[RHSA-2022:5775] go-toolset:rhel8 security and bug fix update
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
Clean up dist-git patches (BZ#2110942)
Update Go to version 1.17.12 (BZ#2110943)
- ID
- RHSA-2022:5775
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:5775
- Published
-
2022-08-01T00:00:00
(2 years ago) - Modified
-
2022-08-01T00:00:00
(2 years ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1635
- ALAS2-2022-1846
- ALAS2-2022-1847
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALPINE:CVE-2022-1705
- ALPINE:CVE-2022-1962
- ALPINE:CVE-2022-28131
- ALPINE:CVE-2022-30629
- ALPINE:CVE-2022-30630
- ALPINE:CVE-2022-30631
- ALPINE:CVE-2022-30632
- ALPINE:CVE-2022-30633
- ALPINE:CVE-2022-30635
- ALPINE:CVE-2022-32148
- ALSA-2022:5775
- ALSA-2022:5799
- ALSA-2022:7129
- ALSA-2022:7519
- ALSA-2022:7529
- ALSA-2022:7648
- ALSA-2022:8057
- ALSA-2022:8098
- ALSA-2022:8250
- ALSA-2023:2253
- ALSA-2023:2282
- ALSA-2023:2283
- ALSA-2023:2357
- ALSA-2023:2367
- ALSA-2023:2758
- ALSA-2023:2802
- ALSA-2024:2180
- ELSA-2022-17956
- ELSA-2022-23681
- ELSA-2022-24267
- ELSA-2022-5775
- ELSA-2022-5799
- ELSA-2022-7129
- ELSA-2022-7519
- ELSA-2022-7529
- ELSA-2022-7648
- ELSA-2022-8057
- ELSA-2022-8250
- ELSA-2023-2253
- ELSA-2023-2282
- ELSA-2023-2283
- ELSA-2023-2357
- ELSA-2023-2367
- ELSA-2023-2758
- ELSA-2023-2802
- ELSA-2024-2180
- FEDORA-2022-13ad572b5a
- FEDORA-2022-30c5ed5625
- FEDORA-2022-3969b64d4b
- FEDORA-2022-3e1ade35db
- FEDORA-2022-4a48180f3f
- FEDORA-2022-4b5537c44c
- FEDORA-2022-5038c3236c
- FEDORA-2022-53e0f427dd
- FEDORA-2022-5ef0bd9a27
- FEDORA-2022-6716cd0da2
- FEDORA-2022-739c7a0058
- FEDORA-2022-741325e9a0
- FEDORA-2022-8bf5635efc
- FEDORA-2022-9986fbb3d7
- FEDORA-2022-9a9a638d09
- FEDORA-2022-b0bd0219ff
- FEDORA-2022-ba365d3703
- FEDORA-2022-e674d52438
- FEDORA-2022-ea8f4e232d
- FEDORA-2022-fae3ecee19
- FEDORA-2023-e8c27ba884
- FEDORA-2024-80e062d21a
- FEDORA-2024-9cc0e0c63e
- FEDORA-2024-d652859efb
- FREEBSD:15888C7E-E659-11EC-B7FE-10C37B4AC2EA
- FREEBSD:A4F2416C-02A0-11ED-B817-10C37B4AC2EA
- GLSA-202208-02
- GO-2022-0515
- GO-2022-0520
- GO-2022-0521
- GO-2022-0522
- GO-2022-0523
- GO-2022-0524
- GO-2022-0525
- GO-2022-0526
- GO-2022-0527
- GO-2022-0531
- MS:CVE-2022-1705
- MS:CVE-2022-1962
- MS:CVE-2022-28131
- MS:CVE-2022-30629
- MS:CVE-2022-30630
- MS:CVE-2022-30631
- MS:CVE-2022-30632
- MS:CVE-2022-30633
- MS:CVE-2022-30635
- MS:CVE-2022-32148
- RHSA-2022:5799
- RHSA-2022:7129
- RHSA-2022:7519
- RHSA-2022:7529
- RHSA-2022:7648
- RHSA-2022:8057
- RHSA-2022:8098
- RHSA-2022:8250
- RHSA-2023:2253
- RHSA-2023:2282
- RHSA-2023:2283
- RHSA-2023:2357
- RHSA-2023:2367
- RHSA-2023:2758
- RHSA-2023:2802
- RHSA-2024:2180
- RLSA-2022:5775
- RLSA-2022:7129
- RLSA-2022:7519
- RLSA-2022:7529
- RLSA-2022:7648
- RLSA-2022:8057
- RLSA-2022:8098
- RLSA-2022:8250
- SUSE-SU-2022:2004-1
- SUSE-SU-2022:2005-1
- SUSE-SU-2022:2671-1
- SUSE-SU-2022:2672-1
- SUSE-SU-2023:2312-1
- USN-6038-1
- USN-6038-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/golang?arch=x86_64&distro=redhat-8.6 | redhat | golang | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/golang?arch=s390x&distro=redhat-8.6 | redhat | golang | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/golang?arch=ppc64le&distro=redhat-8.6 | redhat | golang | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/golang?arch=aarch64&distro=redhat-8.6 | redhat | golang | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/golang-tests?distro=redhat-8.6 | redhat | golang-tests | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | ||
Affected | pkg:rpm/redhat/golang-src?distro=redhat-8.6 | redhat | golang-src | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | ||
Affected | pkg:rpm/redhat/golang-race?arch=x86_64&distro=redhat-8.6 | redhat | golang-race | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/golang-misc?distro=redhat-8.6 | redhat | golang-misc | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | ||
Affected | pkg:rpm/redhat/golang-docs?distro=redhat-8.6 | redhat | golang-docs | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | ||
Affected | pkg:rpm/redhat/golang-bin?arch=x86_64&distro=redhat-8.6 | redhat | golang-bin | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/golang-bin?arch=s390x&distro=redhat-8.6 | redhat | golang-bin | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/golang-bin?arch=ppc64le&distro=redhat-8.6 | redhat | golang-bin | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/golang-bin?arch=aarch64&distro=redhat-8.6 | redhat | golang-bin | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/go-toolset?arch=x86_64&distro=redhat-8.6 | redhat | go-toolset | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/go-toolset?arch=s390x&distro=redhat-8.6 | redhat | go-toolset | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/go-toolset?arch=ppc64le&distro=redhat-8.6 | redhat | go-toolset | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/go-toolset?arch=aarch64&distro=redhat-8.6 | redhat | go-toolset | < 1.17.12-1.module+el8.6.0+16014+a372c00b | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/delve?arch=x86_64&distro=redhat-8.6 | redhat | delve | < 1.7.2-1.module+el8.6.0+12972+ebab5911 | redhat-8.6 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |