[SUSE-SU-2023:2312-1] Security update for go1.18-openssl
Severity
Important
Affected Packages
30
CVEs
28
Security update for go1.18-openssl
This update for go1.18-openssl fixes the following issues:
- Add subpackage go1.x-libstd compiled shared object libstd.so (jsc#PED-1962)
- Main go1.x package included libstd.so in previous versions
- Split libstd.so into subpackage that can be installed standalone
- Continues the slimming down of main go1.x package by 40 Mb
- Experimental and not recommended for general use, Go currently has no ABI
- Upstream Go has not committed to support buildmode=shared long-term
- Do not use in packaging, build static single binaries (the default)
- Upstream Go go1.x binary releases do not include libstd.so
- go1.x Suggests go1.x-libstd so not installed by default Recommends
- go1.x-libstd does not Require: go1.x so can install standalone
- Provides go-libstd unversioned package name
- Fix build step -buildmode=shared std to omit -linkshared
Packaging improvements:
- go1.x Suggests go1.x-doc so not installed by default Recommends
- Use Group: Development/Languages/Go instead of Other
Improvements to go1.x packaging spec:
- On Tumbleweed bootstrap with current default gcc13 and gccgo118
- On SLE-12 aarch64 ppc64le ppc64 remove overrides to bootstrap using go1.x package (%bcond_without gccgo). This is no longer needed on current SLE-12:Update and removing will consolidate the build configurations used.
- Change source URLs to go.dev as per Go upstream
- On x86_64 export GOAMD64=v1 as per the current baseline. At this time forgo GOAMD64=v3 option for x86_64_v3 support.
- On x86_64 %define go_amd64=v1 as current instruction baseline
Update to version 1.18.10.1 cut from the go1.18-openssl-fips
branch at the revision tagged go1.18.10-1-openssl-fips.- Merge branch dev.boringcrypto.go1.18 into go1.18-openssl-fips
- Merge go1.18.10 into dev.boringcrypto.go1.18
go1.18.10 (released 2023-01-10) includes fixes to cgo, the
compiler, the linker, and the crypto/x509, net/http, and syscall
packages.
Refs bsc#1193742 go1.18 release tracking- go#57705 misc/cgo: backport needed for dlltool fix
- go#57426 crypto/x509: Verify on macOS does not return typed errors
- go#57344 cmd/compile: the loong64 intrinsic for CompareAndSwapUint32 function needs to sign extend its 'old' argument.
- go#57338 syscall, internal/poll: accept4-to-accept fallback removal broke Go code on Synology DSM 6.2 ARM devices
- go#57213 os: TestLstat failure on Linux Aarch64
- go#57211 reflect: sort.SliceStable sorts incorrectly on arm64 with less function created with reflect.MakeFunc and slice of sufficient length
- go#57057 cmd/go: remove test dependency on gopkg.in service
- go#57054 cmd/go: TestScript/version_buildvcs_git_gpg (if enabled) fails on linux longtest builders
- go#57044 cgo: malformed DWARF TagVariable entry
- go#57028 cmd/cgo: Wrong types in compiler errors with clang 14
- go#56833 cmd/link/internal/ppc64: too-far trampoline is reused
- go#56711 net: reenable TestLookupDotsWithRemoteSource and TestLookupGoogleSRV with a different target
- go#56323 net/http: bad handling of HEAD requests with a body
- ID
- SUSE-SU-2023:2312-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20232312-1/
- Published
-
2023-05-30T06:54:51
(15 months ago) - Modified
-
2023-05-30T06:54:51
(15 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2022-1635
- ALAS-2023-1731
- ALAS-2023-1825
- ALAS-2023-1848
- ALAS-2023-1849
- ALAS-2023-1866
- ALAS-2023-1881
- ALAS2-2022-1807
- ALAS2-2022-1830
- ALAS2-2022-1846
- ALAS2-2022-1847
- ALAS2-2022-1851
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALAS2-2022-1887
- ALAS2-2023-1913
- ALAS2-2023-1926
- ALAS2-2023-2015
- ALAS2-2023-2143
- ALAS2-2023-2163
- ALAS2-2023-2192
- ALAS2-2023-2193
- ALAS2-2023-2194
- ALAS2-2023-2238
- ALAS2-2023-2303
- ALPINE:CVE-2022-1705
- ALPINE:CVE-2022-1962
- ALPINE:CVE-2022-24675
- ALPINE:CVE-2022-27536
- ALPINE:CVE-2022-27664
- ALPINE:CVE-2022-28131
- ALPINE:CVE-2022-28327
- ALPINE:CVE-2022-2879
- ALPINE:CVE-2022-2880
- ALPINE:CVE-2022-29526
- ALPINE:CVE-2022-29804
- ALPINE:CVE-2022-30580
- ALPINE:CVE-2022-30629
- ALPINE:CVE-2022-30630
- ALPINE:CVE-2022-30631
- ALPINE:CVE-2022-30632
- ALPINE:CVE-2022-30633
- ALPINE:CVE-2022-30634
- ALPINE:CVE-2022-30635
- ALPINE:CVE-2022-32148
- ALPINE:CVE-2022-32189
- ALPINE:CVE-2022-41715
- ALPINE:CVE-2022-41717
- ALPINE:CVE-2022-41723
- ALPINE:CVE-2022-41724
- ALPINE:CVE-2022-41725
- ALSA-2022:5775
- ALSA-2022:5799
- ALSA-2022:7129
- ALSA-2022:7519
- ALSA-2022:7529
- ALSA-2022:7548
- ALSA-2022:7648
- ALSA-2022:7950
- ALSA-2022:8057
- ALSA-2022:8098
- ALSA-2022:8250
- ALSA-2023:0328
- ALSA-2023:0446
- ALSA-2023:2167
- ALSA-2023:2177
- ALSA-2023:2193
- ALSA-2023:2204
- ALSA-2023:2222
- ALSA-2023:2236
- ALSA-2023:2253
- ALSA-2023:2282
- ALSA-2023:2283
- ALSA-2023:2357
- ALSA-2023:2367
- ALSA-2023:2758
- ALSA-2023:2780
- ALSA-2023:2784
- ALSA-2023:2785
- ALSA-2023:2802
- ALSA-2023:2866
- ALSA-2023:3083
- ALSA-2023:6346
- ALSA-2023:6363
- ALSA-2023:6380
- ALSA-2023:6402
- ALSA-2023:6420
- ALSA-2023:6473
- ALSA-2023:6474
- ALSA-2023:6938
- ALSA-2023:6939
- ALSA-2024:0121
- ALSA-2024:2180
- ALSA-2024:3254
- ELSA-2022-14844
- ELSA-2022-17956
- ELSA-2022-17957
- ELSA-2022-20693
- ELSA-2022-20694
- ELSA-2022-23681
- ELSA-2022-24267
- ELSA-2022-5337
- ELSA-2022-5775
- ELSA-2022-5799
- ELSA-2022-7129
- ELSA-2022-7519
- ELSA-2022-7529
- ELSA-2022-7548
- ELSA-2022-7648
- ELSA-2022-7950
- ELSA-2022-8057
- ELSA-2022-8250
- ELSA-2023-0328
- ELSA-2023-0446
- ELSA-2023-18908
- ELSA-2023-2167
- ELSA-2023-2177
- ELSA-2023-2204
- ELSA-2023-2222
- ELSA-2023-2253
- ELSA-2023-2282
- ELSA-2023-2283
- ELSA-2023-2357
- ELSA-2023-2367
- ELSA-2023-2592
- ELSA-2023-2758
- ELSA-2023-2780
- ELSA-2023-2784
- ELSA-2023-2785
- ELSA-2023-2802
- ELSA-2023-2866
- ELSA-2023-3083
- ELSA-2023-6363
- ELSA-2023-6380
- ELSA-2023-6402
- ELSA-2023-6420
- ELSA-2023-6473
- ELSA-2023-6474
- ELSA-2023-6938
- ELSA-2023-6939
- ELSA-2024-0121
- ELSA-2024-2180
- ELSA-2024-2988
- ELSA-2024-3254
- FEDORA-2022-0e313cc582
- FEDORA-2022-13ad572b5a
- FEDORA-2022-1f829990f0
- FEDORA-2022-30c5ed5625
- FEDORA-2022-3969b64d4b
- FEDORA-2022-3e1ade35db
- FEDORA-2022-45097317b4
- FEDORA-2022-4a48180f3f
- FEDORA-2022-4b5537c44c
- FEDORA-2022-5038c3236c
- FEDORA-2022-53e0f427dd
- FEDORA-2022-53f0c619c5
- FEDORA-2022-59a20edab2
- FEDORA-2022-5ef0bd9a27
- FEDORA-2022-6716cd0da2
- FEDORA-2022-67ec8c61d0
- FEDORA-2022-739c7a0058
- FEDORA-2022-741325e9a0
- FEDORA-2022-8bf5635efc
- FEDORA-2022-9986fbb3d7
- FEDORA-2022-9a9a638d09
- FEDORA-2022-a49babed75
- FEDORA-2022-b0bd0219ff
- FEDORA-2022-ba365d3703
- FEDORA-2022-c0f780ecf1
- FEDORA-2022-e46e6e8317
- FEDORA-2022-e674d52438
- FEDORA-2022-ea8f4e232d
- FEDORA-2022-fae3ecee19
- FEDORA-2022-ffe7dba2cb
- FEDORA-2023-0c354a3f9a
- FEDORA-2023-0fa7715821
- FEDORA-2023-0fff8bc164
- FEDORA-2023-2663dc67d8
- FEDORA-2023-267503a090
- FEDORA-2023-28c182b657
- FEDORA-2023-2df9d60e4c
- FEDORA-2023-322314ad50
- FEDORA-2023-327346caa5
- FEDORA-2023-3737bc1c0a
- FEDORA-2023-3baf3f43a0
- FEDORA-2023-3dba09f630
- FEDORA-2023-4e2068ba5d
- FEDORA-2023-5eca6a8326
- FEDORA-2023-62ce942e75
- FEDORA-2023-6550d9323b
- FEDORA-2023-6cfe7492c1
- FEDORA-2023-6d71ff268e
- FEDORA-2023-70eb8ba61e
- FEDORA-2023-74e5545901
- FEDORA-2023-8b700042ac
- FEDORA-2023-8c02aee138
- FEDORA-2023-8ecc0e487e
- FEDORA-2023-946dfaf17f
- FEDORA-2023-a5a5542890
- FEDORA-2023-aa7c75ed4a
- FEDORA-2023-abb47e24d8
- FEDORA-2023-ac4651c9b2
- FEDORA-2023-af2e3d1c18
- FEDORA-2023-c0149844e2
- FEDORA-2023-c9b2182a4e
- FEDORA-2023-ca444fdecf
- FEDORA-2023-cb20f08a4e
- FEDORA-2023-cb3a59a3df
- FEDORA-2023-ccaf5538dd
- FEDORA-2023-ce2836acfa
- FEDORA-2023-e16469fdec
- FEDORA-2023-e359fd31d2
- FEDORA-2023-e82fd2abcb
- FEDORA-2023-e8c27ba884
- FEDORA-2023-ee472c698c
- FEDORA-2023-f4bd7ab2f7
- FEDORA-2024-80e062d21a
- FEDORA-2024-9cc0e0c63e
- FEDORA-2024-ae653fb07b
- FEDORA-2024-b85b97c0e9
- FEDORA-2024-d652859efb
- FEDORA-2024-fb32950d11
- FEDORA-2024-fd3545a844
- FREEBSD:15888C7E-E659-11EC-B7FE-10C37B4AC2EA
- FREEBSD:26B1100A-5A27-11ED-ABFE-29AC76EC31B5
- FREEBSD:3D73E384-AD1F-11ED-983C-83FE35862E3A
- FREEBSD:61BCE714-CA0C-11EC-9CFC-10C37B4AC2EA
- FREEBSD:6F5192F5-75A7-11ED-83C0-411D43CE7FE4
- FREEBSD:6FEA7103-2EA4-11ED-B403-3DAE8AC60D3E
- FREEBSD:7F8D5435-125A-11ED-9A69-10C37B4AC2EA
- FREEBSD:854C2AFB-4424-11ED-AF97-ADCABF310F9B
- FREEBSD:A1360138-D446-11EC-8EA1-10C37B4AC2EA
- FREEBSD:A4F2416C-02A0-11ED-B817-10C37B4AC2EA
- GLSA-202208-02
- GLSA-202209-26
- GLSA-202311-09
- GO-2022-0433
- GO-2022-0434
- GO-2022-0435
- GO-2022-0477
- GO-2022-0493
- GO-2022-0515
- GO-2022-0520
- GO-2022-0521
- GO-2022-0522
- GO-2022-0523
- GO-2022-0524
- GO-2022-0525
- GO-2022-0526
- GO-2022-0527
- GO-2022-0531
- GO-2022-0532
- GO-2022-0533
- GO-2022-0537
- GO-2022-0969
- GO-2022-1037
- GO-2022-1038
- GO-2022-1039
- GO-2022-1095
- GO-2022-1143
- GO-2022-1144
- GO-2023-1569
- GO-2023-1570
- GO-2023-1571
- MS:CVE-2022-1705
- MS:CVE-2022-1962
- MS:CVE-2022-24675
- MS:CVE-2022-27664
- MS:CVE-2022-28131
- MS:CVE-2022-28327
- MS:CVE-2022-29526
- MS:CVE-2022-30580
- MS:CVE-2022-30629
- MS:CVE-2022-30630
- MS:CVE-2022-30631
- MS:CVE-2022-30632
- MS:CVE-2022-30633
- MS:CVE-2022-30635
- MS:CVE-2022-32148
- MS:CVE-2022-32189
- MS:CVE-2022-41717
- MS:CVE-2022-41723
- RHBA-2023:2181
- RHSA-2022:5337
- RHSA-2022:5775
- RHSA-2022:5799
- RHSA-2022:7129
- RHSA-2022:7519
- RHSA-2022:7529
- RHSA-2022:7548
- RHSA-2022:7648
- RHSA-2022:7950
- RHSA-2022:8057
- RHSA-2022:8098
- RHSA-2022:8250
- RHSA-2023:0328
- RHSA-2023:0446
- RHSA-2023:2167
- RHSA-2023:2177
- RHSA-2023:2193
- RHSA-2023:2204
- RHSA-2023:2222
- RHSA-2023:2236
- RHSA-2023:2253
- RHSA-2023:2282
- RHSA-2023:2283
- RHSA-2023:2357
- RHSA-2023:2367
- RHSA-2023:2592
- RHSA-2023:2758
- RHSA-2023:2780
- RHSA-2023:2784
- RHSA-2023:2785
- RHSA-2023:2802
- RHSA-2023:2866
- RHSA-2023:3083
- RHSA-2023:6346
- RHSA-2023:6363
- RHSA-2023:6380
- RHSA-2023:6402
- RHSA-2023:6420
- RHSA-2023:6473
- RHSA-2023:6474
- RHSA-2023:6938
- RHSA-2023:6939
- RHSA-2023:7058
- RHSA-2024:0121
- RHSA-2024:2180
- RHSA-2024:2988
- RHSA-2024:3254
- RLSA-2022:5337
- RLSA-2022:5775
- RLSA-2022:7129
- RLSA-2022:7519
- RLSA-2022:7529
- RLSA-2022:7548
- RLSA-2022:7648
- RLSA-2022:7950
- RLSA-2022:8057
- RLSA-2022:8098
- RLSA-2022:8250
- RLSA-2023:0328
- RLSA-2023:0446
- SUSE-SU-2022:1410-1
- SUSE-SU-2022:1411-1
- SUSE-SU-2022:1829-1
- SUSE-SU-2022:1862-1
- SUSE-SU-2022:2004-1
- SUSE-SU-2022:2005-1
- SUSE-SU-2022:2671-1
- SUSE-SU-2022:2672-1
- SUSE-SU-2022:3325-1
- SUSE-SU-2022:3326-1
- SUSE-SU-2022:3668-1
- SUSE-SU-2022:3669-1
- SUSE-SU-2022:4054-1
- SUSE-SU-2022:4055-1
- SUSE-SU-2022:4397-1
- SUSE-SU-2022:4398-1
- SUSE-SU-2023:0733-1
- SUSE-SU-2023:0735-1
- SUSE-SU-2023:0811-1
- SUSE-SU-2023:0812-1
- SUSE-SU-2023:0821-1
- SUSE-SU-2023:0869-1
- SUSE-SU-2023:0871-1
- SUSE-SU-2023:2182-1
- SUSE-SU-2023:2183-1
- SUSE-SU-2023:2185-1
- SUSE-SU-2023:2187-1
- SUSE-SU-2023:2575-1
- SUSE-SU-2023:2578-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2023:2598-1
- SUSE-SU-2023:3867-1
- SUSE-SU-2023:3868-1
- SUSE-SU-2023:3875-1
- SUSE-SU-2023:4124-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:0486-1
- SUSE-SU-2024:0487-1
- USN-6038-1
- USN-6038-2
- USN-6140-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/go1.18-openssl?arch=x86_64&distro=sles-15&sp=3 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/go1.18-openssl?arch=x86_64&distro=opensuse-leap-15.5 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/go1.18-openssl?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.18-openssl?arch=s390x&distro=sles-15&sp=3 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/go1.18-openssl?arch=s390x&distro=opensuse-leap-15.5 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/go1.18-openssl?arch=s390x&distro=opensuse-leap-15.4 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/go1.18-openssl?arch=ppc64le&distro=sles-15&sp=3 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/go1.18-openssl?arch=ppc64le&distro=opensuse-leap-15.5 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/go1.18-openssl?arch=ppc64le&distro=opensuse-leap-15.4 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/go1.18-openssl?arch=aarch64&distro=sles-15&sp=3 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/go1.18-openssl?arch=aarch64&distro=opensuse-leap-15.5 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.5 | aarch64 | |
Affected | pkg:rpm/suse/go1.18-openssl?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.18-openssl | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/go1.18-openssl-race?arch=x86_64&distro=sles-15&sp=3 | suse | go1.18-openssl-race | < 1.18.10.1-150000.1.9.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/go1.18-openssl-race?arch=x86_64&distro=opensuse-leap-15.5 | suse | go1.18-openssl-race | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/go1.18-openssl-race?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.18-openssl-race | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.18-openssl-race?arch=aarch64&distro=sles-15&sp=3 | suse | go1.18-openssl-race | < 1.18.10.1-150000.1.9.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/go1.18-openssl-race?arch=aarch64&distro=opensuse-leap-15.5 | suse | go1.18-openssl-race | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.5 | aarch64 | |
Affected | pkg:rpm/suse/go1.18-openssl-race?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.18-openssl-race | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=x86_64&distro=sles-15&sp=3 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=x86_64&distro=opensuse-leap-15.5 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=s390x&distro=sles-15&sp=3 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=s390x&distro=opensuse-leap-15.5 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=s390x&distro=opensuse-leap-15.4 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=ppc64le&distro=sles-15&sp=3 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=ppc64le&distro=opensuse-leap-15.5 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=ppc64le&distro=opensuse-leap-15.4 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=aarch64&distro=sles-15&sp=3 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=aarch64&distro=opensuse-leap-15.5 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.5 | aarch64 | |
Affected | pkg:rpm/suse/go1.18-openssl-doc?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.18-openssl-doc | < 1.18.10.1-150000.1.9.1 | opensuse-leap-15.4 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |