[GLSA-202408-07] Go: Multiple Vulnerabilities
Multiple vulnerabilities have been discovered in Go, the worst of which could lead to information leakage or a denial of service.
Background
Go is an open source programming language that makes it easy to build simple, reliable, and efficient software.
Description
Multiple vulnerabilities have been discovered in Go. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Go users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/go-1.22.3"
Due to Go programs typically being statically compiled, Go users should also recompile the reverse dependencies of the Go language to ensure statically linked programs are remediated:
# emerge --ask --oneshot --verbose @golang-rebuild
Package | Affected Version |
---|---|
pkg:ebuild/dev-lang/go?distro=gentoo | < 1.22.3 |
Package | Unaffected Version |
---|---|
pkg:ebuild/dev-lang/go?distro=gentoo | >= 1.22.3 |
- ID
- GLSA-202408-07
- Severity
- normal
- URL
- https://security.gentoo.org/glsa/202408-07
- Published
-
2024-08-07T00:00:00
(5 weeks ago) - Modified
-
2024-08-07T00:00:00
(5 weeks ago) - Rights
- Gentoo Foundation, Inc.
- Other Advisories
-
- ALAS-2023-1760
- ALAS-2023-1848
- ALAS-2023-1866
- ALAS-2024-1903
- ALAS-2024-1920
- ALAS2-2023-2052
- ALAS2-2023-2163
- ALAS2-2023-2303
- ALAS2-2024-2388
- ALAS2-2024-2424
- ALAS2-2024-2446
- ALAS2-2024-2458
- ALAS2-2024-2543
- ALAS2-2024-2550
- ALAS2-2024-2554
- ALAS2-2024-2555
- ALAS2-2024-2556
- ALAS2-2024-2568
- ALAS2-2024-2618
- ALPINE:CVE-2023-24539
- ALPINE:CVE-2023-24540
- ALPINE:CVE-2023-29400
- ALPINE:CVE-2023-39326
- ALPINE:CVE-2023-45288
- ALPINE:CVE-2023-45289
- ALPINE:CVE-2023-45290
- ALPINE:CVE-2024-24783
- ALPINE:CVE-2024-24784
- ALPINE:CVE-2024-24785
- ALPINE:CVE-2024-24788
- ALSA-2023:3318
- ALSA-2023:3319
- ALSA-2023:6346
- ALSA-2023:6363
- ALSA-2023:6402
- ALSA-2023:6473
- ALSA-2023:6474
- ALSA-2023:6938
- ALSA-2023:6939
- ALSA-2024:0748
- ALSA-2024:0887
- ALSA-2024:1131
- ALSA-2024:1149
- ALSA-2024:1962
- ALSA-2024:1963
- ALSA-2024:2079
- ALSA-2024:2160
- ALSA-2024:2193
- ALSA-2024:2245
- ALSA-2024:2272
- ALSA-2024:2562
- ALSA-2024:2699
- ALSA-2024:2724
- ALSA-2024:3259
- ALSA-2024:3346
- ALSA-2024:3826
- ALSA-2024:3827
- ALSA-2024:3830
- ALSA-2024:3831
- ALSA-2024:5258
- ALSA-2024:5291
- ALSA-2024:6186
- ALSA-2024:6187
- ALSA-2024:6188
- ALSA-2024:6189
- ALSA-2024:6194
- ALSA-2024:6195
- ELSA-2023-3318
- ELSA-2023-3319
- ELSA-2023-6363
- ELSA-2023-6402
- ELSA-2023-6473
- ELSA-2023-6474
- ELSA-2023-6938
- ELSA-2023-6939
- ELSA-2024-0887
- ELSA-2024-1131
- ELSA-2024-1149
- ELSA-2024-12189
- ELSA-2024-12190
- ELSA-2024-12191
- ELSA-2024-12225
- ELSA-2024-12226
- ELSA-2024-12261
- ELSA-2024-12262
- ELSA-2024-12263
- ELSA-2024-12264
- ELSA-2024-1962
- ELSA-2024-1963
- ELSA-2024-2193
- ELSA-2024-2245
- ELSA-2024-2272
- ELSA-2024-2562
- ELSA-2024-2699
- ELSA-2024-2724
- ELSA-2024-2988
- ELSA-2024-3259
- ELSA-2024-3346
- ELSA-2024-3826
- ELSA-2024-3827
- ELSA-2024-3830
- ELSA-2024-3831
- ELSA-2024-5258
- ELSA-2024-5291
- ELSA-2024-6186
- ELSA-2024-6187
- ELSA-2024-6188
- ELSA-2024-6189
- ELSA-2024-6194
- ELSA-2024-6195
- FEDORA-2024-193547def8
- FEDORA-2024-ce2eefc399
- FREEBSD:78F2E491-312D-11EE-85F2-BD89B893FCB4
- FREEBSD:B1B039EC-DBFC-11EE-9165-901B0E9408DC
- FREEBSD:C092BE0E-F7CC-11EE-AA6B-B42E991FC52E
- FREEBSD:CDB5E0E3-FAFC-11EE-9C21-901B0E9408DC
- FREEBSD:D3847EBA-114B-11EF-9C21-901B0E9408DC
- GO-2023-1751
- GO-2023-1752
- GO-2023-1753
- GO-2023-2185
- GO-2023-2382
- GO-2023-2383
- GO-2024-2598
- GO-2024-2599
- GO-2024-2600
- GO-2024-2609
- GO-2024-2610
- GO-2024-2687
- GO-2024-2824
- RHSA-2023:3318
- RHSA-2023:3319
- RHSA-2023:6346
- RHSA-2023:6363
- RHSA-2023:6402
- RHSA-2023:6473
- RHSA-2023:6474
- RHSA-2023:6938
- RHSA-2023:6939
- RHSA-2024:0748
- RHSA-2024:0887
- RHSA-2024:1131
- RHSA-2024:1149
- RHSA-2024:1244
- RHSA-2024:1962
- RHSA-2024:1963
- RHSA-2024:2079
- RHSA-2024:2160
- RHSA-2024:2193
- RHSA-2024:2245
- RHSA-2024:2272
- RHSA-2024:2562
- RHSA-2024:2625
- RHSA-2024:2699
- RHSA-2024:2724
- RHSA-2024:2988
- RHSA-2024:3259
- RHSA-2024:3346
- RHSA-2024:3826
- RHSA-2024:3827
- RHSA-2024:3830
- RHSA-2024:3831
- RHSA-2024:5258
- RHSA-2024:5291
- RHSA-2024:6186
- RHSA-2024:6187
- RHSA-2024:6188
- RHSA-2024:6189
- RHSA-2024:6194
- RHSA-2024:6195
- RLSA-2024:2562
- RLSA-2024:2699
- RLSA-2024:2724
- RLSA-2024:3346
- RLSA-2024:3826
- RLSA-2024:3827
- RLSA-2024:3830
- SUSE-SU-2023:2105-1
- SUSE-SU-2023:2105-2
- SUSE-SU-2023:2127-1
- SUSE-SU-2023:4469-1
- SUSE-SU-2023:4470-1
- SUSE-SU-2023:4471-1
- SUSE-SU-2023:4472-1
- SUSE-SU-2023:4708-1
- SUSE-SU-2023:4709-1
- SUSE-SU-2023:4930-1
- SUSE-SU-2023:4931-1
- SUSE-SU-2024:0800-1
- SUSE-SU-2024:0811-1
- SUSE-SU-2024:0812-1
- SUSE-SU-2024:0936-1
- SUSE-SU-2024:1121-1
- SUSE-SU-2024:1122-1
- SUSE-SU-2024:1160-1
- SUSE-SU-2024:1161-1
- SUSE-SU-2024:1573-1
- SUSE-SU-2024:1587-1
- SUSE-SU-2024:2108-1
- SUSE-SU-2024:3089-1
- SUSE-SU-2024:3097-1
- SUSE-SU-2024:3098-1
- SUSE-SU-2024:3155-1
- SUSE-SU-2024:3188-1
- USN-6140-1
- USN-6574-1
- USN-6886-1
- VU:421644
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |