First published: Wed Dec 06 2023(Updated: )
Last updated 24 July 2024
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | <=1.19.8-2 | |
redhat/golang | <1.20.12 | 1.20.12 |
redhat/golang 1.21.0 | <0 | 0 |
redhat/golang | <1.21.5 | 1.21.5 |
Ruby | <1.20.12 | |
Ruby | >=1.21.0-0<1.21.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45285 has a severity rating that indicates a moderate security risk due to potential fallback to the insecure 'git://' protocol.
To fix CVE-2023-45285, upgrade to Go version 1.20.12 or later, and ensure you are not using vulnerable package versions.
CVE-2023-45285 affects Go versions 1.15, 1.19, and versions up to 1.20.12.
Using a module with the '.git' suffix may cause the system to fall back to the insecure 'git://' protocol if the module is unavailable through secure protocols.
Yes, GOINSECURE is not relevant for CVE-2023-45285 as it can still fallback to 'git://' regardless of this setting.