SUSE-SU-2023:2312-1: important: Security update for go1.18-openssl
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Tue May 30 08:30:09 UTC 2023
# Security update for go1.18-openssl
Announcement ID: SUSE-SU-2023:2312-1
Rating: important
References:
* #1183043
* #1193742
* #1198423
* #1198424
* #1198427
* #1199413
* #1200134
* #1200135
* #1200136
* #1200137
* #1201434
* #1201436
* #1201437
* #1201440
* #1201443
* #1201444
* #1201445
* #1201447
* #1201448
* #1202035
* #1203185
* #1204023
* #1204024
* #1204025
* #1204941
* #1206134
* #1206135
* #1208270
* #1208271
* #1208272
* #1208491
Cross-References:
* CVE-2022-1705
* CVE-2022-1962
* CVE-2022-24675
* CVE-2022-27536
* CVE-2022-27664
* CVE-2022-28131
* CVE-2022-28327
* CVE-2022-2879
* CVE-2022-2880
* CVE-2022-29526
* CVE-2022-29804
* CVE-2022-30580
* CVE-2022-30629
* CVE-2022-30630
* CVE-2022-30631
* CVE-2022-30632
* CVE-2022-30633
* CVE-2022-30634
* CVE-2022-30635
* CVE-2022-32148
* CVE-2022-32189
* CVE-2022-41715
* CVE-2022-41716
* CVE-2022-41717
* CVE-2022-41720
* CVE-2022-41723
* CVE-2022-41724
* CVE-2022-41725
CVSS scores:
* CVE-2022-1705 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2022-1705 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2022-1962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-24675 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-24675 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-27536 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-27536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-27664 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-27664 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-28131 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-28131 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-28327 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-28327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-2879 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-2879 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-2880 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-2880 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-29526 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-29526 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-29804 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2022-29804 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-30580 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-30580 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-30629 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-30629 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2022-30630 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-30630 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-30631 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-30631 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-30632 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-30632 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-30633 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-30633 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-30634 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-30634 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-30635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-30635 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-32148 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-32148 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2022-32189 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-32189 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41715 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41715 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41716 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-41716 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-41717 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41717 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-41720 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-41723 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41724 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41724 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41725 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Development Tools Module 15-SP4
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Real Time 15 SP3
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves 28 vulnerabilities, contains one feature and has three
fixes can now be installed.
## Description:
This update for go1.18-openssl fixes the following issues:
* Add subpackage go1.x-libstd compiled shared object libstd.so (jsc#PED-1962)
* Main go1.x package included libstd.so in previous versions
* Split libstd.so into subpackage that can be installed standalone
* Continues the slimming down of main go1.x package by 40 Mb
* Experimental and not recommended for general use, Go currently has no ABI
* Upstream Go has not committed to support buildmode=shared long-term
* Do not use in packaging, build static single binaries (the default)
* Upstream Go go1.x binary releases do not include libstd.so
* go1.x Suggests go1.x-libstd so not installed by default Recommends
* go1.x-libstd does not Require: go1.x so can install standalone
* Provides go-libstd unversioned package name
* Fix build step -buildmode=shared std to omit -linkshared
* Packaging improvements:
* go1.x Suggests go1.x-doc so not installed by default Recommends
* Use Group: Development/Languages/Go instead of Other
* Improvements to go1.x packaging spec:
* On Tumbleweed bootstrap with current default gcc13 and gccgo118
* On SLE-12 aarch64 ppc64le ppc64 remove overrides to bootstrap using go1.x
package (%bcond_without gccgo). This is no longer needed on current
SLE-12:Update and removing will consolidate the build configurations used.
* Change source URLs to go.dev as per Go upstream
* On x86_64 export GOAMD64=v1 as per the current baseline. At this time forgo
GOAMD64=v3 option for x86_64_v3 support.
* On x86_64 %define go_amd64=v1 as current instruction baseline
* Update to version 1.18.10.1 cut from the go1.18-openssl-fips branch at the
revision tagged go1.18.10-1-openssl-fips.
* Merge branch dev.boringcrypto.go1.18 into go1.18-openssl-fips
* Merge go1.18.10 into dev.boringcrypto.go1.18
* go1.18.10 (released 2023-01-10) includes fixes to cgo, the compiler, the
linker, and the crypto/x509, net/http, and syscall packages. Refs
bsc#1193742 go1.18 release tracking
* go#57705 misc/cgo: backport needed for dlltool fix
* go#57426 crypto/x509: Verify on macOS does not return typed errors
* go#57344 cmd/compile: the loong64 intrinsic for CompareAndSwapUint32
function needs to sign extend its "old" argument.
* go#57338 syscall, internal/poll: accept4-to-accept fallback removal broke Go
code on Synology DSM 6.2 ARM devices
* go#57213 os: TestLstat failure on Linux Aarch64
* go#57211 reflect: sort.SliceStable sorts incorrectly on arm64 with less
function created with reflect.MakeFunc and slice of sufficient length
* go#57057 cmd/go: remove test dependency on gopkg.in service
* go#57054 cmd/go: TestScript/version_buildvcs_git_gpg (if enabled) fails on
linux longtest builders
* go#57044 cgo: malformed DWARF TagVariable entry
* go#57028 cmd/cgo: Wrong types in compiler errors with clang 14
* go#56833 cmd/link/internal/ppc64: too-far trampoline is reused
* go#56711 net: reenable TestLookupDotsWithRemoteSource and
TestLookupGoogleSRV with a different target
* go#56323 net/http: bad handling of HEAD requests with a body
## Patch Instructions:
To install this SUSE Important update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-2312=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-2312=1
* Development Tools Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-2312=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2312=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2312=1
* SUSE Linux Enterprise Real Time 15 SP3
zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2312=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2312=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2312=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2023-2312=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* go1.18-openssl-1.18.10.1-150000.1.9.1
* go1.18-openssl-doc-1.18.10.1-150000.1.9.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* go1.18-openssl-race-1.18.10.1-150000.1.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.18-openssl-1.18.10.1-150000.1.9.1
* go1.18-openssl-doc-1.18.10.1-150000.1.9.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* go1.18-openssl-race-1.18.10.1-150000.1.9.1
* Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* go1.18-openssl-1.18.10.1-150000.1.9.1
* go1.18-openssl-doc-1.18.10.1-150000.1.9.1
* Development Tools Module 15-SP4 (aarch64 x86_64)
* go1.18-openssl-race-1.18.10.1-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64
x86_64)
* go1.18-openssl-1.18.10.1-150000.1.9.1
* go1.18-openssl-race-1.18.10.1-150000.1.9.1
* go1.18-openssl-doc-1.18.10.1-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* go1.18-openssl-1.18.10.1-150000.1.9.1
* go1.18-openssl-race-1.18.10.1-150000.1.9.1
* go1.18-openssl-doc-1.18.10.1-150000.1.9.1
* SUSE Linux Enterprise Real Time 15 SP3 (x86_64)
* go1.18-openssl-1.18.10.1-150000.1.9.1
* go1.18-openssl-race-1.18.10.1-150000.1.9.1
* go1.18-openssl-doc-1.18.10.1-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* go1.18-openssl-1.18.10.1-150000.1.9.1
* go1.18-openssl-doc-1.18.10.1-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
* go1.18-openssl-race-1.18.10.1-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* go1.18-openssl-1.18.10.1-150000.1.9.1
* go1.18-openssl-doc-1.18.10.1-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* go1.18-openssl-race-1.18.10.1-150000.1.9.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* go1.18-openssl-1.18.10.1-150000.1.9.1
* go1.18-openssl-race-1.18.10.1-150000.1.9.1
* go1.18-openssl-doc-1.18.10.1-150000.1.9.1
## References:
* https://www.suse.com/security/cve/CVE-2022-1705.html
* https://www.suse.com/security/cve/CVE-2022-1962.html
* https://www.suse.com/security/cve/CVE-2022-24675.html
* https://www.suse.com/security/cve/CVE-2022-27536.html
* https://www.suse.com/security/cve/CVE-2022-27664.html
* https://www.suse.com/security/cve/CVE-2022-28131.html
* https://www.suse.com/security/cve/CVE-2022-28327.html
* https://www.suse.com/security/cve/CVE-2022-2879.html
* https://www.suse.com/security/cve/CVE-2022-2880.html
* https://www.suse.com/security/cve/CVE-2022-29526.html
* https://www.suse.com/security/cve/CVE-2022-29804.html
* https://www.suse.com/security/cve/CVE-2022-30580.html
* https://www.suse.com/security/cve/CVE-2022-30629.html
* https://www.suse.com/security/cve/CVE-2022-30630.html
* https://www.suse.com/security/cve/CVE-2022-30631.html
* https://www.suse.com/security/cve/CVE-2022-30632.html
* https://www.suse.com/security/cve/CVE-2022-30633.html
* https://www.suse.com/security/cve/CVE-2022-30634.html
* https://www.suse.com/security/cve/CVE-2022-30635.html
* https://www.suse.com/security/cve/CVE-2022-32148.html
* https://www.suse.com/security/cve/CVE-2022-32189.html
* https://www.suse.com/security/cve/CVE-2022-41715.html
* https://www.suse.com/security/cve/CVE-2022-41716.html
* https://www.suse.com/security/cve/CVE-2022-41717.html
* https://www.suse.com/security/cve/CVE-2022-41720.html
* https://www.suse.com/security/cve/CVE-2022-41723.html
* https://www.suse.com/security/cve/CVE-2022-41724.html
* https://www.suse.com/security/cve/CVE-2022-41725.html
* https://bugzilla.suse.com/show_bug.cgi?id=1183043
* https://bugzilla.suse.com/show_bug.cgi?id=1193742
* https://bugzilla.suse.com/show_bug.cgi?id=1198423
* https://bugzilla.suse.com/show_bug.cgi?id=1198424
* https://bugzilla.suse.com/show_bug.cgi?id=1198427
* https://bugzilla.suse.com/show_bug.cgi?id=1199413
* https://bugzilla.suse.com/show_bug.cgi?id=1200134
* https://bugzilla.suse.com/show_bug.cgi?id=1200135
* https://bugzilla.suse.com/show_bug.cgi?id=1200136
* https://bugzilla.suse.com/show_bug.cgi?id=1200137
* https://bugzilla.suse.com/show_bug.cgi?id=1201434
* https://bugzilla.suse.com/show_bug.cgi?id=1201436
* https://bugzilla.suse.com/show_bug.cgi?id=1201437
* https://bugzilla.suse.com/show_bug.cgi?id=1201440
* https://bugzilla.suse.com/show_bug.cgi?id=1201443
* https://bugzilla.suse.com/show_bug.cgi?id=1201444
* https://bugzilla.suse.com/show_bug.cgi?id=1201445
* https://bugzilla.suse.com/show_bug.cgi?id=1201447
* https://bugzilla.suse.com/show_bug.cgi?id=1201448
* https://bugzilla.suse.com/show_bug.cgi?id=1202035
* https://bugzilla.suse.com/show_bug.cgi?id=1203185
* https://bugzilla.suse.com/show_bug.cgi?id=1204023
* https://bugzilla.suse.com/show_bug.cgi?id=1204024
* https://bugzilla.suse.com/show_bug.cgi?id=1204025
* https://bugzilla.suse.com/show_bug.cgi?id=1204941
* https://bugzilla.suse.com/show_bug.cgi?id=1206134
* https://bugzilla.suse.com/show_bug.cgi?id=1206135
* https://bugzilla.suse.com/show_bug.cgi?id=1208270
* https://bugzilla.suse.com/show_bug.cgi?id=1208271
* https://bugzilla.suse.com/show_bug.cgi?id=1208272
* https://bugzilla.suse.com/show_bug.cgi?id=1208491
* https://jira.suse.com/browse/PED-1962
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20230530/6205a244/attachment.htm>
More information about the sle-updates
mailing list