Описание
Security update for go1.25-openssl
This update for go1.25-openssl fixes the following issues:
Update to go 1.25.8 (bsc#1244485, jsc#SLE-18320):
- CVE-2025-61732: cmd/cgo: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692).
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).
- CVE-2026-25679: net/url: reject IPv6 literal not at start of host (bsc#1259264).
- CVE-2026-27139: os: FileInfo can escape from a Root (bsc#1259268).
- CVE-2026-27142: html/template: URLs in meta content attribute actions are not escaped (bsc#1259265).
Changelog:
- go#77253 cmd/compile: miscompile of global array initialization
- go#77406 os: Go 1.25.x regression on RemoveAll for windows
- go#77413 runtime: netpollinit() incorrectly prints the error from linux.Eventfd
- go#77438 cmd/go: CGO compilation fails after upgrading from Go 1.25.5 to 1.25.6 due to --define-variable flag in pkg-config
- go#77531 net/smtp: expiry date of localhostCert for testing is too short
- go#75844 cmd/compile: OOM killed on linux/arm64
- go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs
- go#77425 crypto/tls: CL 737700 broke session resumption on macOS
Список пакетов
SUSE Linux Enterprise Module for Development Tools 15 SP7
SUSE Linux Enterprise Server 15 SP6-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP6
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2026:0977-1
- E-Mail link for SUSE-SU-2026:0977-1
- SUSE Security Ratings
- SUSE Bug 1244485
- SUSE Bug 1256818
- SUSE Bug 1257692
- SUSE Bug 1259264
- SUSE Bug 1259265
- SUSE Bug 1259268
- SUSE CVE CVE-2025-61732 page
- SUSE CVE CVE-2025-68121 page
- SUSE CVE CVE-2026-25679 page
- SUSE CVE CVE-2026-27139 page
- SUSE CVE CVE-2026-27142 page
Описание
A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.
Затронутые продукты
Ссылки
- CVE-2025-61732
- SUSE Bug 1257692
Описание
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
Затронутые продукты
Ссылки
- CVE-2025-68121
- SUSE Bug 1256818
Описание
url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.
Затронутые продукты
Ссылки
- CVE-2026-25679
- SUSE Bug 1259264
Описание
On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.
Затронутые продукты
Ссылки
- CVE-2026-27139
- SUSE Bug 1259268
Описание
Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0.
Затронутые продукты
Ссылки
- CVE-2026-27142
- SUSE Bug 1259265