Vulnerability Database
Blog
FAQ
Docs
RHSA-2023:6363
See a problem?
Please try reporting it
to the source
first.
Source
https://access.redhat.com/errata/RHSA-2023:6363
Import Source
https://security.access.redhat.com/data/osv/RHSA-2023:6363.json
JSON Data
https://api.osv.dev/v1/vulns/RHSA-2023:6363
Related
CVE-2022-41723
CVE-2022-41724
CVE-2022-41725
CVE-2023-24534
CVE-2023-24536
CVE-2023-24537
CVE-2023-24538
CVE-2023-24539
CVE-2023-24540
CVE-2023-29400
CVE-2023-29406
GO-2023-1569
GO-2023-1570
GO-2023-1571
Published
2024-10-02T00:17:54Z
Modified
2024-12-19T10:02:03Z
Severity
9.8 (Critical)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
Red Hat Security Advisory: skopeo security update
Details
References
https://access.redhat.com/errata/RHSA-2023:6363
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index
https://bugzilla.redhat.com/show_bug.cgi?id=2178358
https://bugzilla.redhat.com/show_bug.cgi?id=2178488
https://bugzilla.redhat.com/show_bug.cgi?id=2178492
https://bugzilla.redhat.com/show_bug.cgi?id=2184481
https://bugzilla.redhat.com/show_bug.cgi?id=2184482
https://bugzilla.redhat.com/show_bug.cgi?id=2184483
https://bugzilla.redhat.com/show_bug.cgi?id=2184484
https://bugzilla.redhat.com/show_bug.cgi?id=2196026
https://bugzilla.redhat.com/show_bug.cgi?id=2196027
https://bugzilla.redhat.com/show_bug.cgi?id=2196029
https://bugzilla.redhat.com/show_bug.cgi?id=2222167
https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6363.json
https://access.redhat.com/security/cve/CVE-2022-41723
https://www.cve.org/CVERecord?id=CVE-2022-41723
https://nvd.nist.gov/vuln/detail/CVE-2022-41723
https://github.com/advisories/GHSA-vvpx-j8f3-3w6h
https://go.dev/cl/468135
https://go.dev/cl/468295
https://go.dev/issue/57855
https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
https://pkg.go.dev/vuln/GO-2023-1571
https://vuln.go.dev/ID/GO-2023-1571.json
https://access.redhat.com/security/cve/CVE-2022-41724
https://www.cve.org/CVERecord?id=CVE-2022-41724
https://nvd.nist.gov/vuln/detail/CVE-2022-41724
https://go.dev/cl/468125
https://go.dev/issue/58001
https://pkg.go.dev/vuln/GO-2023-1570
https://access.redhat.com/security/cve/CVE-2022-41725
https://www.cve.org/CVERecord?id=CVE-2022-41725
https://nvd.nist.gov/vuln/detail/CVE-2022-41725
https://go.dev/cl/468124
https://go.dev/issue/58006
https://pkg.go.dev/vuln/GO-2023-1569
https://access.redhat.com/security/cve/CVE-2023-24534
https://www.cve.org/CVERecord?id=CVE-2023-24534
https://nvd.nist.gov/vuln/detail/CVE-2023-24534
https://go.dev/issue/58975
https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
https://access.redhat.com/security/cve/CVE-2023-24536
https://www.cve.org/CVERecord?id=CVE-2023-24536
https://nvd.nist.gov/vuln/detail/CVE-2023-24536
https://go.dev/issue/59153
https://access.redhat.com/security/cve/CVE-2023-24537
https://www.cve.org/CVERecord?id=CVE-2023-24537
https://nvd.nist.gov/vuln/detail/CVE-2023-24537
https://github.com/golang/go/issues/59180
https://access.redhat.com/security/cve/CVE-2023-24538
https://www.cve.org/CVERecord?id=CVE-2023-24538
https://nvd.nist.gov/vuln/detail/CVE-2023-24538
https://github.com/golang/go/issues/59234
https://access.redhat.com/security/cve/CVE-2023-24539
https://www.cve.org/CVERecord?id=CVE-2023-24539
https://nvd.nist.gov/vuln/detail/CVE-2023-24539
https://github.com/golang/go/issues/59720
https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
https://access.redhat.com/security/cve/CVE-2023-24540
https://www.cve.org/CVERecord?id=CVE-2023-24540
https://nvd.nist.gov/vuln/detail/CVE-2023-24540
https://go.dev/issue/59721
https://access.redhat.com/security/cve/CVE-2023-29400
https://www.cve.org/CVERecord?id=CVE-2023-29400
https://nvd.nist.gov/vuln/detail/CVE-2023-29400
https://go.dev/issue/59722
https://access.redhat.com/security/cve/CVE-2023-29406
https://www.cve.org/CVERecord?id=CVE-2023-29406
https://nvd.nist.gov/vuln/detail/CVE-2023-29406
https://groups.google.com/g/golang-announce/c/2q13H6LEEx0
Affected packages
Red Hat:enterprise_linux:9::appstream
/
skopeo
Package
Name
skopeo
Purl
pkg:rpm/redhat/skopeo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:1.13.3-1.el9
Red Hat:enterprise_linux:9::appstream
/
skopeo-debuginfo
Package
Name
skopeo-debuginfo
Purl
pkg:rpm/redhat/skopeo-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:1.13.3-1.el9
Red Hat:enterprise_linux:9::appstream
/
skopeo-debugsource
Package
Name
skopeo-debugsource
Purl
pkg:rpm/redhat/skopeo-debugsource
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:1.13.3-1.el9
Red Hat:enterprise_linux:9::appstream
/
skopeo-tests
Package
Name
skopeo-tests
Purl
pkg:rpm/redhat/skopeo-tests
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:1.13.3-1.el9
RHSA-2023:6363 - OSV