Описание
Security update for go1.25-openssl
This update for go1.25-openssl fixes the following issues:
Update to version 1.25.7.
Security issues fixed:
- CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692).
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).
Other updates and bugfixes:
-
version update to 1.25.7:
- go#75844 cmd/compile: OOM killed on linux/arm64
- go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs
- go#77425 crypto/tls: CL 737700 broke session resumption on macOS
Список пакетов
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS
SUSE Linux Enterprise Server 15 SP4-LTSS
SUSE Linux Enterprise Server 15 SP5-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Linux Enterprise Server for SAP Applications 15 SP5
Ссылки
- Link for SUSE-SU-2026:0790-1
- E-Mail link for SUSE-SU-2026:0790-1
- SUSE Security Ratings
- SUSE Bug 1256818
- SUSE Bug 1257692
- SUSE CVE CVE-2025-61732 page
- SUSE CVE CVE-2025-68121 page
Описание
A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.
Затронутые продукты
Ссылки
- CVE-2025-61732
- SUSE Bug 1257692
Описание
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
Затронутые продукты
Ссылки
- CVE-2025-68121
- SUSE Bug 1256818