[RHSA-2023:0446] go-toolset:rhel8 security and bug fix update
Severity
Moderate
Affected Packages
18
CVEs
6
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
Internal linking fails on ppc64le (BZ#2144545)
crypto testcases fail on golang on s390x rhel-8
- ID
- RHSA-2023:0446
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2023:0446
- Published
-
2023-01-25T00:00:00
(20 months ago) - Modified
-
2023-01-25T00:00:00
(20 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1635
- ALAS-2023-1731
- ALAS-2023-1825
- ALAS-2023-1848
- ALAS2-2022-1846
- ALAS2-2022-1851
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALAS2-2022-1887
- ALAS2-2023-1913
- ALAS2-2023-1926
- ALAS2-2023-2015
- ALAS2-2023-2238
- ALPINE:CVE-2022-27664
- ALPINE:CVE-2022-2879
- ALPINE:CVE-2022-2880
- ALPINE:CVE-2022-32189
- ALPINE:CVE-2022-41715
- ALPINE:CVE-2022-41717
- ALSA-2022:7129
- ALSA-2022:7548
- ALSA-2022:7950
- ALSA-2023:0328
- ALSA-2023:0446
- ALSA-2023:2167
- ALSA-2023:2177
- ALSA-2023:2193
- ALSA-2023:2204
- ALSA-2023:2222
- ALSA-2023:2236
- ALSA-2023:2253
- ALSA-2023:2282
- ALSA-2023:2283
- ALSA-2023:2357
- ALSA-2023:2367
- ALSA-2023:2758
- ALSA-2023:2780
- ALSA-2023:2784
- ALSA-2023:2785
- ALSA-2023:2802
- ALSA-2023:2866
- ALSA-2023:6420
- ALSA-2024:0121
- ALSA-2024:3254
- ELSA-2022-20693
- ELSA-2022-20694
- ELSA-2022-23681
- ELSA-2022-24267
- ELSA-2022-7129
- ELSA-2022-7548
- ELSA-2022-7950
- ELSA-2023-0328
- ELSA-2023-0446
- ELSA-2023-18908
- ELSA-2023-2167
- ELSA-2023-2177
- ELSA-2023-2204
- ELSA-2023-2222
- ELSA-2023-2253
- ELSA-2023-2282
- ELSA-2023-2283
- ELSA-2023-2357
- ELSA-2023-2367
- ELSA-2023-2592
- ELSA-2023-2758
- ELSA-2023-2780
- ELSA-2023-2784
- ELSA-2023-2785
- ELSA-2023-2802
- ELSA-2023-2866
- ELSA-2023-6420
- ELSA-2024-0121
- ELSA-2024-2988
- ELSA-2024-3254
- FEDORA-2022-0e313cc582
- FEDORA-2022-1f829990f0
- FEDORA-2022-45097317b4
- FEDORA-2022-59a20edab2
- FEDORA-2022-67ec8c61d0
- FEDORA-2023-0c354a3f9a
- FEDORA-2023-0fa7715821
- FEDORA-2023-0fff8bc164
- FEDORA-2023-2663dc67d8
- FEDORA-2023-267503a090
- FEDORA-2023-2df9d60e4c
- FEDORA-2023-322314ad50
- FEDORA-2023-327346caa5
- FEDORA-2023-3baf3f43a0
- FEDORA-2023-3dba09f630
- FEDORA-2023-4e2068ba5d
- FEDORA-2023-5eca6a8326
- FEDORA-2023-62ce942e75
- FEDORA-2023-6550d9323b
- FEDORA-2023-6cfe7492c1
- FEDORA-2023-6d71ff268e
- FEDORA-2023-70eb8ba61e
- FEDORA-2023-74e5545901
- FEDORA-2023-8b700042ac
- FEDORA-2023-8c02aee138
- FEDORA-2023-8ecc0e487e
- FEDORA-2023-946dfaf17f
- FEDORA-2023-a5a5542890
- FEDORA-2023-aa7c75ed4a
- FEDORA-2023-abb47e24d8
- FEDORA-2023-ac4651c9b2
- FEDORA-2023-af2e3d1c18
- FEDORA-2023-c0149844e2
- FEDORA-2023-c9b2182a4e
- FEDORA-2023-ca444fdecf
- FEDORA-2023-cb3a59a3df
- FEDORA-2023-ce2836acfa
- FEDORA-2023-e16469fdec
- FEDORA-2023-e359fd31d2
- FEDORA-2023-e82fd2abcb
- FEDORA-2023-e8c27ba884
- FEDORA-2023-ee472c698c
- FEDORA-2023-f4bd7ab2f7
- FEDORA-2024-ae653fb07b
- FEDORA-2024-b85b97c0e9
- FEDORA-2024-fb32950d11
- FEDORA-2024-fd3545a844
- FREEBSD:6F5192F5-75A7-11ED-83C0-411D43CE7FE4
- FREEBSD:6FEA7103-2EA4-11ED-B403-3DAE8AC60D3E
- FREEBSD:7F8D5435-125A-11ED-9A69-10C37B4AC2EA
- FREEBSD:854C2AFB-4424-11ED-AF97-ADCABF310F9B
- GLSA-202208-02
- GLSA-202209-26
- GLSA-202311-09
- GO-2022-0537
- GO-2022-0969
- GO-2022-1037
- GO-2022-1038
- GO-2022-1039
- GO-2022-1144
- MS:CVE-2022-27664
- MS:CVE-2022-32189
- MS:CVE-2022-41717
- RHSA-2022:7129
- RHSA-2022:7548
- RHSA-2022:7950
- RHSA-2023:0328
- RHSA-2023:2167
- RHSA-2023:2177
- RHSA-2023:2193
- RHSA-2023:2204
- RHSA-2023:2222
- RHSA-2023:2236
- RHSA-2023:2253
- RHSA-2023:2282
- RHSA-2023:2283
- RHSA-2023:2357
- RHSA-2023:2367
- RHSA-2023:2592
- RHSA-2023:2758
- RHSA-2023:2780
- RHSA-2023:2784
- RHSA-2023:2785
- RHSA-2023:2802
- RHSA-2023:2866
- RHSA-2023:6420
- RHSA-2024:0121
- RHSA-2024:2988
- RHSA-2024:3254
- RLSA-2022:7129
- RLSA-2022:7548
- RLSA-2022:7950
- RLSA-2023:0328
- RLSA-2023:0446
- SUSE-SU-2022:2671-1
- SUSE-SU-2022:2672-1
- SUSE-SU-2022:3325-1
- SUSE-SU-2022:3326-1
- SUSE-SU-2022:3668-1
- SUSE-SU-2022:3669-1
- SUSE-SU-2022:4397-1
- SUSE-SU-2022:4398-1
- SUSE-SU-2023:2182-1
- SUSE-SU-2023:2183-1
- SUSE-SU-2023:2185-1
- SUSE-SU-2023:2187-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2575-1
- SUSE-SU-2023:2578-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2023:2598-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:0486-1
- SUSE-SU-2024:0487-1
- USN-6038-1
- USN-6038-2
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2113814 | https://bugzilla.redhat.com/2113814 | |
Bugzilla | 2124669 | https://bugzilla.redhat.com/2124669 | |
Bugzilla | 2132867 | https://bugzilla.redhat.com/2132867 | |
Bugzilla | 2132868 | https://bugzilla.redhat.com/2132868 | |
Bugzilla | 2132872 | https://bugzilla.redhat.com/2132872 | |
Bugzilla | 2161274 | https://bugzilla.redhat.com/2161274 | |
RHSA | RHSA-2023:0446 | https://access.redhat.com/errata/RHSA-2023:0446 | |
CVE | CVE-2022-27664 | https://access.redhat.com/security/cve/CVE-2022-27664 | |
CVE | CVE-2022-2879 | https://access.redhat.com/security/cve/CVE-2022-2879 | |
CVE | CVE-2022-2880 | https://access.redhat.com/security/cve/CVE-2022-2880 | |
CVE | CVE-2022-32189 | https://access.redhat.com/security/cve/CVE-2022-32189 | |
CVE | CVE-2022-41715 | https://access.redhat.com/security/cve/CVE-2022-41715 | |
CVE | CVE-2022-41717 | https://access.redhat.com/security/cve/CVE-2022-41717 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/golang?arch=x86_64&distro=redhat-8.7 | redhat | golang | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/golang?arch=s390x&distro=redhat-8.7 | redhat | golang | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | s390x | |
Affected | pkg:rpm/redhat/golang?arch=ppc64le&distro=redhat-8.7 | redhat | golang | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | ppc64le | |
Affected | pkg:rpm/redhat/golang?arch=aarch64&distro=redhat-8.7 | redhat | golang | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | aarch64 | |
Affected | pkg:rpm/redhat/golang-tests?distro=redhat-8.7 | redhat | golang-tests | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | ||
Affected | pkg:rpm/redhat/golang-src?distro=redhat-8.7 | redhat | golang-src | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | ||
Affected | pkg:rpm/redhat/golang-race?arch=x86_64&distro=redhat-8.7 | redhat | golang-race | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/golang-misc?distro=redhat-8.7 | redhat | golang-misc | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | ||
Affected | pkg:rpm/redhat/golang-docs?distro=redhat-8.7 | redhat | golang-docs | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | ||
Affected | pkg:rpm/redhat/golang-bin?arch=x86_64&distro=redhat-8.7 | redhat | golang-bin | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/golang-bin?arch=s390x&distro=redhat-8.7 | redhat | golang-bin | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | s390x | |
Affected | pkg:rpm/redhat/golang-bin?arch=ppc64le&distro=redhat-8.7 | redhat | golang-bin | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | ppc64le | |
Affected | pkg:rpm/redhat/golang-bin?arch=aarch64&distro=redhat-8.7 | redhat | golang-bin | < 1.18.9-1.module+el8.7.0+17640+84246675 | redhat-8.7 | aarch64 | |
Affected | pkg:rpm/redhat/go-toolset?arch=x86_64&distro=redhat-8.7 | redhat | go-toolset | < 1.18.9-1.module+el8.7.0+17845+708ebe87 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/go-toolset?arch=s390x&distro=redhat-8.7 | redhat | go-toolset | < 1.18.9-1.module+el8.7.0+17845+708ebe87 | redhat-8.7 | s390x | |
Affected | pkg:rpm/redhat/go-toolset?arch=ppc64le&distro=redhat-8.7 | redhat | go-toolset | < 1.18.9-1.module+el8.7.0+17845+708ebe87 | redhat-8.7 | ppc64le | |
Affected | pkg:rpm/redhat/go-toolset?arch=aarch64&distro=redhat-8.7 | redhat | go-toolset | < 1.18.9-1.module+el8.7.0+17845+708ebe87 | redhat-8.7 | aarch64 | |
Affected | pkg:rpm/redhat/delve?arch=x86_64&distro=redhat-8.7 | redhat | delve | < 1.8.3-1.module+el8.7.0+15126+0e0a42d9 | redhat-8.7 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |