<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for go1.15</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:0192-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-01-29T19:14:21Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-01-29T19:14:21Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-01-29T19:14:21Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for go1.15</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for go1.15 fixes the following issues:

Go was updated to version 1.15.7 (bsc#1175132).

Security issues fixed:

- CVE-2021-3114: Fixed incorrect operations on the P-224 curve in crypto/elliptic (bsc#1181145).
- CVE-2021-3115: Fixed a potential arbitrary code execution in the build process (bsc#1181146).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-192</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLSYUO4X4LW4VZTYIOWDRLII23FZ4LSP/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:0192-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175132</URL>
      <Description>SUSE Bug 1175132</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181145</URL>
      <Description>SUSE Bug 1181145</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181146</URL>
      <Description>SUSE Bug 1181146</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3114/</URL>
      <Description>SUSE CVE CVE-2021-3114 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3115/</URL>
      <Description>SUSE CVE CVE-2021-3115 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="go1.15-1.15.7-lp152.8.1">
      <FullProductName ProductID="go1.15-1.15.7-lp152.8.1">go1.15-1.15.7-lp152.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.15-doc-1.15.7-lp152.8.1">
      <FullProductName ProductID="go1.15-doc-1.15.7-lp152.8.1">go1.15-doc-1.15.7-lp152.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.15-race-1.15.7-lp152.8.1">
      <FullProductName ProductID="go1.15-race-1.15.7-lp152.8.1">go1.15-race-1.15.7-lp152.8.1</FullProductName>
    </Branch>
    <Relationship ProductReference="go1.15-1.15.7-lp152.8.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:go1.15-1.15.7-lp152.8.1">go1.15-1.15.7-lp152.8.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.15-doc-1.15.7-lp152.8.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:go1.15-doc-1.15.7-lp152.8.1">go1.15-doc-1.15.7-lp152.8.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.15-race-1.15.7-lp152.8.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:go1.15-race-1.15.7-lp152.8.1">go1.15-race-1.15.7-lp152.8.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.</Note>
    </Notes>
    <CVE>CVE-2021-3114</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:go1.15-1.15.7-lp152.8.1</ProductID>
        <ProductID>openSUSE Leap 15.2:go1.15-doc-1.15.7-lp152.8.1</ProductID>
        <ProductID>openSUSE Leap 15.2:go1.15-race-1.15.7-lp152.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLSYUO4X4LW4VZTYIOWDRLII23FZ4LSP/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3114.html</URL>
        <Description>CVE-2021-3114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181145</URL>
        <Description>SUSE Bug 1181145</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the "go get" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download).</Note>
    </Notes>
    <CVE>CVE-2021-3115</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:go1.15-1.15.7-lp152.8.1</ProductID>
        <ProductID>openSUSE Leap 15.2:go1.15-doc-1.15.7-lp152.8.1</ProductID>
        <ProductID>openSUSE Leap 15.2:go1.15-race-1.15.7-lp152.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLSYUO4X4LW4VZTYIOWDRLII23FZ4LSP/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3115.html</URL>
        <Description>CVE-2021-3115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181146</URL>
        <Description>SUSE Bug 1181146</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
