Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2025:20158-1

Опубликовано: 12 дек. 2025
Источник: suse-cvrf

Описание

Security update for go1.24

This update for go1.24 fixes the following issues:

Update to go1.24.11.

Security issues fixed:

  • CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
  • CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
  • CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).
  • CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
  • CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
  • CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
  • CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
  • CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
  • CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
  • CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
  • CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
  • CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).

Other issues fixed and changes:

  • Version 1.24.11:

    • go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores
  • Version 1.24.10:

    • go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
    • go#75951 encoding/pem: regression when decoding blocks with leading garbage
    • go#76028 pem/encoding: malformed line endings can cause panics
  • Version 1.24.9:

    • go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot
  • Version 1.24.8:

    • go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root
    • go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
    • go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol
    • go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
    • go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9
    • go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail
    • go#75538 net/http: internal error: connCount underflow
    • go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
    • go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value
  • Version 1.24.7:

    • go#75007 os/exec: TestLookPath fails on plan9 after CL 685755
    • go#74821 cmd/go: "get toolchain@latest" should ignore release candidates
    • go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
  • Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).

  • Package svgpan.js to fix issues with "go tool pprof" (bsc#1249985).

  • Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).

Список пакетов

openSUSE Leap 16.0
go1.24-1.24.11-160000.1.1
go1.24-doc-1.24.11-160000.1.1
go1.24-libstd-1.24.11-160000.1.1
go1.24-race-1.24.11-160000.1.1

Описание

The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки

Описание

tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки

Описание

Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки

Описание

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки

Описание

Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки

Описание

Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки

Описание

When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки

Описание

The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки

Описание

The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки

Описание

The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки

Описание

An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки

Описание

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.


Затронутые продукты
openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1
openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1

Ссылки
Уязвимость openSUSE-SU-2025:20158-1