[RHSA-2024:3259] go-toolset:rhel8 security update
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2024:3259
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2024:3259
- Published
-
2024-05-22T00:00:00
(3 months ago) - Modified
-
2024-05-22T00:00:00
(3 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2024-2550
- ALAS2-2024-2554
- ALAS2-2024-2555
- ALAS2-2024-2556
- ALAS2-2024-2568
- ALAS2-2024-2618
- ALPINE:CVE-2023-45288
- ALPINE:CVE-2023-45289
- ALPINE:CVE-2023-45290
- ALPINE:CVE-2024-24783
- ALPINE:CVE-2024-24784
- ALPINE:CVE-2024-24785
- ALSA-2024:1962
- ALSA-2024:1963
- ALSA-2024:2079
- ALSA-2024:2562
- ALSA-2024:2699
- ALSA-2024:2724
- ALSA-2024:3259
- ALSA-2024:3346
- ALSA-2024:3826
- ALSA-2024:3827
- ALSA-2024:3830
- ALSA-2024:3831
- ALSA-2024:5258
- ALSA-2024:6186
- ALSA-2024:6187
- ALSA-2024:6188
- ALSA-2024:6189
- ALSA-2024:6194
- ALSA-2024:6195
- ELSA-2024-1962
- ELSA-2024-1963
- ELSA-2024-2562
- ELSA-2024-2699
- ELSA-2024-2724
- ELSA-2024-3259
- ELSA-2024-3346
- ELSA-2024-3826
- ELSA-2024-3827
- ELSA-2024-3830
- ELSA-2024-3831
- ELSA-2024-5258
- ELSA-2024-6186
- ELSA-2024-6187
- ELSA-2024-6188
- ELSA-2024-6189
- ELSA-2024-6194
- ELSA-2024-6195
- FEDORA-2024-ce2eefc399
- FREEBSD:B1B039EC-DBFC-11EE-9165-901B0E9408DC
- FREEBSD:C092BE0E-F7CC-11EE-AA6B-B42E991FC52E
- FREEBSD:CDB5E0E3-FAFC-11EE-9C21-901B0E9408DC
- GLSA-202408-07
- GO-2024-2598
- GO-2024-2599
- GO-2024-2600
- GO-2024-2609
- GO-2024-2610
- GO-2024-2687
- RHSA-2024:1962
- RHSA-2024:1963
- RHSA-2024:2079
- RHSA-2024:2562
- RHSA-2024:2625
- RHSA-2024:2699
- RHSA-2024:2724
- RHSA-2024:3346
- RHSA-2024:3826
- RHSA-2024:3827
- RHSA-2024:3830
- RHSA-2024:3831
- RHSA-2024:5258
- RHSA-2024:6186
- RHSA-2024:6187
- RHSA-2024:6188
- RHSA-2024:6189
- RHSA-2024:6194
- RHSA-2024:6195
- RLSA-2024:2562
- RLSA-2024:2699
- RLSA-2024:2724
- RLSA-2024:3346
- RLSA-2024:3826
- RLSA-2024:3827
- RLSA-2024:3830
- SUSE-SU-2024:0800-1
- SUSE-SU-2024:0811-1
- SUSE-SU-2024:0812-1
- SUSE-SU-2024:0936-1
- SUSE-SU-2024:1121-1
- SUSE-SU-2024:1122-1
- SUSE-SU-2024:1160-1
- SUSE-SU-2024:1161-1
- SUSE-SU-2024:2108-1
- SUSE-SU-2024:3089-1
- SUSE-SU-2024:3097-1
- SUSE-SU-2024:3098-1
- SUSE-SU-2024:3155-1
- SUSE-SU-2024:3188-1
- USN-6886-1
- VU:421644
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2268017 | https://bugzilla.redhat.com/2268017 | |
Bugzilla | 2268018 | https://bugzilla.redhat.com/2268018 | |
Bugzilla | 2268019 | https://bugzilla.redhat.com/2268019 | |
Bugzilla | 2268021 | https://bugzilla.redhat.com/2268021 | |
Bugzilla | 2268022 | https://bugzilla.redhat.com/2268022 | |
Bugzilla | 2268273 | https://bugzilla.redhat.com/2268273 | |
RHSA | RHSA-2024:3259 | https://access.redhat.com/errata/RHSA-2024:3259 | |
CVE | CVE-2023-45288 | https://access.redhat.com/security/cve/CVE-2023-45288 | |
CVE | CVE-2023-45289 | https://access.redhat.com/security/cve/CVE-2023-45289 | |
CVE | CVE-2023-45290 | https://access.redhat.com/security/cve/CVE-2023-45290 | |
CVE | CVE-2024-24783 | https://access.redhat.com/security/cve/CVE-2024-24783 | |
CVE | CVE-2024-24784 | https://access.redhat.com/security/cve/CVE-2024-24784 | |
CVE | CVE-2024-24785 | https://access.redhat.com/security/cve/CVE-2024-24785 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/golang?arch=x86_64&distro=redhat-8.1 | redhat | golang | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/golang?arch=s390x&distro=redhat-8.1 | redhat | golang | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/golang?arch=ppc64le&distro=redhat-8.1 | redhat | golang | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/golang?arch=aarch64&distro=redhat-8.1 | redhat | golang | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/golang-tests?distro=redhat-8.1 | redhat | golang-tests | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | ||
Affected | pkg:rpm/redhat/golang-src?distro=redhat-8.1 | redhat | golang-src | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | ||
Affected | pkg:rpm/redhat/golang-misc?distro=redhat-8.1 | redhat | golang-misc | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | ||
Affected | pkg:rpm/redhat/golang-docs?distro=redhat-8.1 | redhat | golang-docs | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | ||
Affected | pkg:rpm/redhat/golang-bin?arch=x86_64&distro=redhat-8.1 | redhat | golang-bin | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/golang-bin?arch=s390x&distro=redhat-8.1 | redhat | golang-bin | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/golang-bin?arch=ppc64le&distro=redhat-8.1 | redhat | golang-bin | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/golang-bin?arch=aarch64&distro=redhat-8.1 | redhat | golang-bin | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/go-toolset?arch=x86_64&distro=redhat-8.1 | redhat | go-toolset | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/go-toolset?arch=s390x&distro=redhat-8.1 | redhat | go-toolset | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/go-toolset?arch=ppc64le&distro=redhat-8.1 | redhat | go-toolset | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/go-toolset?arch=aarch64&distro=redhat-8.1 | redhat | go-toolset | < 1.21.9-1.module+el8.10.0+21671+b35c3b78 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/delve?arch=x86_64&distro=redhat-8.1 | redhat | delve | < 1.21.2-3.module+el8.10.0+21244+5b2d9000 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/delve?arch=ppc64le&distro=redhat-8.1 | redhat | delve | < 1.21.2-3.module+el8.10.0+21244+5b2d9000 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/delve?arch=aarch64&distro=redhat-8.1 | redhat | delve | < 1.21.2-3.module+el8.10.0+21244+5b2d9000 | redhat-8.1 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |