go1.21 release tracking go1.22 release tracking go1.23 release tracking go1.20,go1.21,go1.22: ensure VERSION file is present in go1.x toolchain GOROOT VUL-0: CVE-2024-24783 go1.21,go1.22: crypto/x509: Verify panics on certificates with an unknown public key algorithm VUL-0: CVE-2023-45289 go1.21,go1.22: net/http, net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect VUL-0: CVE-2023-45290 go1.21,go1.22: net/http: memory exhaustion in Request.ParseMultipartForm VUL-0: CVE-2024-24784 go1.21,go1.22: net/mail: comments in display names are incorrectly handled VUL-0: CVE-2024-24785 go1.21,go1.22: html/template: errors returned from MarshalJSON methods may break template escaping VUL-0: CVE-2023-45288: go1.21,go1.22: net/http, x/net/http2: close connections when receiving too many headers VUL-0: CVE-2024-24787: go1.21,go1.22: cmd/go: arbitrary code execution during build on darwin VUL-0: CVE-2024-24788: go1.22: net: malformed DNS message can cause infinite loop VUL-0: CVE-2024-24789: go1.21,go1.22: archive/zip: mishandling of corrupt central directory record VUL-0: CVE-2024-24790: go1.21,go1.22: net/netip: unexpected behavior from Is methods for IPv4-mapped IPv6 addresses VUL-0: CVE-2024-24791 go1.21,go1.22: net/http: denial of service due to improper 100-continue handling VUL-0: CVE-2024-34155: go1.22,go1.23: go/parser: stack exhaustion in all Parse* functions VUL-0: CVE-2024-34156: go1.22,go1.23: encoding/gob: stack exhaustion in Decoder.Decode VUL-0: CVE-2024-34158: go1.22,go1.23: go/build/constraint: stack exhaustion in Parse jfkw moderate security Security update for go1.23-openssl, go1.21-openssl, go1.22-openssl This update for go1.23-openssl, go1.21-openssl, go1.22-openssl fixes the following issues: go1.21-openssl: - Update to version 1.21.13.4 cut from the go1.21-fips-release go1.22-openssl: - Update to version 1.22.7.1 cut from the go1.22-fips-release go1.23-openssl: - Update to version 1.23.2.2 cut from the go1.23-fips-release go1.21-openssl go1.22-openssl go1.23-openssl