File _patchinfo of Package patchinfo.28844

<patchinfo incident="28844">
  <issue tracker="bnc" id="1200441">go1.19 release tracking</issue>
  <issue tracker="bnc" id="1210963">Go toolchain packages use Suggests: for optional subpackages to reduce default install</issue>
  <issue tracker="bnc" id="1210129">VUL-0: CVE-2023-24537: go1.19,go1.20: go/parser: infinite loop in parsing</issue>
  <issue tracker="bnc" id="1211030">VUL-0: CVE-2023-24540: go1.19,go1.20: html/template: improper handling of JavaScript whitespace</issue>
  <issue tracker="bnc" id="1210130">VUL-0: CVE-2023-24538: go1.19,go1.20: html/template: backticks not treated as string delimiters</issue>
  <issue tracker="bnc" id="1211029">VUL-0: CVE-2023-24539: go1.19,go1.20: html/template: improper sanitization of CSS values</issue>
  <issue tracker="bnc" id="1211031">VUL-0: CVE-2023-29400: go1.19,go1.20: html/template: improper handling of empty HTML attributes</issue>
  <issue tracker="bnc" id="1210127">VUL-0: CVE-2023-24534: go1.19,go1.20: net/http, net/textproto: denial of service from excessive memory allocation</issue>
  <issue tracker="bnc" id="1210938">Go application packages re-enable stripping and debuginfo</issue>
  <issue tracker="bnc" id="1210128">VUL-0: CVE-2023-24536: go1.19,go1.20: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption</issue>
  <issue tracker="cve" id="2023-24538"/>
  <issue tracker="cve" id="2023-24539"/>
  <issue tracker="cve" id="2023-24536"/>
  <issue tracker="cve" id="2023-24540"/>
  <issue tracker="cve" id="2023-29400"/>
  <issue tracker="cve" id="2023-24537"/>
  <issue tracker="cve" id="2023-24534"/>
  <issue tracker="jsc" id="PED-1962"/>
  <packager>jfkw</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for go1.19</summary>
  <description>This update for go1.19 fixes the following issues:

Update to 1.19.9 (bnc#1200441):
- CVE-2023-24539: fixed an improper sanitization of CSS values
  (bnc#1211029).
- CVE-2023-24540: fixed an improper handling of JavaScript whitespace
  (bnc#1211030).
- CVE-2023-29400: fixed an improper handling of empty HTML attributes
  (bnc#1211031).
- runtime: automatically bump RLIMIT_NOFILE on Unix
- cmd/compile: inlining function that references function literals
  generates bad code
- cmd/compile: encoding/binary.PutUint16 sometimes doesn't write
- crypto/tls: TLSv1.3 connection fails with invalid PSK binder
- cmd/compile: incorrect inline function variable

Non-security fixes:

- Reverted go1.x Suggests go1.x-race (boo#1210963).
- Re-enabled binary stripping and debuginfo (boo#1210938).
- Reduced install size (jsc#PED-1962).
</description>
</patchinfo>
openSUSE Build Service is sponsored by