[SUSE-SU-2023:4469-1] Security update for go1.21-openssl
Severity
Moderate
Affected Packages
24
CVEs
10
Security update for go1.21-openssl
This update for go1.21-openssl fixes the following issues:
Update to version 1.21.4.1 cut from the go1.21-openssl-fips
branch at the revision tagged go1.21.4-1-openssl-fips.
- Update to go1.21.4
go1.21.4 (released 2023-11-07) includes security fixes to the
path/filepath package, as well as bug fixes to the linker, the
runtime, the compiler, and the go/types, net/http, and
runtime/cgo packages.
- security: fix CVE-2023-45283 CVE-2023-45284 path/filepath: insecure parsing of Windows paths (bsc#1216943, bsc#1216944)
- spec: update unification rules
- cmd/compile: internal compiler error: expected struct value to have type struct
- cmd/link: split text sections for arm 32-bit
- runtime: MADV_COLLAPSE causes production performance issues on Linux
- go/types, x/tools/go/ssa: panic: type param without replacement encountered
- cmd/compile: -buildmode=c-archive produces code not suitable for use in a shared object on arm64
- net/http: http2 page fails on firefox/safari if pushing resources
Initial package go1.21-openssl version 1.21.3.1 cut from the
go1.21-openssl-fips branch at the revision tagged
go1.21.3-1-openssl-fips. (jsc#SLE-18320)
- Go upstream merged branch dev.boringcrypto in go1.19+.
- In go1.x enable BoringCrypto via GOEXPERIMENT=boringcrypto.
- In go1.x-openssl enable FIPS mode (or boring mode as the package is named) either via an environment variable GOLANG_FIPS=1 or by virtue of booting the host in FIPS mode.
- When the operating system is operating in FIPS mode, Go applications which import crypto/tls/fipsonly limit operations to the FIPS ciphersuite.
- go1.x-openssl is delivered as two large patches to go1.x applying necessary modifications from the golang-fips/go GitHub project for the Go crypto library to use OpenSSL as the external cryptographic library in a FIPS compliant way.
- go1.x-openssl modifies the crypto/* packages to use OpenSSL for cryptographic operations.
- go1.x-openssl uses dlopen() to call into OpenSSL.
- SUSE RPM packaging introduces a fourth version digit go1.x.y.z corresponding to the golang-fips/go patchset tagged revision.
- Patchset improvements can be updated independently of upstream Go maintenance releases.
- ID
- SUSE-SU-2023:4469-1
- Severity
- moderate
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20234469-1/
- Published
-
2023-11-16T17:59:49
(10 months ago) - Modified
-
2023-11-16T17:59:49
(10 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1848
- ALAS-2023-1868
- ALAS-2023-1869
- ALAS-2023-1870
- ALAS-2023-1871
- ALAS-2024-1903
- ALAS-2024-1920
- ALAS2-2023-2312
- ALAS2-2023-2313
- ALAS2-2023-2324
- ALAS2-2023-2325
- ALAS2-2023-2326
- ALAS2-2023-2339
- ALAS2-2024-2388
- ALAS2-2024-2424
- ALAS2-2024-2458
- ALPINE:CVE-2023-39318
- ALPINE:CVE-2023-39319
- ALPINE:CVE-2023-39320
- ALPINE:CVE-2023-39321
- ALPINE:CVE-2023-39322
- ALPINE:CVE-2023-39323
- ALPINE:CVE-2023-39325
- ALPINE:CVE-2023-44487
- ALSA-2023:5708
- ALSA-2023:5709
- ALSA-2023:5710
- ALSA-2023:5711
- ALSA-2023:5712
- ALSA-2023:5713
- ALSA-2023:5721
- ALSA-2023:5738
- ALSA-2023:5749
- ALSA-2023:5765
- ALSA-2023:5837
- ALSA-2023:5838
- ALSA-2023:5849
- ALSA-2023:5850
- ALSA-2023:5863
- ALSA-2023:5867
- ALSA-2023:5869
- ALSA-2023:5924
- ALSA-2023:5928
- ALSA-2023:5929
- ALSA-2023:5989
- ALSA-2023:6077
- ALSA-2023:6120
- ALSA-2023:6746
- ALSA-2023:7205
- ALSA-2023:7762
- ALSA-2023:7763
- ALSA-2023:7764
- ALSA-2023:7765
- ALSA-2023:7766
- ALSA-2024:0121
- ALSA-2024:1444
- ALSA-2024:2160
- CISA-2023:1010
- CISCO-SA-HTTP2-RESET-D8KF32VZ
- DSA-5521-1
- DSA-5522-1
- DSA-5540-1
- DSA-5549-1
- DSA-5558-1
- DSA-5570-1
- ELSA-2023-13028
- ELSA-2023-13029
- ELSA-2023-13053
- ELSA-2023-13054
- ELSA-2023-5708
- ELSA-2023-5709
- ELSA-2023-5710
- ELSA-2023-5711
- ELSA-2023-5712
- ELSA-2023-5713
- ELSA-2023-5721
- ELSA-2023-5738
- ELSA-2023-5749
- ELSA-2023-5765
- ELSA-2023-5837
- ELSA-2023-5838
- ELSA-2023-5849
- ELSA-2023-5850
- ELSA-2023-5863
- ELSA-2023-5867
- ELSA-2023-5869
- ELSA-2023-5924
- ELSA-2023-5928
- ELSA-2023-5929
- ELSA-2023-5989
- ELSA-2023-6120
- ELSA-2023-6746
- ELSA-2023-7205
- ELSA-2023-7762
- ELSA-2023-7763
- ELSA-2023-7764
- ELSA-2023-7765
- ELSA-2023-7766
- ELSA-2024-0121
- ELSA-2024-1444
- ELSA-2024-2988
- FEDORA-2023-0259c3f26f
- FEDORA-2023-0d46257314
- FEDORA-2023-17efd3f2cd
- FEDORA-2023-1caffb88af
- FEDORA-2023-257f33c602
- FEDORA-2023-2a9214af5f
- FEDORA-2023-327346caa5
- FEDORA-2023-3a895ff65c
- FEDORA-2023-3f70b8d406
- FEDORA-2023-492b7be466
- FEDORA-2023-4bf641255e
- FEDORA-2023-4d2fd884ea
- FEDORA-2023-5029b92850
- FEDORA-2023-548163deb1
- FEDORA-2023-54fadada12
- FEDORA-2023-5ff7bf1dd8
- FEDORA-2023-66966ae3d0
- FEDORA-2023-6f4c5b6331
- FEDORA-2023-7934802344
- FEDORA-2023-7b52921cae
- FEDORA-2023-822aab0a5a
- FEDORA-2023-a5a5542890
- FEDORA-2023-b2c50535cb
- FEDORA-2023-b43faebc9f
- FEDORA-2023-b60ff8c9ec
- FEDORA-2023-b75ee820ce
- FEDORA-2023-c0c6a91330
- FEDORA-2023-c858d2c53b
- FEDORA-2023-d5030c983c
- FEDORA-2023-d58c8eeb7c
- FEDORA-2023-dbe64661af
- FEDORA-2023-e359fd31d2
- FEDORA-2023-e3e4e3f51a
- FEDORA-2023-e9c04d81c1
- FEDORA-2023-ed2642fd58
- FEDORA-2023-f66fc0f62a
- FEDORA-2023-fa2d7b25d9
- FEDORA-2023-fa2ec3d3e0
- FEDORA-2023-fe53e13b5b
- FEDORA-2024-07c811c7a5
- FEDORA-2024-0ac454dafc
- FEDORA-2024-0d4d9925a2
- FEDORA-2024-35c28f59d1
- FEDORA-2024-5d8e87ec66
- FEDORA-2024-80e062d21a
- FEDORA-2024-9cc0e0c63e
- FEDORA-2024-ae653fb07b
- FEDORA-2024-b85b97c0e9
- FEDORA-2024-c3e32c5635
- FEDORA-2024-cafa04a149
- FEDORA-2024-d652859efb
- FEDORA-2024-f99ecead66
- FEDORA-2024-fb32950d11
- FEDORA-2024-fd3545a844
- FREEBSD:1EE26D45-6DDB-11EE-9898-00E081B7AA2D
- FREEBSD:7A1B2624-6A89-11EE-AF06-5404A68AD561
- FREEBSD:BEB36F39-4D74-11EE-985E-BFF341E78D94
- FREEBSD:BF545001-B96D-42E4-9D2E-60FDEE204A43
- FREEBSD:F25A34B1-910D-11EE-A1A2-641C67A117D8
- GLSA-202311-09
- GLSA-202408-07
- GLSA-202408-10
- GO-2023-2041
- GO-2023-2042
- GO-2023-2043
- GO-2023-2044
- GO-2023-2045
- GO-2023-2095
- GO-2023-2102
- GO-2023-2185
- GO-2023-2186
- JENKINS:SECURITY-3291
- MAVEN:GHSA-QPPJ-FM5R-HXR3
- MS:CVE-2023-44487
- openSUSE-SU-2023:0360-1
- RHBA-2023:6364
- RHBA-2023:6928
- RHEA-2023:6562
- RHEA-2023:6741
- RHSA-2023:5708
- RHSA-2023:5709
- RHSA-2023:5710
- RHSA-2023:5711
- RHSA-2023:5712
- RHSA-2023:5713
- RHSA-2023:5721
- RHSA-2023:5738
- RHSA-2023:5749
- RHSA-2023:5765
- RHSA-2023:5835
- RHSA-2023:5837
- RHSA-2023:5838
- RHSA-2023:5849
- RHSA-2023:5850
- RHSA-2023:5863
- RHSA-2023:5867
- RHSA-2023:5869
- RHSA-2023:5924
- RHSA-2023:5928
- RHSA-2023:5929
- RHSA-2023:5989
- RHSA-2023:6077
- RHSA-2023:6120
- RHSA-2023:6746
- RHSA-2023:7205
- RHSA-2023:7762
- RHSA-2023:7763
- RHSA-2023:7764
- RHSA-2023:7765
- RHSA-2023:7766
- RHSA-2024:0121
- RHSA-2024:1444
- RHSA-2024:2160
- RHSA-2024:2988
- RLSA-2023:5708
- RLSA-2023:5749
- RLSA-2023:5765
- RLSA-2023:5838
- RLSA-2023:5863
- RLSA-2023:5924
- RLSA-2023:5928
- RLSA-2023:6077
- SSA:2023-284-02
- SUSE-SU-2023:3700-1
- SUSE-SU-2023:3701-1
- SUSE-SU-2023:3840-1
- SUSE-SU-2023:4017-1
- SUSE-SU-2023:4018-1
- SUSE-SU-2023:4068-1
- SUSE-SU-2023:4069-1
- SUSE-SU-2023:4129-1
- SUSE-SU-2023:4132-1
- SUSE-SU-2023:4133-1
- SUSE-SU-2023:4150-1
- SUSE-SU-2023:4155-1
- SUSE-SU-2023:4163-1
- SUSE-SU-2023:4199-1
- SUSE-SU-2023:4200-1
- SUSE-SU-2023:4207-1
- SUSE-SU-2023:4210-1
- SUSE-SU-2023:4259-1
- SUSE-SU-2023:4295-1
- SUSE-SU-2023:4373-1
- SUSE-SU-2023:4374-1
- SUSE-SU-2023:4470-1
- SUSE-SU-2023:4471-1
- SUSE-SU-2023:4472-1
- SUSE-SU-2023:4492-1
- SUSE-SU-2023:4624-1
- SUSE-SU-2023:4708-1
- SUSE-SU-2023:4709-1
- SUSE-SU-2023:4930-1
- SUSE-SU-2023:4931-1
- SUSE-SU-2024:0573-1
- SUSE-SU-2024:3094-1
- SUSE-SU-2024:3097-1
- SUSE-SU-2024:3098-1
- TOMCAT:CVE-2023-44487
- USN-6427-1
- USN-6427-2
- USN-6438-1
- USN-6505-1
- USN-6574-1
- USN-6754-1
- USN-6994-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/go1.21-openssl?arch=x86_64&distro=opensuse-leap-15.5 | suse | go1.21-openssl | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/go1.21-openssl?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.21-openssl | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.21-openssl?arch=s390x&distro=opensuse-leap-15.5 | suse | go1.21-openssl | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/go1.21-openssl?arch=s390x&distro=opensuse-leap-15.4 | suse | go1.21-openssl | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/go1.21-openssl?arch=ppc64le&distro=opensuse-leap-15.5 | suse | go1.21-openssl | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/go1.21-openssl?arch=ppc64le&distro=opensuse-leap-15.4 | suse | go1.21-openssl | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/go1.21-openssl?arch=aarch64&distro=opensuse-leap-15.5 | suse | go1.21-openssl | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | aarch64 | |
Affected | pkg:rpm/suse/go1.21-openssl?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.21-openssl | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/go1.21-openssl-race?arch=x86_64&distro=opensuse-leap-15.5 | suse | go1.21-openssl-race | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/go1.21-openssl-race?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.21-openssl-race | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.21-openssl-race?arch=s390x&distro=opensuse-leap-15.5 | suse | go1.21-openssl-race | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/go1.21-openssl-race?arch=s390x&distro=opensuse-leap-15.4 | suse | go1.21-openssl-race | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/go1.21-openssl-race?arch=ppc64le&distro=opensuse-leap-15.5 | suse | go1.21-openssl-race | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/go1.21-openssl-race?arch=ppc64le&distro=opensuse-leap-15.4 | suse | go1.21-openssl-race | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/go1.21-openssl-race?arch=aarch64&distro=opensuse-leap-15.5 | suse | go1.21-openssl-race | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | aarch64 | |
Affected | pkg:rpm/suse/go1.21-openssl-race?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.21-openssl-race | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/go1.21-openssl-doc?arch=x86_64&distro=opensuse-leap-15.5 | suse | go1.21-openssl-doc | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/go1.21-openssl-doc?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.21-openssl-doc | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.21-openssl-doc?arch=s390x&distro=opensuse-leap-15.5 | suse | go1.21-openssl-doc | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/go1.21-openssl-doc?arch=s390x&distro=opensuse-leap-15.4 | suse | go1.21-openssl-doc | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/go1.21-openssl-doc?arch=ppc64le&distro=opensuse-leap-15.5 | suse | go1.21-openssl-doc | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/go1.21-openssl-doc?arch=ppc64le&distro=opensuse-leap-15.4 | suse | go1.21-openssl-doc | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/go1.21-openssl-doc?arch=aarch64&distro=opensuse-leap-15.5 | suse | go1.21-openssl-doc | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.5 | aarch64 | |
Affected | pkg:rpm/suse/go1.21-openssl-doc?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.21-openssl-doc | < 1.21.4.1-150000.1.5.1 | opensuse-leap-15.4 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |