SUSE-CU-2025:6842-1: Security update of bci/golang

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Tue Sep 16 10:17:12 UTC 2025


SUSE Container Update Advisory: bci/golang
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:6842-1
Container Tags        : bci/golang:1.24-openssl , bci/golang:1.24.6-openssl , bci/golang:1.24.6-openssl-74.4 , bci/golang:oldstable-openssl , bci/golang:oldstable-openssl-74.4
Container Release     : 74.4
Severity              : important
Type                  : security
References            : 1228260 1236217 1236589 1243397 1243706 1243933 1243960 1244156
                        1244157 1244158 1246118 1246197 1247719 1247720 1249191 1249348
                        1249367 CVE-2024-6874 CVE-2025-0665 CVE-2025-0913 CVE-2025-10148
                        CVE-2025-22874 CVE-2025-4673 CVE-2025-4674 CVE-2025-47906 CVE-2025-47907
                        CVE-2025-4947 CVE-2025-5025 CVE-2025-5399 CVE-2025-9086 
-----------------------------------------------------------------

The container bci/golang was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1553-1
Released:    Wed May 14 19:07:53 2025
Summary:     Recommended update for go1.24-openssl
Type:        recommended
Severity:    moderate
References:  
This update for go1.24-openssl fixes the following issues:

This ships the go1.24.3 openssl flavor. (jsc#SLE-18320)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1847-1
Released:    Mon Jun  9 20:34:37 2025
Summary:     Recommended update for go1.24-openssl
Type:        recommended
Severity:    important
References:  1243960
This update for go1.24-openssl fixes the following issues:

Update to version 1.24.3 cut from the go1.24-fips-release branch at the
revision tagged go1.24.3-3-openssl-fips.  (jsc#SLE-18320)

* Fix GOLANG_FIPS=0 and enable CGO for bin/go

Update to version 1.24.3 cut from the go1.24-fips-release branch at the
revision tagged go1.24.3-2-openssl-fips.  (jsc#SLE-18320 bsc#1243960)

* Force fips140tls in boring mode and run http tests
* Implement HKDF for TLS (#297) bsc#1243960. This was previously
  left unimplemented and would panic if invoked. This was not
  caught because we only run a subset of the TLS tests in FIPS
  mode. This patch adds the test case which would have caught
  this into our test script and fixes the panic with an
  implementation of HKDF label expanding.
* Improve documentation (#294)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3158-1
Released:    Thu Sep 11 05:04:45 2025
Summary:     Security update for go1.24-openssl
Type:        security
Severity:    important
References:  1236217,1244156,1244157,1244158,1246118,1247719,1247720,CVE-2025-0913,CVE-2025-22874,CVE-2025-4673,CVE-2025-4674,CVE-2025-47906,CVE-2025-47907

This security update of go1.24-openssl fixes the following issues:

Update to version 1.24.6 cut from the go1.24-fips-release
branch at the revision tagged go1.24.6-1-openssl-fips.
Refs jsc#SLE-18320

* Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil
  salt to be passed as a hash length buffer of zeros.

go1.24.6 (released 2025-08-06) includes security fixes to the
database/sql and os/exec packages, as well as bug fixes to the
runtime.  ( boo#1236217 go1.24 release tracking)

CVE-2025-47906 CVE-2025-47907:

* go#74804 go#74466 boo#1247719 security: fix CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of '', '.' and '..' in some PATH configurations
* go#74833 go#74831 boo#1247720 security: fix CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan

* go#73800 runtime: RSS seems to have increased in Go 1.24 while the runtime accounting has not
* go#74416 runtime: use-after-free of allpSnapshot in findRunnable
* go#74694 runtime: segfaults in runtime.(*unwinder).next
* go#74760 os/user:nolibgcc: TestGroupIdsTestUser failures

go1.24.5 (released 2025-07-08) includes security fixes to the go
command, as well as bug fixes to the compiler, the linker, the , and
the go command.  ( boo#1236217 go1.24 release tracking)
j
CVE-2025-4674:

* go#74381 go#74380 boo#1246118 security: fix CVE-2025-4674 cmd/go: disable support for multiple vcs in one module

* go#73908 runtime: bad frame pointer during panic during duffcopy
* go#74098 cmd/compile: regression on ppc64le bit operations
* go#74113 cmd/go: crash on unknown GOEXPERIMENT during toolchain selection
* go#74290 runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning
* go#74294 internal/trace: stress tests triggering suspected deadlock in tracer
* go#74346 runtime: memlock not unlocked in all control flow paths in sysReserveAlignedSbrk
* go#74363 runtime/pprof: crash 'cannot read stack of running goroutine' in goroutine profile
* go#74403 cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN

go1.24.4 (released 2025-06-05) includes security fixes to the
crypto/x509, net/http, and os packages, as well as bug fixes to
the linker, the go command, and the hash/maphash and os packages.
( boo#1236217 go1.24 release tracking)

CVE-2025-22874 CVE-2025-0913 CVE-2025-4673
* go#73700 go#73702 boo#1244158 security: fix CVE-2025-22874 crypto/x509: ExtKeyUsageAny bypasses policy validation
* go#73720 go#73612 boo#1244157 security: fix CVE-2025-0913 os: inconsistent handling of O_CREATE|O_EXCL on Unix and Windows
* go#73906 go#73816 boo#1244156 security: fix CVE-2025-4673 net/http: sensitive headers not cleared on cross-origin redirect

* go#73570 os: Root.Mkdir creates directories with zero permissions on OpenBSD
* go#73669 hash/maphash: hashing channels with purego impl. of maphash.Comparable panics
* go#73678 runtime/debug: BuildSetting does not document DefaultGODEBUG
* go#73809 cmd/go: add fips140 module selection mechanism
* go#73832 cmd/link: Go 1.24.3 and 1.23.9 regression - duplicated definition of symbol dlopen

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3198-1
Released:    Fri Sep 12 14:15:08 2025
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1228260,1236589,1243397,1243706,1243933,1246197,1249191,1249348,1249367,CVE-2024-6874,CVE-2025-0665,CVE-2025-10148,CVE-2025-4947,CVE-2025-5025,CVE-2025-5399,CVE-2025-9086
This update for curl fixes the following issues:

Update to version 8.14.1 (jsc#PED-13055, jsc#PED-13056).    
    
Security issues fixed:

- CVE-2025-0665: eventfd double close can cause libcurl to act unreliably (bsc#1236589).
- CVE-2025-4947: QUIC certificate check is skipped with wolfSSL allows for MITM attacks (bsc#1243397).
- CVE-2025-5025: no QUIC certificate pinning with wolfSSL can lead to connections to impostor servers that are not
  easily noticed (bsc#1243706).
- CVE-2025-5399: bug in websocket code can cause libcurl to get trapped in an endless busy-loop when processing
  specially crafted packets (bsc#1243933).
- CVE-2024-6874: punycode conversions to/from IDN can leak stack content when libcurl is built to use the macidn IDN
  backend (bsc#1228260).
- CVE-2025-9086: bug in patch comparison logic when processing cookies can lead to out-of-bounds read in heap buffer
  (bsc#1249191).
- CVE-2025-10148: predictable websocket mask can lead to proxy cache poisoning by malicious server (bsc#1249348).

Other issues fixed:
    
- Fix wrong return code when --retry is used (bsc#1249367).
  * tool_operate: fix return code when --retry is used but not triggered [b42776b]
    
- Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).
  * tool_getparam: fix --ftp-pasv [5f805ee]

- Fixed with version 8.14.1:
  * TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs.
  * websocket: add option to disable auto-pong reply.
  * huge number of bugfixes.

  Please see https://curl.se/ch/ for full changelogs.


The following package changes have been done:

- libcurl4-8.14.1-150600.4.28.1 updated
- curl-8.14.1-150600.4.28.1 updated
- go1.24-openssl-doc-1.24.6-150600.13.9.1 added
- go1.24-openssl-1.24.6-150600.13.9.1 added
- go1.24-openssl-race-1.24.6-150600.13.9.1 added
- container:registry.suse.com-bci-bci-base-15.7-7509e7e16dfdc2ba3eb2a7409a432209c89350947682a3713af951a95da4b936-0 updated
- go1.23-openssl-1.23.12-150600.13.9.1 removed
- go1.23-openssl-doc-1.23.12-150600.13.9.1 removed
- go1.23-openssl-race-1.23.12-150600.13.9.1 removed


More information about the sle-container-updates mailing list