Описание
Security update for go1.24-openssl
This update for go1.24-openssl fixes the following issues:
Update to version 1.24.13 (jsc#SLE-18320, bsc#1236217).
Security issues fixed:
- CVE-2025-61732: cmd/cgo: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692).
- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).
Other updates and bugfixes:
- go#77322 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs
- go#77424 crypto/tls: CL 737700 broke session resumption on macOS
Список пакетов
SUSE Linux Enterprise Module for Development Tools 15 SP7
SUSE Linux Enterprise Server 15 SP6-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP6
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2026:0789-1
- E-Mail link for SUSE-SU-2026:0789-1
- SUSE Security Ratings
- SUSE Bug 1236217
- SUSE Bug 1256818
- SUSE Bug 1256820
- SUSE Bug 1257692
- SUSE CVE CVE-2025-61732 page
- SUSE CVE CVE-2025-68119 page
- SUSE CVE CVE-2025-68121 page
Описание
A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.
Затронутые продукты
Ссылки
- CVE-2025-61732
- SUSE Bug 1257692
Описание
Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.
Затронутые продукты
Ссылки
- CVE-2025-68119
- SUSE Bug 1256820
Описание
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
Затронутые продукты
Ссылки
- CVE-2025-68121
- SUSE Bug 1256818