1.1.x86_64", }, }, { category: "product_version", name: "go1.22-race-1.22.3-1.1.x86_64", product: { name: "go1.22-race-1.22.3-1.1.x86_64", product_id: "go1.22-race-1.22.3-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-1.22.3-1.1.aarch64", }, product_reference: "go1.22-1.22.3-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-1.22.3-1.1.ppc64le", }, product_reference: "go1.22-1.22.3-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-1.22.3-1.1.s390x", }, product_reference: "go1.22-1.22.3-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-1.22.3-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-1.22.3-1.1.x86_64", }, product_reference: "go1.22-1.22.3-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.aarch64", }, product_reference: "go1.22-doc-1.22.3-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.ppc64le", }, product_reference: "go1.22-doc-1.22.3-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.s390x", }, product_reference: "go1.22-doc-1.22.3-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-doc-1.22.3-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.x86_64", }, product_reference: "go1.22-doc-1.22.3-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-libstd-1.22.3-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.aarch64", }, product_reference: "go1.22-libstd-1.22.3-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-libstd-1.22.3-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.ppc64le", }, product_reference: "go1.22-libstd-1.22.3-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-libstd-1.22.3-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.s390x", }, product_reference: "go1.22-libstd-1.22.3-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-libstd-1.22.3-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.x86_64", }, product_reference: "go1.22-libstd-1.22.3-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.aarch64", }, product_reference: "go1.22-race-1.22.3-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.ppc64le", }, product_reference: "go1.22-race-1.22.3-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.s390x", }, product_reference: "go1.22-race-1.22.3-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.22-race-1.22.3-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.x86_64", }, product_reference: "go1.22-race-1.22.3-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2024-24787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24787", }, ], notes: [ { category: "general", text: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:go1.22-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24787", url: "https://www.suse.com/security/cve/CVE-2024-24787", }, { category: "external", summary: "SUSE Bug 1224017 for CVE-2024-24787", url: "https://bugzilla.suse.com/1224017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:go1.22-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:go1.22-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-24787", }, { cve: "CVE-2024-24788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24788", }, ], notes: [ { category: "general", text: "A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:go1.22-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24788", url: "https://www.suse.com/security/cve/CVE-2024-24788", }, { category: "external", summary: "SUSE Bug 1224018 for CVE-2024-24788", url: "https://bugzilla.suse.com/1224018", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:go1.22-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:go1.22-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.3-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-24788", }, ], }
opensuse-su-2024:13941-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
go1.21-1.21.10-1.1 on GA media
Notes
Title of the patch
go1.21-1.21.10-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.21-1.21.10-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13941
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "go1.21-1.21.10-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the go1.21-1.21.10-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-13941", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13941-1.json", }, { category: "self", summary: "SUSE CVE CVE-2024-24787 page", url: "https://www.suse.com/security/cve/CVE-2024-24787/", }, ], title: "go1.21-1.21.10-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:13941-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "go1.21-1.21.10-1.1.aarch64", product: { name: "go1.21-1.21.10-1.1.aarch64", product_id: "go1.21-1.21.10-1.1.aarch64", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-1.1.aarch64", product: { name: "go1.21-doc-1.21.10-1.1.aarch64", product_id: "go1.21-doc-1.21.10-1.1.aarch64", }, }, { category: "product_version", name: "go1.21-libstd-1.21.10-1.1.aarch64", product: { name: "go1.21-libstd-1.21.10-1.1.aarch64", product_id: "go1.21-libstd-1.21.10-1.1.aarch64", }, }, { category: "product_version", name: "go1.21-race-1.21.10-1.1.aarch64", product: { name: "go1.21-race-1.21.10-1.1.aarch64", product_id: "go1.21-race-1.21.10-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "go1.21-1.21.10-1.1.ppc64le", product: { name: "go1.21-1.21.10-1.1.ppc64le", product_id: "go1.21-1.21.10-1.1.ppc64le", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-1.1.ppc64le", product: { name: "go1.21-doc-1.21.10-1.1.ppc64le", product_id: "go1.21-doc-1.21.10-1.1.ppc64le", }, }, { category: "product_version", name: "go1.21-libstd-1.21.10-1.1.ppc64le", product: { name: "go1.21-libstd-1.21.10-1.1.ppc64le", product_id: "go1.21-libstd-1.21.10-1.1.ppc64le", }, }, { category: "product_version", name: "go1.21-race-1.21.10-1.1.ppc64le", product: { name: "go1.21-race-1.21.10-1.1.ppc64le", product_id: "go1.21-race-1.21.10-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "go1.21-1.21.10-1.1.s390x", product: { name: "go1.21-1.21.10-1.1.s390x", product_id: "go1.21-1.21.10-1.1.s390x", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-1.1.s390x", product: { name: "go1.21-doc-1.21.10-1.1.s390x", product_id: "go1.21-doc-1.21.10-1.1.s390x", }, }, { category: "product_version", name: "go1.21-libstd-1.21.10-1.1.s390x", product: { name: "go1.21-libstd-1.21.10-1.1.s390x", product_id: "go1.21-libstd-1.21.10-1.1.s390x", }, }, { category: "product_version", name: "go1.21-race-1.21.10-1.1.s390x", product: { name: "go1.21-race-1.21.10-1.1.s390x", product_id: "go1.21-race-1.21.10-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "go1.21-1.21.10-1.1.x86_64", product: { name: "go1.21-1.21.10-1.1.x86_64", product_id: "go1.21-1.21.10-1.1.x86_64", }, }, { category: "product_version", name: "go1.21-doc-1.21.10-1.1.x86_64", product: { name: "go1.21-doc-1.21.10-1.1.x86_64", product_id: "go1.21-doc-1.21.10-1.1.x86_64", }, }, { category: "product_version", name: "go1.21-libstd-1.21.10-1.1.x86_64", product: { name: "go1.21-libstd-1.21.10-1.1.x86_64", product_id: "go1.21-libstd-1.21.10-1.1.x86_64", }, }, { category: "product_version", name: "go1.21-race-1.21.10-1.1.x86_64", product: { name: "go1.21-race-1.21.10-1.1.x86_64", product_id: "go1.21-race-1.21.10-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-1.21.10-1.1.aarch64", }, product_reference: "go1.21-1.21.10-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-1.21.10-1.1.ppc64le", }, product_reference: "go1.21-1.21.10-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-1.21.10-1.1.s390x", }, product_reference: "go1.21-1.21.10-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-1.21.10-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-1.21.10-1.1.x86_64", }, product_reference: "go1.21-1.21.10-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.aarch64", }, product_reference: "go1.21-doc-1.21.10-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.ppc64le", }, product_reference: "go1.21-doc-1.21.10-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.s390x", }, product_reference: "go1.21-doc-1.21.10-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-doc-1.21.10-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.x86_64", }, product_reference: "go1.21-doc-1.21.10-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-libstd-1.21.10-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.aarch64", }, product_reference: "go1.21-libstd-1.21.10-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-libstd-1.21.10-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.ppc64le", }, product_reference: "go1.21-libstd-1.21.10-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-libstd-1.21.10-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.s390x", }, product_reference: "go1.21-libstd-1.21.10-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-libstd-1.21.10-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.x86_64", }, product_reference: "go1.21-libstd-1.21.10-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.aarch64", }, product_reference: "go1.21-race-1.21.10-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.ppc64le", }, product_reference: "go1.21-race-1.21.10-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.s390x", }, product_reference: "go1.21-race-1.21.10-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "go1.21-race-1.21.10-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.x86_64", }, product_reference: "go1.21-race-1.21.10-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2024-24787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24787", }, ], notes: [ { category: "general", text: "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:go1.21-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-1.21.10-1.1.x86_64", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.x86_64", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.x86_64", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24787", url: "https://www.suse.com/security/cve/CVE-2024-24787", }, { category: "external", summary: "SUSE Bug 1224017 for CVE-2024-24787", url: "https://bugzilla.suse.com/1224017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:go1.21-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-1.21.10-1.1.x86_64", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.x86_64", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.x86_64", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:go1.21-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-1.21.10-1.1.x86_64", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-doc-1.21.10-1.1.x86_64", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-libstd-1.21.10-1.1.x86_64", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.aarch64", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.ppc64le", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.s390x", "openSUSE Tumbleweed:go1.21-race-1.21.10-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-24787", }, ], }
WID-SEC-W-2024-1071
Vulnerability from csaf_certbund
Published
2024-05-07 22:00
Modified
2025-01-12 23:00
Summary
Golang Go: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Go ist eine quelloffene Programmiersprache.
Angriff
Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um beliebigen Code auszuführen oder einen 'Denial of Service'-Zustand zu verursachen.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Go ist eine quelloffene Programmiersprache.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um beliebigen Code auszuführen oder einen 'Denial of Service'-Zustand zu verursachen.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1071 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1071.json", }, { category: "self", summary: "WID-SEC-2024-1071 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1071", }, { category: "external", summary: "Golang Announce vom 2024-05-07", url: "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", }, { category: "external", summary: "Golang Vulnerability Report vom 2024-05-07", url: "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:1573-1 vom 2024-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018487.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:1574-1 vom 2024-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018486.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:1587-1 vom 2024-05-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018503.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:1588-1 vom 2024-05-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018502.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6886-1 vom 2024-07-09", url: "https://ubuntu.com/security/notices/USN-6886-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:4697 vom 2024-07-23", url: "https://access.redhat.com/errata/RHSA-2024:4697", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:4616 vom 2024-07-25", url: "https://access.redhat.com/errata/RHSA-2024:4616", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:4613 vom 2024-07-25", url: "https://access.redhat.com/errata/RHSA-2024:4613", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:4872 vom 2024-07-26", url: "https://access.redhat.com/errata/RHSA-2024:4872", }, { category: "external", summary: "IBM Security Bulletin 7161954 vom 2024-07-30", url: "https://www.ibm.com/support/pages/node/7161954", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:4982 vom 2024-08-02", url: "https://access.redhat.com/errata/RHSA-2024:4982", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202408-07 vom 2024-08-07", url: "https://security.gentoo.org/glsa/202408-07", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:5291 vom 2024-08-14", url: "https://access.redhat.com/errata/RHSA-2024:5291", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-5291 vom 2024-08-14", url: "https://linux.oracle.com/errata/ELSA-2024-5291.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:5547 vom 2024-08-19", url: "https://access.redhat.com/errata/RHSA-2024:5547", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3089-1 vom 2024-09-03", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019369.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:6221 vom 2024-09-03", url: "https://access.redhat.com/errata/RHSA-2024:6221", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:6462 vom 2024-09-09", url: "https://access.redhat.com/errata/RHSA-2024:6462", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:6765 vom 2024-09-18", url: "https://access.redhat.com/errata/RHSA-2024:6765", }, { category: "external", summary: "IBM Security Bulletin 7169778 vom 2024-09-24", url: "https://www.ibm.com/support/pages/node/7169778", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:6969 vom 2024-09-24", url: "https://access.redhat.com/errata/RHSA-2024:6969", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:7164 vom 2024-09-26", url: "https://access.redhat.com/errata/RHSA-2024:7164", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-6969 vom 2024-09-26", url: "https://linux.oracle.com/errata/ELSA-2024-6969.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:7548 vom 2024-10-16", url: "https://access.redhat.com/errata/RHSA-2024:7548", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:6341 vom 2024-10-23", url: "https://access.redhat.com/errata/RHSA-2024:6341", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3755-1 vom 2024-10-24", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IDZD3NVTACJTTUYRJDCRM2C2RTOJVHD6/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3772-1 vom 2024-10-29", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3938-1 vom 2024-11-07", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html", }, { category: "external", summary: "Red Hat vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9089", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9135 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9135", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9098 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9098", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9115 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9115", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9277 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9277", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9200 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9200", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9485 vom 2024-11-13", url: "https://access.redhat.com/errata/RHSA-2024:9485", }, { category: "external", summary: "XEROX Security Advisory XRX25-001 vom 2025-01-13", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf", }, ], source_lang: "en-US", title: "Golang Go: Mehrere Schwachstellen", tracking: { current_release_date: "2025-01-12T23:00:00.000+00:00", generator: { date: "2025-01-13T11:08:56.949+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2024-1071", initial_release_date: "2024-05-07T22:00:00.000+00:00", revision_history: [ { date: "2024-05-07T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-05-09T22:00:00.000+00:00", number: "2", summary: "Neue Updates von SUSE, Go und Red Hat aufgenommen", }, { date: "2024-07-09T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-07-22T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-07-24T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-07-25T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-07-30T22:00:00.000+00:00", number: "7", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-08-01T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-08-06T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2024-08-13T22:00:00.000+00:00", number: "10", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-08-14T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-08-19T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-09-03T22:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE und Red Hat aufgenommen", }, { date: "2024-09-08T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-09-18T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-09-23T22:00:00.000+00:00", number: "16", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-09-25T22:00:00.000+00:00", number: "17", summary: "Neue Updates von Red Hat und Oracle Linux aufgenommen", }, { date: "2024-10-15T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-10-22T22:00:00.000+00:00", number: "19", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-10-23T22:00:00.000+00:00", number: "20", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-10-29T23:00:00.000+00:00", number: "21", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-11-07T23:00:00.000+00:00", number: "22", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-11-11T23:00:00.000+00:00", number: "23", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-11-13T23:00:00.000+00:00", number: "24", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2025-01-12T23:00:00.000+00:00", number: "25", summary: "Neue Updates von XEROX aufgenommen", }, ], status: "final", version: "25", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { branches: [ { category: "product_version_range", name: "<1.22.3", product: { name: "Golang Go <1.22.3", product_id: "T034594", }, }, { category: "product_version", name: "1.22.3", product: { name: "Golang Go 1.22.3", product_id: "T034594-fixed", product_identification_helper: { cpe: "cpe:/a:golang:go:1.22.3", }, }, }, { category: "product_version_range", name: "<1.21.10", product: { name: "Golang Go <1.21.10", product_id: "T034595", }, }, { category: "product_version", name: "1.21.10", product: { name: "Golang Go 1.21.10", product_id: "T034595-fixed", product_identification_helper: { cpe: "cpe:/a:golang:go:1.21.10", }, }, }, ], category: "product_name", name: "Go", }, ], category: "vendor", name: "Golang", }, { branches: [ { branches: [ { category: "product_version_range", name: "<10.1.16.2", product: { name: "IBM Spectrum Protect Plus <10.1.16.2", product_id: "T036379", }, }, { category: "product_version", name: "10.1.16.2", product: { name: "IBM Spectrum Protect Plus 10.1.16.2", product_id: "T036379-fixed", product_identification_helper: { cpe: "cpe:/a:ibm:spectrum_protect_plus:10.1.16.2", }, }, }, { category: "product_version_range", name: "<10.1.16.3", product: { name: "IBM Spectrum Protect Plus <10.1.16.3", product_id: "T037795", }, }, { category: "product_version", name: "10.1.16.3", product: { name: "IBM Spectrum Protect Plus 10.1.16.3", product_id: "T037795-fixed", product_identification_helper: { cpe: "cpe:/a:ibm:spectrum_protect_plus:10.1.16.3", }, }, }, ], category: "product_name", name: "Spectrum Protect Plus", }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, { category: "product_version", name: "9", product: { name: "Red Hat Enterprise Linux 9", product_id: "T038904", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:9", }, }, }, ], category: "product_name", name: "Enterprise Linux", }, { branches: [ { category: "product_version", name: "Kube Descheduler Operator 5", product: { name: "Red Hat OpenShift Kube Descheduler Operator 5", product_id: "T033270", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:kube_descheduler_operator_5", }, }, }, { category: "product_version_range", name: "Data Foundation <4.16.1", product: { name: "Red Hat OpenShift Data Foundation <4.16.1", product_id: "T036951", }, }, { category: "product_version", name: "Data Foundation 4.16.1", product: { name: "Red Hat OpenShift Data Foundation 4.16.1", product_id: "T036951-fixed", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:data_foundation__4.16.1", }, }, }, ], category: "product_name", name: "OpenShift", }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, { branches: [ { branches: [ { category: "product_version", name: "v9 for Solaris", product: { name: "Xerox FreeFlow Print Server v9 for Solaris", product_id: "T028053", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:v9_for_solaris", }, }, }, ], category: "product_name", name: "FreeFlow Print Server", }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2024-24787", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Golang Go. Dieser Fehler besteht während der Erstellung eines Go-Moduls, das CGO enthält, welches die Apple-Version von ld verwendet. Ein entfernter, anonymer Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.", }, ], product_status: { known_affected: [ "T038904", "T028053", "67646", "T034594", "T036379", "T036951", "T012167", "T004914", "T037795", "T034595", "T002207", "T033270", "T000126", ], }, release_date: "2024-05-07T22:00:00.000+00:00", title: "CVE-2024-24787", }, { cve: "CVE-2024-24788", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Golang Go. Dieser Fehler besteht aufgrund einer unsachgemäßen Behandlung von DNS-Anfragen, die es den Lookup-Funktionen erlaubt, in einer Endlosschleife stecken zu bleiben. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "T038904", "T028053", "67646", "T034594", "T036379", "T036951", "T012167", "T004914", "T037795", "T034595", "T002207", "T033270", "T000126", ], }, release_date: "2024-05-07T22:00:00.000+00:00", title: "CVE-2024-24788", }, ], }
wid-sec-w-2024-1071
Vulnerability from csaf_certbund
Published
2024-05-07 22:00
Modified
2025-01-12 23:00
Summary
Golang Go: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Go ist eine quelloffene Programmiersprache.
Angriff
Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um beliebigen Code auszuführen oder einen 'Denial of Service'-Zustand zu verursachen.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Go ist eine quelloffene Programmiersprache.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um beliebigen Code auszuführen oder einen 'Denial of Service'-Zustand zu verursachen.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1071 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1071.json", }, { category: "self", summary: "WID-SEC-2024-1071 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1071", }, { category: "external", summary: "Golang Announce vom 2024-05-07", url: "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", }, { category: "external", summary: "Golang Vulnerability Report vom 2024-05-07", url: "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:1573-1 vom 2024-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018487.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:1574-1 vom 2024-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018486.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:1587-1 vom 2024-05-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018503.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:1588-1 vom 2024-05-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018502.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6886-1 vom 2024-07-09", url: "https://ubuntu.com/security/notices/USN-6886-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:4697 vom 2024-07-23", url: "https://access.redhat.com/errata/RHSA-2024:4697", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:4616 vom 2024-07-25", url: "https://access.redhat.com/errata/RHSA-2024:4616", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:4613 vom 2024-07-25", url: "https://access.redhat.com/errata/RHSA-2024:4613", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:4872 vom 2024-07-26", url: "https://access.redhat.com/errata/RHSA-2024:4872", }, { category: "external", summary: "IBM Security Bulletin 7161954 vom 2024-07-30", url: "https://www.ibm.com/support/pages/node/7161954", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:4982 vom 2024-08-02", url: "https://access.redhat.com/errata/RHSA-2024:4982", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202408-07 vom 2024-08-07", url: "https://security.gentoo.org/glsa/202408-07", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:5291 vom 2024-08-14", url: "https://access.redhat.com/errata/RHSA-2024:5291", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-5291 vom 2024-08-14", url: "https://linux.oracle.com/errata/ELSA-2024-5291.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:5547 vom 2024-08-19", url: "https://access.redhat.com/errata/RHSA-2024:5547", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3089-1 vom 2024-09-03", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019369.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:6221 vom 2024-09-03", url: "https://access.redhat.com/errata/RHSA-2024:6221", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:6462 vom 2024-09-09", url: "https://access.redhat.com/errata/RHSA-2024:6462", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:6765 vom 2024-09-18", url: "https://access.redhat.com/errata/RHSA-2024:6765", }, { category: "external", summary: "IBM Security Bulletin 7169778 vom 2024-09-24", url: "https://www.ibm.com/support/pages/node/7169778", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:6969 vom 2024-09-24", url: "https://access.redhat.com/errata/RHSA-2024:6969", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:7164 vom 2024-09-26", url: "https://access.redhat.com/errata/RHSA-2024:7164", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-6969 vom 2024-09-26", url: "https://linux.oracle.com/errata/ELSA-2024-6969.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:7548 vom 2024-10-16", url: "https://access.redhat.com/errata/RHSA-2024:7548", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:6341 vom 2024-10-23", url: "https://access.redhat.com/errata/RHSA-2024:6341", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3755-1 vom 2024-10-24", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IDZD3NVTACJTTUYRJDCRM2C2RTOJVHD6/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3772-1 vom 2024-10-29", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3938-1 vom 2024-11-07", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html", }, { category: "external", summary: "Red Hat vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9089", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9135 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9135", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9098 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9098", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9115 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9115", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9277 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9277", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9200 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9200", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9485 vom 2024-11-13", url: "https://access.redhat.com/errata/RHSA-2024:9485", }, { category: "external", summary: "XEROX Security Advisory XRX25-001 vom 2025-01-13", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf", }, ], source_lang: "en-US", title: "Golang Go: Mehrere Schwachstellen", tracking: { current_release_date: "2025-01-12T23:00:00.000+00:00", generator: { date: "2025-01-13T11:08:56.949+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2024-1071", initial_release_date: "2024-05-07T22:00:00.000+00:00", revision_history: [ { date: "2024-05-07T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-05-09T22:00:00.000+00:00", number: "2", summary: "Neue Updates von SUSE, Go und Red Hat aufgenommen", }, { date: "2024-07-09T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-07-22T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-07-24T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-07-25T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-07-30T22:00:00.000+00:00", number: "7", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-08-01T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-08-06T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2024-08-13T22:00:00.000+00:00", number: "10", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-08-14T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-08-19T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-09-03T22:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE und Red Hat aufgenommen", }, { date: "2024-09-08T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-09-18T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-09-23T22:00:00.000+00:00", number: "16", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-09-25T22:00:00.000+00:00", number: "17", summary: "Neue Updates von Red Hat und Oracle Linux aufgenommen", }, { date: "2024-10-15T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-10-22T22:00:00.000+00:00", number: "19", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-10-23T22:00:00.000+00:00", number: "20", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-10-29T23:00:00.000+00:00", number: "21", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-11-07T23:00:00.000+00:00", number: "22", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-11-11T23:00:00.000+00:00", number: "23", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-11-13T23:00:00.000+00:00", number: "24", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2025-01-12T23:00:00.000+00:00", number: "25", summary: "Neue Updates von XEROX aufgenommen", }, ], status: "final", version: "25", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { branches: [ { category: "product_version_range", name: "<1.22.3", product: { name: "Golang Go <1.22.3", product_id: "T034594", }, }, { category: "product_version", name: "1.22.3", product: { name: "Golang Go 1.22.3", product_id: "T034594-fixed", product_identification_helper: { cpe: "cpe:/a:golang:go:1.22.3", }, }, }, { category: "product_version_range", name: "<1.21.10", product: { name: "Golang Go <1.21.10", product_id: "T034595", }, }, { category: "product_version", name: "1.21.10", product: { name: "Golang Go 1.21.10", product_id: "T034595-fixed", product_identification_helper: { cpe: "cpe:/a:golang:go:1.21.10", }, }, }, ], category: "product_name", name: "Go", }, ], category: "vendor", name: "Golang", }, { branches: [ { branches: [ { category: "product_version_range", name: "<10.1.16.2", product: { name: "IBM Spectrum Protect Plus <10.1.16.2", product_id: "T036379", }, }, { category: "product_version", name: "10.1.16.2", product: { name: "IBM Spectrum Protect Plus 10.1.16.2", product_id: "T036379-fixed", product_identification_helper: { cpe: "cpe:/a:ibm:spectrum_protect_plus:10.1.16.2", }, }, }, { category: "product_version_range", name: "<10.1.16.3", product: { name: "IBM Spectrum Protect Plus <10.1.16.3", product_id: "T037795", }, }, { category: "product_version", name: "10.1.16.3", product: { name: "IBM Spectrum Protect Plus 10.1.16.3", product_id: "T037795-fixed", product_identification_helper: { cpe: "cpe:/a:ibm:spectrum_protect_plus:10.1.16.3", }, }, }, ], category: "product_name", name: "Spectrum Protect Plus", }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, { category: "product_version", name: "9", product: { name: "Red Hat Enterprise Linux 9", product_id: "T038904", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:9", }, }, }, ], category: "product_name", name: "Enterprise Linux", }, { branches: [ { category: "product_version", name: "Kube Descheduler Operator 5", product: { name: "Red Hat OpenShift Kube Descheduler Operator 5", product_id: "T033270", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:kube_descheduler_operator_5", }, }, }, { category: "product_version_range", name: "Data Foundation <4.16.1", product: { name: "Red Hat OpenShift Data Foundation <4.16.1", product_id: "T036951", }, }, { category: "product_version", name: "Data Foundation 4.16.1", product: { name: "Red Hat OpenShift Data Foundation 4.16.1", product_id: "T036951-fixed", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:data_foundation__4.16.1", }, }, }, ], category: "product_name", name: "OpenShift", }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, { branches: [ { branches: [ { category: "product_version", name: "v9 for Solaris", product: { name: "Xerox FreeFlow Print Server v9 for Solaris", product_id: "T028053", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:v9_for_solaris", }, }, }, ], category: "product_name", name: "FreeFlow Print Server", }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2024-24787", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Golang Go. Dieser Fehler besteht während der Erstellung eines Go-Moduls, das CGO enthält, welches die Apple-Version von ld verwendet. Ein entfernter, anonymer Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.", }, ], product_status: { known_affected: [ "T038904", "T028053", "67646", "T034594", "T036379", "T036951", "T012167", "T004914", "T037795", "T034595", "T002207", "T033270", "T000126", ], }, release_date: "2024-05-07T22:00:00.000+00:00", title: "CVE-2024-24787", }, { cve: "CVE-2024-24788", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Golang Go. Dieser Fehler besteht aufgrund einer unsachgemäßen Behandlung von DNS-Anfragen, die es den Lookup-Funktionen erlaubt, in einer Endlosschleife stecken zu bleiben. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "T038904", "T028053", "67646", "T034594", "T036379", "T036951", "T012167", "T004914", "T037795", "T034595", "T002207", "T033270", "T000126", ], }, release_date: "2024-05-07T22:00:00.000+00:00", title: "CVE-2024-24788", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.