| Release Date: | 2023-12-06 | |
| Impact: | Moderate | What is this? |
Using go get to fetch a module with the \.git\ suffix may unexpectedly fallback to the insecure \git://\ protocol if the module is unavailable via the secure \https://\ and \git+ssh://\ protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).
See more information about CVE-2023-45285 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
| Base Score: | 7.5 |
| Vector String: | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| Version: | 3.0 |
| Attack Vector: | Network |
| Attack Complexity: | Low |
| Privileges Required: | None |
| User Interaction: | None |
| Scope: | Unchanged |
| Confidentiality Impact: | High |
| Integrity Impact: | None |
| Availability Impact: | None |
| Platform | Errata | Release Date |
| Oracle Linux version 8 (delve) | ELSA-2024-0887 | 2024-02-22 |
| Oracle Linux version 8 (go-toolset) | ELSA-2024-0887 | 2024-02-22 |
| Oracle Linux version 8 (golang) | ELSA-2024-0887 | 2024-02-22 |
| Oracle Linux version 9 (golang) | ELSA-2024-1131 | 2024-03-06 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: