{"id":"AZL-32101","summary":"CVE-2023-45285 affecting package golang for versions less than 1.21.6-1","details":"Using go get to fetch a module with the \".git\" suffix may unexpectedly fallback to the insecure \"git://\" protocol if the module is unavailable via the secure \"https://\" and \"git+ssh://\" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).","modified":"2026-04-01T05:10:51.584957Z","published":"2023-12-06T17:15:07Z","upstream":["CVE-2023-45285"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45285"}],"affected":[{"package":{"name":"golang","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/golang"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"1.19.0"},{"fixed":"1.21.6-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-32101.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}