Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off). https://go.dev/cl/540257 https://go.dev/issue/63845 https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ https://pkg.go.dev/vuln/GO-2023-2383
Created golang tracking bugs for this issue: Affects: epel-all [bug 2253324] Affects: fedora-all [bug 2253325]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:0887 https://access.redhat.com/errata/RHSA-2024:0887
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.15 Via RHSA-2023:7198 https://access.redhat.com/errata/RHSA-2023:7198
This issue has been addressed in the following products: Red Hat Developer Tools Via RHSA-2024:1041 https://access.redhat.com/errata/RHSA-2024:1041
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:1131 https://access.redhat.com/errata/RHSA-2024:1131