[SUSE-SU-2022:2671-1] Security update for go1.17

Severity Important
Affected Packages 32
CVEs 10

Security update for go1.17

This update for go1.17 fixes the following issues:

Update to go version 1.17.13 (bsc#1190649):

  • CVE-2022-32189: encoding/gob, math/big: decoding big.Float and big.Rat can panic (bsc#1202035).
  • CVE-2022-30635: encoding/gob: stack exhaustion in Decoder.Decode (bsc#1201444).
  • CVE-2022-30631: compress/gzip: stack exhaustion in Reader.Read (bsc#1201437).
  • CVE-2022-1962: go/parser: stack exhaustion in all Parse* functions (bsc#1201448).
  • CVE-2022-28131: encoding/xml: stack exhaustion in Decoder.Skip (bsc#1201443).
  • CVE-2022-1705: net/http: improper sanitization of Transfer-Encoding header (bsc#1201434)
  • CVE-2022-30630: io/fs: stack exhaustion in Glob (bsc#1201447).
  • CVE-2022-32148: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (bsc#1201436)
  • CVE-2022-30632: path/filepath: stack exhaustion in Glob (bsc#1201445).
  • CVE-2022-30633: encoding/xml: stack exhaustion in Unmarshal (bsc#1201440).
Package Affected Version
pkg:rpm/suse/go1.17?arch=x86_64&distro=sles-15&sp=2 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=x86_64&distro=opensuse-leap-15.4 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=x86_64&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=s390x&distro=sles-15&sp=2 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=s390x&distro=opensuse-leap-15.4 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=s390x&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=ppc64le&distro=sles-15&sp=2 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=ppc64le&distro=opensuse-leap-15.4 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=ppc64le&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=i586&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=aarch64&distro=sles-15&sp=2 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=aarch64&distro=opensuse-leap-15.4 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17?arch=aarch64&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-race?arch=x86_64&distro=sles-15&sp=2 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-race?arch=x86_64&distro=opensuse-leap-15.4 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-race?arch=x86_64&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-race?arch=aarch64&distro=sles-15&sp=2 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-race?arch=aarch64&distro=opensuse-leap-15.4 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-race?arch=aarch64&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=x86_64&distro=sles-15&sp=2 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=x86_64&distro=opensuse-leap-15.4 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=x86_64&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=s390x&distro=sles-15&sp=2 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=s390x&distro=opensuse-leap-15.4 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=s390x&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=ppc64le&distro=sles-15&sp=2 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=ppc64le&distro=opensuse-leap-15.4 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=ppc64le&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=i586&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=aarch64&distro=sles-15&sp=2 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=aarch64&distro=opensuse-leap-15.4 < 1.17.13-150000.1.42.1
pkg:rpm/suse/go1.17-doc?arch=aarch64&distro=opensuse-leap-15.3 < 1.17.13-150000.1.42.1
ID
SUSE-SU-2022:2671-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2022/suse-su-20222671-1/
Published
2022-08-04T12:05:44
(2 years ago)
Modified
2022-08-04T12:05:44
(2 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2671-1.json
Suse URL for SUSE-SU-2022:2671-1 https://www.suse.com/support/update/announcement/2022/suse-su-20222671-1/
Suse E-Mail link for SUSE-SU-2022:2671-1 https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html
Bugzilla SUSE Bug 1190649 https://bugzilla.suse.com/1190649
Bugzilla SUSE Bug 1201434 https://bugzilla.suse.com/1201434
Bugzilla SUSE Bug 1201436 https://bugzilla.suse.com/1201436
Bugzilla SUSE Bug 1201437 https://bugzilla.suse.com/1201437
Bugzilla SUSE Bug 1201440 https://bugzilla.suse.com/1201440
Bugzilla SUSE Bug 1201443 https://bugzilla.suse.com/1201443
Bugzilla SUSE Bug 1201444 https://bugzilla.suse.com/1201444
Bugzilla SUSE Bug 1201445 https://bugzilla.suse.com/1201445
Bugzilla SUSE Bug 1201447 https://bugzilla.suse.com/1201447
Bugzilla SUSE Bug 1201448 https://bugzilla.suse.com/1201448
Bugzilla SUSE Bug 1202035 https://bugzilla.suse.com/1202035
CVE SUSE CVE CVE-2022-1705 page https://www.suse.com/security/cve/CVE-2022-1705/
CVE SUSE CVE CVE-2022-1962 page https://www.suse.com/security/cve/CVE-2022-1962/
CVE SUSE CVE CVE-2022-28131 page https://www.suse.com/security/cve/CVE-2022-28131/
CVE SUSE CVE CVE-2022-30630 page https://www.suse.com/security/cve/CVE-2022-30630/
CVE SUSE CVE CVE-2022-30631 page https://www.suse.com/security/cve/CVE-2022-30631/
CVE SUSE CVE CVE-2022-30632 page https://www.suse.com/security/cve/CVE-2022-30632/
CVE SUSE CVE CVE-2022-30633 page https://www.suse.com/security/cve/CVE-2022-30633/
CVE SUSE CVE CVE-2022-30635 page https://www.suse.com/security/cve/CVE-2022-30635/
CVE SUSE CVE CVE-2022-32148 page https://www.suse.com/security/cve/CVE-2022-32148/
CVE SUSE CVE CVE-2022-32189 page https://www.suse.com/security/cve/CVE-2022-32189/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/go1.17?arch=x86_64&distro=sles-15&sp=2 suse go1.17 < 1.17.13-150000.1.42.1 sles-15 x86_64
Affected pkg:rpm/suse/go1.17?arch=x86_64&distro=opensuse-leap-15.4 suse go1.17 < 1.17.13-150000.1.42.1 opensuse-leap-15.4 x86_64
Affected pkg:rpm/suse/go1.17?arch=x86_64&distro=opensuse-leap-15.3 suse go1.17 < 1.17.13-150000.1.42.1 opensuse-leap-15.3 x86_64
Affected pkg:rpm/suse/go1.17?arch=s390x&distro=sles-15&sp=2 suse go1.17 < 1.17.13-150000.1.42.1 sles-15 s390x
Affected pkg:rpm/suse/go1.17?arch=s390x&distro=opensuse-leap-15.4 suse go1.17 < 1.17.13-150000.1.42.1 opensuse-leap-15.4 s390x
Affected pkg:rpm/suse/go1.17?arch=s390x&distro=opensuse-leap-15.3 suse go1.17 < 1.17.13-150000.1.42.1 opensuse-leap-15.3 s390x
Affected pkg:rpm/suse/go1.17?arch=ppc64le&distro=sles-15&sp=2 suse go1.17 < 1.17.13-150000.1.42.1 sles-15 ppc64le
Affected pkg:rpm/suse/go1.17?arch=ppc64le&distro=opensuse-leap-15.4 suse go1.17 < 1.17.13-150000.1.42.1 opensuse-leap-15.4 ppc64le
Affected pkg:rpm/suse/go1.17?arch=ppc64le&distro=opensuse-leap-15.3 suse go1.17 < 1.17.13-150000.1.42.1 opensuse-leap-15.3 ppc64le
Affected pkg:rpm/suse/go1.17?arch=i586&distro=opensuse-leap-15.3 suse go1.17 < 1.17.13-150000.1.42.1 opensuse-leap-15.3 i586
Affected pkg:rpm/suse/go1.17?arch=aarch64&distro=sles-15&sp=2 suse go1.17 < 1.17.13-150000.1.42.1 sles-15 aarch64
Affected pkg:rpm/suse/go1.17?arch=aarch64&distro=opensuse-leap-15.4 suse go1.17 < 1.17.13-150000.1.42.1 opensuse-leap-15.4 aarch64
Affected pkg:rpm/suse/go1.17?arch=aarch64&distro=opensuse-leap-15.3 suse go1.17 < 1.17.13-150000.1.42.1 opensuse-leap-15.3 aarch64
Affected pkg:rpm/suse/go1.17-race?arch=x86_64&distro=sles-15&sp=2 suse go1.17-race < 1.17.13-150000.1.42.1 sles-15 x86_64
Affected pkg:rpm/suse/go1.17-race?arch=x86_64&distro=opensuse-leap-15.4 suse go1.17-race < 1.17.13-150000.1.42.1 opensuse-leap-15.4 x86_64
Affected pkg:rpm/suse/go1.17-race?arch=x86_64&distro=opensuse-leap-15.3 suse go1.17-race < 1.17.13-150000.1.42.1 opensuse-leap-15.3 x86_64
Affected pkg:rpm/suse/go1.17-race?arch=aarch64&distro=sles-15&sp=2 suse go1.17-race < 1.17.13-150000.1.42.1 sles-15 aarch64
Affected pkg:rpm/suse/go1.17-race?arch=aarch64&distro=opensuse-leap-15.4 suse go1.17-race < 1.17.13-150000.1.42.1 opensuse-leap-15.4 aarch64
Affected pkg:rpm/suse/go1.17-race?arch=aarch64&distro=opensuse-leap-15.3 suse go1.17-race < 1.17.13-150000.1.42.1 opensuse-leap-15.3 aarch64
Affected pkg:rpm/suse/go1.17-doc?arch=x86_64&distro=sles-15&sp=2 suse go1.17-doc < 1.17.13-150000.1.42.1 sles-15 x86_64
Affected pkg:rpm/suse/go1.17-doc?arch=x86_64&distro=opensuse-leap-15.4 suse go1.17-doc < 1.17.13-150000.1.42.1 opensuse-leap-15.4 x86_64
Affected pkg:rpm/suse/go1.17-doc?arch=x86_64&distro=opensuse-leap-15.3 suse go1.17-doc < 1.17.13-150000.1.42.1 opensuse-leap-15.3 x86_64
Affected pkg:rpm/suse/go1.17-doc?arch=s390x&distro=sles-15&sp=2 suse go1.17-doc < 1.17.13-150000.1.42.1 sles-15 s390x
Affected pkg:rpm/suse/go1.17-doc?arch=s390x&distro=opensuse-leap-15.4 suse go1.17-doc < 1.17.13-150000.1.42.1 opensuse-leap-15.4 s390x
Affected pkg:rpm/suse/go1.17-doc?arch=s390x&distro=opensuse-leap-15.3 suse go1.17-doc < 1.17.13-150000.1.42.1 opensuse-leap-15.3 s390x
Affected pkg:rpm/suse/go1.17-doc?arch=ppc64le&distro=sles-15&sp=2 suse go1.17-doc < 1.17.13-150000.1.42.1 sles-15 ppc64le
Affected pkg:rpm/suse/go1.17-doc?arch=ppc64le&distro=opensuse-leap-15.4 suse go1.17-doc < 1.17.13-150000.1.42.1 opensuse-leap-15.4 ppc64le
Affected pkg:rpm/suse/go1.17-doc?arch=ppc64le&distro=opensuse-leap-15.3 suse go1.17-doc < 1.17.13-150000.1.42.1 opensuse-leap-15.3 ppc64le
Affected pkg:rpm/suse/go1.17-doc?arch=i586&distro=opensuse-leap-15.3 suse go1.17-doc < 1.17.13-150000.1.42.1 opensuse-leap-15.3 i586
Affected pkg:rpm/suse/go1.17-doc?arch=aarch64&distro=sles-15&sp=2 suse go1.17-doc < 1.17.13-150000.1.42.1 sles-15 aarch64
Affected pkg:rpm/suse/go1.17-doc?arch=aarch64&distro=opensuse-leap-15.4 suse go1.17-doc < 1.17.13-150000.1.42.1 opensuse-leap-15.4 aarch64
Affected pkg:rpm/suse/go1.17-doc?arch=aarch64&distro=opensuse-leap-15.3 suse go1.17-doc < 1.17.13-150000.1.42.1 opensuse-leap-15.3 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...