go1.21 release tracking
go1.22 release tracking
VUL-0: CVE-2024-24806: libuv: libuv: Improper Domain Lookup that potentially leads to SSRF attacks
go1.20,go1.21,go1.22: ensure VERSION file is present in go1.x toolchain GOROOT
VUL-0: CVE-2024-21892: nodejs18,nodejs20,nodejs21: Code injection and privilege escalation through Linux capabilities
VUL-0: CVE-2024-22019: nodejs10,nodejs12,nodejs14,nodejs16,nodejs18,nodejs20,nodejs4,nodejs6,nodejs8: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks
VUL-0: CVE-2024-21896: nodejs20: Path traversal by monkey-patching Buffer internals
VUL-0: CVE-2024-22017: nodejs20: setuid() does not drop all privileges due to io_uring
VUL-0: CVE-2023-46809: nodejs10,nodejs12,nodejs14,nodejs16,nodejs18,nodejs20,nodejs4,nodejs6,nodejs8: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding)
VUL-0: CVE-2024-21891: nodejs20: Multiple permission model bypasses due to improper path traversal sequence sanitization
VUL-0: CVE-2024-21890: nodejs20: Improper handling of wildcards in --allow-fs-read and --allow-fs-write
VUL-0: CVE-2024-22025: nodejs10,nodejs12,nodejs14,nodejs16,nodejs18,nodejs20,nodejs4,nodejs6,nodejs8: Denial of Service by resource exhaustion in fetch() brotli decoding
VUL-0: CVE-2024-24758: nodejs16,nodejs18,nodejs20: ignore proxy-authorization header
VUL-0: CVE-2024-24806: nodejs10,nodejs12,nodejs14,nodejs16,nodejs18,nodejs20,nodejs8: libuv: improper domain lookup that potentially leads to SSRF attacks
VUL-0: nodejs20,nodejs18: VU#421644: HTTP/2 CONTINUATION frames can be utilized for DoS attacks
VUL-0: CVE-2024-27982: nodejs18,nodejs20: HTTP Request Smuggling via Content Length Obfuscation
VUL-0: CVE-2024-30260: nodejs, nodejs-electron: undici: proxy-authorization header not cleared on cross-origin redirect for dispatch, request, stream, pipeline
VUL-0: CVE-2024-30261: nodejs: fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect
VUL-0: CVE-2024-24787: go1.21,go1.22: cmd/go: arbitrary code execution during build on darwin
VUL-0: CVE-2024-24788: go1.22: net: malformed DNS message can cause infinite loop
VUL-0: CVE-2024-24789: go1.21,go1.22: archive/zip: mishandling of corrupt central directory record
VUL-0: CVE-2024-24790: go1.21,go1.22: net/netip: unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
VUL-0: CVE-2024-24791 go1.21,go1.22: net/http: denial of service due to improper 100-continue handling
VUL-0: CVE-2024-22020: nodejs: bypass network import restriction via data URL
VUL-0: CVE-2024-36138: nodejs: bypass incomplete fix of CVE-2024-27980
VUL-0: CVE-2024-36137: nodejs: fs.fchown/fchmod bypasses permission model
VUL-0: CVE-2024-22018: nodejs: fs.lstat bypasses permission model
VUL-0: CVE-2024-37372: nodejs: permission model improperly processes UNC paths
VUL-0: CVE-2024-6655: gtk2,gtk3,gtk4: library injection from current working directory
go1.23 release tracking
VUL-0: CVE-2024-34155: go1.22,go1.23: go/parser: stack exhaustion in all Parse* functions
VUL-0: CVE-2024-34156: go1.22,go1.23: encoding/gob: stack exhaustion in Decoder.Decode
VUL-0: CVE-2024-34158: go1.22,go1.23: go/build/constraint: stack exhaustion in Parse
golang-github-prometheus-promu: build failure for s390x when moving to go1.23
jfkw
important
security
Security update for go1.20, go1.21, go1.23, golang-github-prometheus-promu, go1.19, go1.22, gtk2, go, nodejs20
This update for go1.20, go1.21, go1.23, golang-github-prometheus-promu, go1.19, go1.22, gtk2, go, nodejs20 fixes the following issues:
go:
- Update to current stable go1.23
go1.19:
- Use %patch -P N instead of deprecated %patchN.
go1.20:
- Packaging improvements:
* Use %patch -P N instead of deprecated %patchN
- Packaging improvements:
* bsc#1219988 ensure VERSION file is present in GOROOT
as required by go tool dist and go tool distpack
go1.21:
- go1.21.13 (released 2024-08-06)
go1.22:
- go1.22.7 (released 2024-09-05)
go1.23:
- go1.23.1 (released 2024-09-05)
gtk2:
- CVE-2024-6655 Stop looking for modules in cwd (bsc#1228120).
nodejs20:
- Update to 20.15.1
golang-github-prometheus-promu:
- Require Go 1.21 for building
- Update to version 0.16.0
go
go1.19
go1.20
go1.21
go1.22
go1.23
golang-github-prometheus-promu
gtk2
nodejs20