Описание
Security update for go1.25-openssl
This update for go1.25-openssl fixes the following issues:
Update to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):
Security fixes:
- CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).
- CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of '', '.' and '..' in some PATH configurations (bsc#1247719).
- CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).
- CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).
- CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).
- CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).
- CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).
- CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).
- CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).
- CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).
- CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).
- CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).
Other fixes:
- go#74822 cmd/go: 'get toolchain@latest' should ignore release candidates
- go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
- go#75008 os/exec: TestLookPath fails on plan9 after CL 685755
- go#75021 testing/synctest: bubble not terminating
- go#75083 os: File.Seek doesn't set the correct offset with Windows overlapped handles
- go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt
- go#75116 os: Root.MkdirAll can return 'file exists' when called concurrently on the same path
- go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root
- go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
- go#75255 cmd/compile: export to DWARF types only referenced through interfaces
- go#75347 testing/synctest: test timeout with no runnable goroutines
- go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
- go#75480 cmd/link: linker panic and relocation errors with complex generics inlining
- go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail
- go#75537 context: Err can return non-nil before Done channel is closed
- go#75539 net/http: internal error: connCount underflow
- go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
- go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value
- go#75669 runtime: debug.decoratemappings don't work as expected
- go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64
- go#75777 spec: Go1.25 spec should be dated closer to actual release date
- go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS
- go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
- go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot
- go#75952 encoding/pem: regression when decoding blocks with leading garbage
- go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied
- go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should
- go#76029 pem/encoding: malformed line endings can cause panics
- go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25
- go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup
- go#76392 os: package initialization hangs is Stdin is blocked
- go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled
- go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes
- go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386
- go#76776 runtime: race detector crash on ppc64le
- go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling : runtime error: index out of range
- go#76973 errors: errors.Join behavior changed in 1.25
Список пакетов
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS
SUSE Linux Enterprise Server 15 SP4-LTSS
SUSE Linux Enterprise Server 15 SP5-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Linux Enterprise Server for SAP Applications 15 SP5
Ссылки
- Link for SUSE-SU-2026:0297-1
- E-Mail link for SUSE-SU-2026:0297-1
- SUSE Security Ratings
- SUSE Bug 1244485
- SUSE Bug 1245878
- SUSE Bug 1246118
- SUSE Bug 1247719
- SUSE Bug 1247720
- SUSE Bug 1247816
- SUSE Bug 1248082
- SUSE Bug 1249141
- SUSE Bug 1249985
- SUSE Bug 1251253
- SUSE Bug 1251254
- SUSE Bug 1251255
- SUSE Bug 1251256
- SUSE Bug 1251257
- SUSE Bug 1251258
- SUSE Bug 1251259
- SUSE Bug 1251260
Описание
The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
Затронутые продукты
Ссылки
- CVE-2025-4674
- SUSE Bug 1246118
Описание
If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath ("", ".", and ".."), can result in the binaries listed in the PATH being unexpectedly returned.
Затронутые продукты
Ссылки
- CVE-2025-47906
- SUSE Bug 1247719
Описание
Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.
Затронутые продукты
Ссылки
- CVE-2025-47907
- SUSE Bug 1247720
Описание
When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.
Затронутые продукты
Ссылки
- CVE-2025-47910
- SUSE Bug 1249141
Описание
The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.
Затронутые продукты
Ссылки
- CVE-2025-47912
- SUSE Bug 1251257
Описание
tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.
Затронутые продукты
Ссылки
- CVE-2025-58183
- SUSE Bug 1251261
Описание
Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.
Затронутые продукты
Ссылки
- CVE-2025-58185
- SUSE Bug 1251258
Описание
Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.
Затронутые продукты
Ссылки
- CVE-2025-58186
- SUSE Bug 1251259
Описание
Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.
Затронутые продукты
Ссылки
- CVE-2025-58187
- SUSE Bug 1251254
Описание
Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.
Затронутые продукты
Ссылки
- CVE-2025-58188
- SUSE Bug 1251260
Описание
When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.
Затронутые продукты
Ссылки
- CVE-2025-58189
- SUSE Bug 1251255
Описание
The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.
Затронутые продукты
Ссылки
- CVE-2025-61723
- SUSE Bug 1251256
Описание
The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.
Затронутые продукты
Ссылки
- CVE-2025-61724
- SUSE Bug 1251262
Описание
The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.
Затронутые продукты
Ссылки
- CVE-2025-61725
- SUSE Bug 1251253
Описание
unknown
Затронутые продукты
Ссылки
- CVE-2025-61726
- SUSE Bug 1256817
Описание
An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.
Затронутые продукты
Ссылки
- CVE-2025-61727
- SUSE Bug 1254430
Описание
unknown
Затронутые продукты
Ссылки
- CVE-2025-61728
- SUSE Bug 1256816
Описание
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
Затронутые продукты
Ссылки
- CVE-2025-61729
- SUSE Bug 1254431
Описание
unknown
Затронутые продукты
Ссылки
- CVE-2025-61730
- SUSE Bug 1256821
Описание
unknown
Затронутые продукты
Ссылки
- CVE-2025-61731
- SUSE Bug 1256819
Описание
unknown
Затронутые продукты
Ссылки
- CVE-2025-68119
- SUSE Bug 1256820
Описание
unknown
Затронутые продукты
Ссылки
- CVE-2025-68121
- SUSE Bug 1256818