Описание
Security update for go1.25
This update for go1.25 fixes the following issues:
go1.25.5 (released 2025-12-02) includes two security fixes to the crypto/x509 package, as well as bug fixes to the mime and os packages. (bsc#1244485)
CVE-2025-61729 CVE-2025-61727:
- go#76461 go#76445 bsc#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation
- go#76464 go#76442 bsc#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN
- go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25
- go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup
-
Packaging: Migrate from update-alternatives to libalternatives (bsc#1245878)
- This is an optional migration controlled via prjconf definition with_libalternatives
- If with_libalternatives is not defined packaging continues to use update-alternatives
go1.25.4 (released 2025-11-05) includes fixes to the compiler, the runtime, and the crypto/subtle, encoding/pem, net/url, and os packages. (bsc#1244485)
- go#75480 cmd/link: linker panic and relocation errors with complex generics inlining
- go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64
- go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS
- go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
- go#75952 encoding/pem: regression when decoding blocks with leading garbage
- go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied
- go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should
- go#76029 pem/encoding: malformed line endings can cause panics
Список пакетов
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS
SUSE Linux Enterprise Module for Development Tools 15 SP6
SUSE Linux Enterprise Module for Development Tools 15 SP7
SUSE Linux Enterprise Server 15 SP3-LTSS
SUSE Linux Enterprise Server 15 SP4-LTSS
SUSE Linux Enterprise Server 15 SP5-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP3
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Linux Enterprise Server for SAP Applications 15 SP5
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2025:4336-1
- E-Mail link for SUSE-SU-2025:4336-1
- SUSE Security Ratings
- SUSE Bug 1244485
- SUSE Bug 1245878
- SUSE Bug 1254227
- SUSE Bug 1254430
- SUSE Bug 1254431
- SUSE CVE CVE-2025-61727 page
- SUSE CVE CVE-2025-61729 page
Описание
An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.
Затронутые продукты
Ссылки
- CVE-2025-61727
- SUSE Bug 1254430
Описание
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
Затронутые продукты
Ссылки
- CVE-2025-61729
- SUSE Bug 1254431