[SUSE-SU-2023:0733-1] Security update for go1.19
Security update for go1.19
This update for go1.19 fixes the following issues:
- CVE-2022-41722: Fixed path traversal in filepath.Clean on Windows (bsc#1208269).
- CVE-2022-41723: Fixed quadratic complexity in HPACK decoding (bsc#1208270).
- CVE-2022-41724: Fixed panic with arge handshake records in crypto/tls (bsc#1208271).
- CVE-2022-41725: Fixed denial of service from excessive resource consumption in net/http and mime/multipart (bsc#1208272).
- CVE-2023-24532: Fixed incorrect P-256 ScalarMult and ScalarBaseMult results (bsc#1209030).
Update to go1.19.7
* go#58441 runtime: some linkname signatures do not match
* go#58502 cmd/link: relocation truncated to fit: R_ARM_CALL against `runtime.duffcopy'
* go#58535 runtime: long latency of sweep assists
* go#58716 net: TestTCPSelfConnect failures due to unexpected connections
* go#58773 syscall: Environ uses an invalid unsafe.Pointer conversion on Windows
* go#58810 crypto/x509: TestSystemVerify consistently failing
Update to go1.19.6:
* go#56154 net/http: bad handling of HEAD requests with a body
* go#57635 crypto/x509: TestBoringAllowCert failures
* go#57812 runtime: performance regression due to bad instruction used in morestack_noctxt for ppc64 in CL 425396
* go#58118 time: update zoneinfo_abbrs on Windows
* go#58223 cmd/link: .go.buildinfo is gc'ed by --gc-sections
* go#58449 cmd/go/internal/modfetch: TestCodeRepo/gopkg.in_natefinch_lumberjack.v2/latest failing
Update to go1.19.5 (bsc#1200441):
* go#57706 Misc/cgo: backport needed for dlltool fix
* go#57556 crypto/x509: re-allow duplicate attributes in CSRs
* go#57444 cmd/link: need to handle new-style LoongArch relocs
* go#57427 crypto/x509: Verify on macOS does not return typed errors
* go#57345 cmd/compile: the loong64 intrinsic for CompareAndSwapUint32 function needs to sign extend its 'old' argument.
* go#57339 syscall, internal/poll: accept4-to-accept fallback removal broke Go code on Synology DSM 6.2 ARM devices
* go#57214 os: TestLstat failure on Linux Aarch64
* go#57212 reflect: sort.SliceStable sorts incorrectly on arm64 with less function created with reflect.MakeFunc and slice of sufficient length
* go#57124 sync/atomic: allow linked lists of atomic.Pointer
* go#57100 cmd/compile: non-retpoline-compatible errors
* go#57058 cmd/go: remove test dependency on gopkg.in service
* go#57055 cmd/go: TestScript/version_buildvcs_git_gpg (if enabled) fails on linux longtest builders
* go#56983 runtime: failure in TestRaiseException on windows-amd64-2012
* go#56834 cmd/link/internal/ppc64: too-far trampoline is reused
* go#56770 cmd/compile: walkConvInterface produces broken IR
* go#56744 cmd/compile: internal compiler error: missing typecheck
* go#56712 net: reenable TestLookupDotsWithRemoteSource and TestLookupGoogleSRV with a different target
* go#56154 net/http: bad handling of HEAD requests with a body
- ID
- SUSE-SU-2023:0733-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20230733-1/
- Published
-
2023-03-14T17:07:14
(18 months ago) - Modified
-
2023-03-14T17:07:14
(18 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1731
- ALAS-2023-1825
- ALAS-2023-1848
- ALAS-2023-1849
- ALAS-2023-1866
- ALAS-2023-1881
- ALAS2-2023-2015
- ALAS2-2023-2143
- ALAS2-2023-2163
- ALAS2-2023-2192
- ALAS2-2023-2193
- ALAS2-2023-2194
- ALAS2-2023-2238
- ALAS2-2023-2303
- ALPINE:CVE-2022-41723
- ALPINE:CVE-2022-41724
- ALPINE:CVE-2022-41725
- ALPINE:CVE-2023-24532
- ALSA-2023:3083
- ALSA-2023:6346
- ALSA-2023:6363
- ALSA-2023:6380
- ALSA-2023:6402
- ALSA-2023:6473
- ALSA-2023:6474
- ALSA-2023:6938
- ALSA-2023:6939
- ELSA-2023-3083
- ELSA-2023-6363
- ELSA-2023-6380
- ELSA-2023-6402
- ELSA-2023-6473
- ELSA-2023-6474
- ELSA-2023-6938
- ELSA-2023-6939
- FEDORA-2023-28c182b657
- FEDORA-2023-327346caa5
- FEDORA-2023-3737bc1c0a
- FEDORA-2023-8c02aee138
- FEDORA-2023-a5a5542890
- FEDORA-2023-abb47e24d8
- FEDORA-2023-ca444fdecf
- FEDORA-2023-cb20f08a4e
- FEDORA-2023-ccaf5538dd
- FEDORA-2023-e359fd31d2
- FREEBSD:3D73E384-AD1F-11ED-983C-83FE35862E3A
- FREEBSD:742279D6-BDBE-11ED-A179-2B68E9D12706
- GLSA-202311-09
- GO-2023-1568
- GO-2023-1569
- GO-2023-1570
- GO-2023-1571
- GO-2023-1621
- MS:CVE-2022-41723
- RHBA-2023:2181
- RHSA-2023:3083
- RHSA-2023:3318
- RHSA-2023:3319
- RHSA-2023:6346
- RHSA-2023:6363
- RHSA-2023:6380
- RHSA-2023:6402
- RHSA-2023:6473
- RHSA-2023:6474
- RHSA-2023:6938
- RHSA-2023:6939
- RHSA-2023:7058
- SUSE-SU-2023:0735-1
- SUSE-SU-2023:0811-1
- SUSE-SU-2023:0812-1
- SUSE-SU-2023:0821-1
- SUSE-SU-2023:0869-1
- SUSE-SU-2023:0871-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2598-1
- SUSE-SU-2023:3867-1
- SUSE-SU-2023:3868-1
- SUSE-SU-2023:3875-1
- SUSE-SU-2023:4124-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:3288-1
- USN-6140-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/go1.19?arch=x86_64&distro=sles-15&sp=3 | suse | go1.19 | < 1.19.7-150000.1.23.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/go1.19?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.19 | < 1.19.7-150000.1.23.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.19?arch=s390x&distro=sles-15&sp=3 | suse | go1.19 | < 1.19.7-150000.1.23.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/go1.19?arch=s390x&distro=opensuse-leap-15.4 | suse | go1.19 | < 1.19.7-150000.1.23.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/go1.19?arch=ppc64le&distro=sles-15&sp=3 | suse | go1.19 | < 1.19.7-150000.1.23.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/go1.19?arch=ppc64le&distro=opensuse-leap-15.4 | suse | go1.19 | < 1.19.7-150000.1.23.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/go1.19?arch=aarch64&distro=sles-15&sp=3 | suse | go1.19 | < 1.19.7-150000.1.23.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/go1.19?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.19 | < 1.19.7-150000.1.23.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/go1.19-race?arch=x86_64&distro=sles-15&sp=3 | suse | go1.19-race | < 1.19.7-150000.1.23.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/go1.19-race?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.19-race | < 1.19.7-150000.1.23.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.19-race?arch=aarch64&distro=sles-15&sp=3 | suse | go1.19-race | < 1.19.7-150000.1.23.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/go1.19-race?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.19-race | < 1.19.7-150000.1.23.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/go1.19-doc?arch=x86_64&distro=sles-15&sp=3 | suse | go1.19-doc | < 1.19.7-150000.1.23.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/go1.19-doc?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.19-doc | < 1.19.7-150000.1.23.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.19-doc?arch=s390x&distro=sles-15&sp=3 | suse | go1.19-doc | < 1.19.7-150000.1.23.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/go1.19-doc?arch=s390x&distro=opensuse-leap-15.4 | suse | go1.19-doc | < 1.19.7-150000.1.23.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/go1.19-doc?arch=ppc64le&distro=sles-15&sp=3 | suse | go1.19-doc | < 1.19.7-150000.1.23.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/go1.19-doc?arch=ppc64le&distro=opensuse-leap-15.4 | suse | go1.19-doc | < 1.19.7-150000.1.23.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/go1.19-doc?arch=aarch64&distro=sles-15&sp=3 | suse | go1.19-doc | < 1.19.7-150000.1.23.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/go1.19-doc?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.19-doc | < 1.19.7-150000.1.23.1 | opensuse-leap-15.4 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |