<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0196</id>
    <title>An update for golang is now available for HCE 2.0</title>
    <severity>Critical</severity>
    <release>HCE 2.0</release>
    <issued date="2024-06-28 03:57:59"/>
    <updated date="2024-06-28 03:57:59"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806" id="CVE-2022-23806" title="CVE-2022-23806 Base Score: 9.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921" id="CVE-2022-24921" title="CVE-2022-24921 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772" id="CVE-2022-23772" title="CVE-2022-23772 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773" id="CVE-2022-23773" title="CVE-2022-23773 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-28327" id="CVE-2022-28327" title="CVE-2022-28327 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675" id="CVE-2022-24675" title="CVE-2022-24675 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716" id="CVE-2021-44716" title="CVE-2021-44716 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717" id="CVE-2021-44717" title="CVE-2021-44717 Base Score: 4.8 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

Curve.IsOnCurve in crypto/elliptic in Go before 1.16.14 and 1.17.x before 1.17.7 can incorrectly return true in situations with a big.Int value that is not a valid field element. (CVE-2022-23806)

regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression. (CVE-2022-24921)

Rat.SetString in math/big in Go before 1.16.14 and 1.17.x before 1.17.7 has an overflow that can lead to Uncontrolled Memory Consumption. (CVE-2022-23772)

cmd/go in Go before 1.16.14 and 1.17.x before 1.17.7 can misinterpret branch names that falsely appear to be version tags. This can lead to incorrect access control if an actor is supposed to be able to create branches but not tags. (CVE-2022-23773)

The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input. (CVE-2022-28327)

encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data. (CVE-2022-24675)

net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests. (CVE-2021-44716)

Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion. (CVE-2021-44717)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="golang">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="golang" version="1.17.3" release="1.r31.hce2">
          <filename>golang-1.17.3-1.r31.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="golang-devel" version="1.17.3" release="1.r31.hce2">
          <filename>golang-devel-1.17.3-1.r31.hce2.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="golang-help" version="1.17.3" release="1.r31.hce2">
          <filename>golang-help-1.17.3-1.r31.hce2.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="golang" version="1.17.3" release="1.r31.hce2">
          <filename>golang-1.17.3-1.r31.hce2.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="golang-devel" version="1.17.3" release="1.r31.hce2">
          <filename>golang-devel-1.17.3-1.r31.hce2.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="golang-help" version="1.17.3" release="1.r31.hce2">
          <filename>golang-help-1.17.3-1.r31.hce2.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
