Описание
Security update for go1.21
This update for go1.21 fixes the following issues:
- Upgrade go to version 1.21.8
- CVE-2023-45289: net/http, net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (bsc#1221000)
- CVE-2023-45290: net/http: memory exhaustion in Request.ParseMultipartForm (bsc#1221001)
- CVE-2024-24783: crypto/x509: Verify panics on certificates with an unknown public key algorithm (bsc#1220999)
- CVE-2024-24784: net/mail: comments in display names are incorrectly handled (bsc#1221002)
- CVE-2024-24785: html/template: errors returned from MarshalJSON methods may break template escaping (bsc#1221003)
Список пакетов
Container bci/golang:1.21
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
SUSE Linux Enterprise Module for Development Tools 15 SP5
SUSE Linux Enterprise Server 15 SP4-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP4
openSUSE Leap 15.5
Ссылки
- Link for SUSE-SU-2024:0811-1
- E-Mail link for SUSE-SU-2024:0811-1
- SUSE Security Ratings
- SUSE Bug 1212475
- SUSE Bug 1219988
- SUSE Bug 1220999
- SUSE Bug 1221000
- SUSE Bug 1221001
- SUSE Bug 1221002
- SUSE Bug 1221003
- SUSE CVE CVE-2023-45289 page
- SUSE CVE CVE-2023-45290 page
- SUSE CVE CVE-2024-24783 page
- SUSE CVE CVE-2024-24784 page
- SUSE CVE CVE-2024-24785 page
Описание
When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.
Затронутые продукты
Ссылки
- CVE-2023-45289
- SUSE Bug 1221000
Описание
When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.
Затронутые продукты
Ссылки
- CVE-2023-45290
- SUSE Bug 1221001
Описание
Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.
Затронутые продукты
Ссылки
- CVE-2024-24783
- SUSE Bug 1220999
Описание
The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.
Затронутые продукты
Ссылки
- CVE-2024-24784
- SUSE Bug 1221002
Описание
If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.
Затронутые продукты
Ссылки
- CVE-2024-24785
- SUSE Bug 1221003