vulnerability

SUSE: CVE-2024-34158: SUSE Linux Security Advisory

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Sep 27, 2024
Added
Dec 5, 2025
Modified
Dec 5, 2025

Description

Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.

Solutions

suse-upgrade-go1-21-opensslsuse-upgrade-go1-21-openssl-docsuse-upgrade-go1-21-openssl-racesuse-upgrade-go1-22suse-upgrade-go1-22-docsuse-upgrade-go1-22-opensslsuse-upgrade-go1-22-openssl-docsuse-upgrade-go1-22-openssl-racesuse-upgrade-go1-22-racesuse-upgrade-go1-23suse-upgrade-go1-23-docsuse-upgrade-go1-23-opensslsuse-upgrade-go1-23-openssl-docsuse-upgrade-go1-23-openssl-racesuse-upgrade-go1-23-racesuse-upgrade-kubernetes1-24-apiserversuse-upgrade-kubernetes1-24-clientsuse-upgrade-kubernetes1-24-client-bash-completionsuse-upgrade-kubernetes1-24-client-commonsuse-upgrade-kubernetes1-24-client-fish-completionsuse-upgrade-kubernetes1-24-controller-managersuse-upgrade-kubernetes1-24-kubeadmsuse-upgrade-kubernetes1-24-kubeletsuse-upgrade-kubernetes1-24-kubelet-commonsuse-upgrade-kubernetes1-24-proxysuse-upgrade-kubernetes1-24-schedulersuse-upgrade-kubernetes1-25-apiserversuse-upgrade-kubernetes1-25-clientsuse-upgrade-kubernetes1-25-client-bash-completionsuse-upgrade-kubernetes1-25-client-commonsuse-upgrade-kubernetes1-25-client-fish-completionsuse-upgrade-kubernetes1-25-controller-managersuse-upgrade-kubernetes1-25-kubeadmsuse-upgrade-kubernetes1-25-kubeletsuse-upgrade-kubernetes1-25-kubelet-commonsuse-upgrade-kubernetes1-25-proxysuse-upgrade-kubernetes1-25-schedulersuse-upgrade-kubernetes1-26-apiserversuse-upgrade-kubernetes1-26-clientsuse-upgrade-kubernetes1-26-client-bash-completionsuse-upgrade-kubernetes1-26-client-commonsuse-upgrade-kubernetes1-26-client-fish-completionsuse-upgrade-kubernetes1-26-controller-managersuse-upgrade-kubernetes1-26-kubeadmsuse-upgrade-kubernetes1-26-kubeletsuse-upgrade-kubernetes1-26-kubelet-commonsuse-upgrade-kubernetes1-26-proxysuse-upgrade-kubernetes1-26-schedulersuse-upgrade-kubernetes1-27-apiserversuse-upgrade-kubernetes1-27-clientsuse-upgrade-kubernetes1-27-client-bash-completionsuse-upgrade-kubernetes1-27-client-commonsuse-upgrade-kubernetes1-27-client-fish-completionsuse-upgrade-kubernetes1-27-controller-managersuse-upgrade-kubernetes1-27-kubeadmsuse-upgrade-kubernetes1-27-kubeletsuse-upgrade-kubernetes1-27-kubelet-commonsuse-upgrade-kubernetes1-27-proxysuse-upgrade-kubernetes1-27-schedulersuse-upgrade-kubernetes1-28-apiserversuse-upgrade-kubernetes1-28-clientsuse-upgrade-kubernetes1-28-client-bash-completionsuse-upgrade-kubernetes1-28-client-commonsuse-upgrade-kubernetes1-28-client-fish-completionsuse-upgrade-kubernetes1-28-controller-managersuse-upgrade-kubernetes1-28-kubeadmsuse-upgrade-kubernetes1-28-kubeletsuse-upgrade-kubernetes1-28-kubelet-commonsuse-upgrade-kubernetes1-28-proxysuse-upgrade-kubernetes1-28-schedulersuse-upgrade-trivy
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.