File _patchinfo of Package patchinfo.28844
<patchinfo incident="28844">
<issue tracker="bnc" id="1200441">go1.19 release tracking</issue>
<issue tracker="bnc" id="1210963">Go toolchain packages use Suggests: for optional subpackages to reduce default install</issue>
<issue tracker="bnc" id="1210129">VUL-0: CVE-2023-24537: go1.19,go1.20: go/parser: infinite loop in parsing</issue>
<issue tracker="bnc" id="1211030">VUL-0: CVE-2023-24540: go1.19,go1.20: html/template: improper handling of JavaScript whitespace</issue>
<issue tracker="bnc" id="1210130">VUL-0: CVE-2023-24538: go1.19,go1.20: html/template: backticks not treated as string delimiters</issue>
<issue tracker="bnc" id="1211029">VUL-0: CVE-2023-24539: go1.19,go1.20: html/template: improper sanitization of CSS values</issue>
<issue tracker="bnc" id="1211031">VUL-0: CVE-2023-29400: go1.19,go1.20: html/template: improper handling of empty HTML attributes</issue>
<issue tracker="bnc" id="1210127">VUL-0: CVE-2023-24534: go1.19,go1.20: net/http, net/textproto: denial of service from excessive memory allocation</issue>
<issue tracker="bnc" id="1210938">Go application packages re-enable stripping and debuginfo</issue>
<issue tracker="bnc" id="1210128">VUL-0: CVE-2023-24536: go1.19,go1.20: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption</issue>
<issue tracker="cve" id="2023-24538"/>
<issue tracker="cve" id="2023-24539"/>
<issue tracker="cve" id="2023-24536"/>
<issue tracker="cve" id="2023-24540"/>
<issue tracker="cve" id="2023-29400"/>
<issue tracker="cve" id="2023-24537"/>
<issue tracker="cve" id="2023-24534"/>
<issue tracker="jsc" id="PED-1962"/>
<packager>jfkw</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for go1.19</summary>
<description>This update for go1.19 fixes the following issues:
Update to 1.19.9 (bnc#1200441):
- CVE-2023-24539: fixed an improper sanitization of CSS values
(bnc#1211029).
- CVE-2023-24540: fixed an improper handling of JavaScript whitespace
(bnc#1211030).
- CVE-2023-29400: fixed an improper handling of empty HTML attributes
(bnc#1211031).
- runtime: automatically bump RLIMIT_NOFILE on Unix
- cmd/compile: inlining function that references function literals
generates bad code
- cmd/compile: encoding/binary.PutUint16 sometimes doesn't write
- crypto/tls: TLSv1.3 connection fails with invalid PSK binder
- cmd/compile: incorrect inline function variable
Non-security fixes:
- Reverted go1.x Suggests go1.x-race (boo#1210963).
- Re-enabled binary stripping and debuginfo (boo#1210938).
- Reduced install size (jsc#PED-1962).
</description>
</patchinfo>