[SUSE-SU-2023:4471-1] Security update for go1.21
Severity
Moderate
Affected Packages
24
CVEs
2
Security update for go1.21
This update for go1.21 fixes the following issues:
go1.21.4 (released 2023-11-07) includes security fixes to the
path/filepath package, as well as bug fixes to the linker, the
runtime, the compiler, and the go/types, net/http, and
runtime/cgo packages.
- security: fix CVE-2023-45283 CVE-2023-45284 path/filepath: insecure parsing of Windows paths (bsc#1216943, bsc#1216944)
- spec: update unification rules
- cmd/compile: internal compiler error: expected struct value to have type struct
- cmd/link: split text sections for arm 32-bit
- runtime: MADV_COLLAPSE causes production performance issues on Linux
- go/types, x/tools/go/ssa: panic: type param without replacement encountered
- cmd/compile: -buildmode=c-archive produces code not suitable for use in a shared object on arm64
- net/http: http2 page fails on firefox/safari if pushing resources
- ID
- SUSE-SU-2023:4471-1
- Severity
- moderate
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20234471-1/
- Published
-
2023-11-16T18:01:00
(10 months ago) - Modified
-
2023-11-16T18:01:00
(10 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4471-1.json | |
Suse | URL for SUSE-SU-2023:4471-1 | https://www.suse.com/support/update/announcement/2023/suse-su-20234471-1/ | |
Suse | E-Mail link for SUSE-SU-2023:4471-1 | https://lists.suse.com/pipermail/sle-security-updates/2023-November/017048.html | |
Bugzilla | SUSE Bug 1212475 | https://bugzilla.suse.com/1212475 | |
Bugzilla | SUSE Bug 1216943 | https://bugzilla.suse.com/1216943 | |
Bugzilla | SUSE Bug 1216944 | https://bugzilla.suse.com/1216944 | |
CVE | SUSE CVE CVE-2023-45283 page | https://www.suse.com/security/cve/CVE-2023-45283/ | |
CVE | SUSE CVE CVE-2023-45284 page | https://www.suse.com/security/cve/CVE-2023-45284/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/go1.21?arch=x86_64&distro=opensuse-leap-15.5 | suse | go1.21 | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/go1.21?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.21 | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.21?arch=s390x&distro=opensuse-leap-15.5 | suse | go1.21 | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/go1.21?arch=s390x&distro=opensuse-leap-15.4 | suse | go1.21 | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/go1.21?arch=ppc64le&distro=opensuse-leap-15.5 | suse | go1.21 | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/go1.21?arch=ppc64le&distro=opensuse-leap-15.4 | suse | go1.21 | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/go1.21?arch=aarch64&distro=opensuse-leap-15.5 | suse | go1.21 | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | aarch64 | |
Affected | pkg:rpm/suse/go1.21?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.21 | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/go1.21-race?arch=x86_64&distro=opensuse-leap-15.5 | suse | go1.21-race | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/go1.21-race?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.21-race | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.21-race?arch=s390x&distro=opensuse-leap-15.5 | suse | go1.21-race | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/go1.21-race?arch=s390x&distro=opensuse-leap-15.4 | suse | go1.21-race | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/go1.21-race?arch=ppc64le&distro=opensuse-leap-15.5 | suse | go1.21-race | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/go1.21-race?arch=ppc64le&distro=opensuse-leap-15.4 | suse | go1.21-race | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/go1.21-race?arch=aarch64&distro=opensuse-leap-15.5 | suse | go1.21-race | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | aarch64 | |
Affected | pkg:rpm/suse/go1.21-race?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.21-race | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/go1.21-doc?arch=x86_64&distro=opensuse-leap-15.5 | suse | go1.21-doc | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/go1.21-doc?arch=x86_64&distro=opensuse-leap-15.4 | suse | go1.21-doc | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/go1.21-doc?arch=s390x&distro=opensuse-leap-15.5 | suse | go1.21-doc | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/go1.21-doc?arch=s390x&distro=opensuse-leap-15.4 | suse | go1.21-doc | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/go1.21-doc?arch=ppc64le&distro=opensuse-leap-15.5 | suse | go1.21-doc | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/go1.21-doc?arch=ppc64le&distro=opensuse-leap-15.4 | suse | go1.21-doc | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/go1.21-doc?arch=aarch64&distro=opensuse-leap-15.5 | suse | go1.21-doc | < 1.21.4-150000.1.15.1 | opensuse-leap-15.5 | aarch64 | |
Affected | pkg:rpm/suse/go1.21-doc?arch=aarch64&distro=opensuse-leap-15.4 | suse | go1.21-doc | < 1.21.4-150000.1.15.1 | opensuse-leap-15.4 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |