[SUSE-SU-2024:3089-1] Security update for go1.21-openssl
Severity
Important
CVEs
10
Security update for go1.21-openssl
This update for go1.21-openssl fixes the following issues:
- CVE-2024-24791: Fixed denial of service due to improper 100-continue handling (bsc#1227314)
- CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973)
- CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip (bsc#1225974)
- CVE-2024-24787: Fixed arbitrary code execution during build on darwin in cmd/go (bsc#1224017)
- CVE-2023-45288: Fixed denial of service due to close connections when receiving too many headers in net/http and x/net/http2 (bsc#1221400)
- CVE-2023-45289: Fixed incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http and net/http/cookiejar (bsc#1221000)
- CVE-2023-45290: Fixed memory exhaustion in Request.ParseMultipartForm in net/http (bsc#1221001)
- CVE-2024-24783: Fixed denial of service on certificates with an unknown public key algorithm in crypto/x509 (bsc#1220999)
- CVE-2024-24784: Fixed comments in display names are incorrectly handled in net/mail (bsc#1221002)
- CVE-2024-24785: Fixed errors returned from MarshalJSON methods may break template escaping in html/template (bsc#1221003)
Other fixes:
- Update to version 1.21.13.1 cut from the go1.21-fips-release (jsc#SLE-18320)
- Update to version 1.21.13 (bsc#1212475)
- Remove subpackage go1.x-openssl-libstd for compiled shared object libstd.so. (jsc#PED-1962)
- Ensure VERSION file is present in GOROOT as required by go tool dist and go tool distpack (bsc#1219988)
- ID
- SUSE-SU-2024:3089-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20243089-1/
- Published
-
2024-09-03T13:52:11
(13 days ago) - Modified
-
2024-09-03T13:52:11
(13 days ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS2-2024-2550
- ALAS2-2024-2554
- ALAS2-2024-2555
- ALAS2-2024-2556
- ALAS2-2024-2568
- ALAS2-2024-2576
- ALAS2-2024-2598
- ALAS2-2024-2618
- ALPINE:CVE-2023-45288
- ALPINE:CVE-2023-45289
- ALPINE:CVE-2023-45290
- ALPINE:CVE-2024-24783
- ALPINE:CVE-2024-24784
- ALPINE:CVE-2024-24785
- ALPINE:CVE-2024-24789
- ALPINE:CVE-2024-24790
- ALPINE:CVE-2024-24791
- ALSA-2024:1962
- ALSA-2024:1963
- ALSA-2024:2079
- ALSA-2024:2562
- ALSA-2024:2699
- ALSA-2024:2724
- ALSA-2024:3259
- ALSA-2024:3346
- ALSA-2024:3826
- ALSA-2024:3827
- ALSA-2024:3830
- ALSA-2024:3831
- ALSA-2024:4212
- ALSA-2024:4237
- ALSA-2024:5258
- ALSA-2024:5291
- ALSA-2024:6186
- ALSA-2024:6187
- ALSA-2024:6188
- ALSA-2024:6189
- ALSA-2024:6194
- ALSA-2024:6195
- ELSA-2024-1962
- ELSA-2024-1963
- ELSA-2024-2562
- ELSA-2024-2699
- ELSA-2024-2724
- ELSA-2024-3259
- ELSA-2024-3346
- ELSA-2024-3826
- ELSA-2024-3827
- ELSA-2024-3830
- ELSA-2024-3831
- ELSA-2024-4212
- ELSA-2024-4237
- ELSA-2024-5258
- ELSA-2024-5291
- ELSA-2024-6186
- ELSA-2024-6187
- ELSA-2024-6188
- ELSA-2024-6189
- ELSA-2024-6194
- ELSA-2024-6195
- FEDORA-2024-15039ba9f9
- FEDORA-2024-35147eb6ad
- FEDORA-2024-5b06c85574
- FEDORA-2024-96a7a68962
- FEDORA-2024-c83208238d
- FEDORA-2024-ce2eefc399
- FREEBSD:219AAA1E-2AFF-11EF-AB37-5404A68AD561
- FREEBSD:A5C64F6F-2AF3-11EF-A77E-901B0E9408DC
- FREEBSD:B0374722-3912-11EF-A77E-901B0E9408DC
- FREEBSD:B1B039EC-DBFC-11EE-9165-901B0E9408DC
- FREEBSD:C092BE0E-F7CC-11EE-AA6B-B42E991FC52E
- FREEBSD:CDB5E0E3-FAFC-11EE-9C21-901B0E9408DC
- FREEBSD:F0BA7008-2BBD-11EF-B4CA-814A3D504243
- GLSA-202408-07
- GO-2024-2598
- GO-2024-2599
- GO-2024-2600
- GO-2024-2609
- GO-2024-2610
- GO-2024-2687
- GO-2024-2825
- GO-2024-2887
- GO-2024-2888
- GO-2024-2963
- RHSA-2024:1962
- RHSA-2024:1963
- RHSA-2024:2079
- RHSA-2024:2562
- RHSA-2024:2625
- RHSA-2024:2699
- RHSA-2024:2724
- RHSA-2024:3259
- RHSA-2024:3346
- RHSA-2024:3826
- RHSA-2024:3827
- RHSA-2024:3830
- RHSA-2024:3831
- RHSA-2024:4212
- RHSA-2024:4237
- RHSA-2024:5258
- RHSA-2024:5291
- RHSA-2024:6186
- RHSA-2024:6187
- RHSA-2024:6188
- RHSA-2024:6189
- RHSA-2024:6194
- RHSA-2024:6195
- RLSA-2024:2562
- RLSA-2024:2699
- RLSA-2024:2724
- RLSA-2024:3346
- RLSA-2024:3826
- RLSA-2024:3827
- RLSA-2024:3830
- RLSA-2024:4212
- SUSE-SU-2024:0800-1
- SUSE-SU-2024:0811-1
- SUSE-SU-2024:0812-1
- SUSE-SU-2024:0936-1
- SUSE-SU-2024:1121-1
- SUSE-SU-2024:1122-1
- SUSE-SU-2024:1160-1
- SUSE-SU-2024:1161-1
- SUSE-SU-2024:1573-1
- SUSE-SU-2024:1574-1
- SUSE-SU-2024:1587-1
- SUSE-SU-2024:1588-1
- SUSE-SU-2024:1935-1
- SUSE-SU-2024:1936-1
- SUSE-SU-2024:1969-1
- SUSE-SU-2024:1970-1
- SUSE-SU-2024:2108-1
- SUSE-SU-2024:2294-1
- SUSE-SU-2024:2295-1
- SUSE-SU-2024:2308-1
- SUSE-SU-2024:2309-1
- SUSE-SU-2024:3097-1
- SUSE-SU-2024:3098-1
- SUSE-SU-2024:3155-1
- SUSE-SU-2024:3188-1
- USN-6886-1
- VU:421644
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |