SUSE-SU-2025:03158-1: important: Security update for go1.24-openssl

SLE-UPDATES null at suse.de
Thu Sep 11 08:30:47 UTC 2025



# Security update for go1.24-openssl

Announcement ID: SUSE-SU-2025:03158-1  
Release Date: 2025-09-11T03:04:54Z  
Rating: important  
References:

  * bsc#1236217
  * bsc#1244156
  * bsc#1244157
  * bsc#1244158
  * bsc#1246118
  * bsc#1247719
  * bsc#1247720
  * jsc#SLE-18320

  
Cross-References:

  * CVE-2025-0913
  * CVE-2025-22874
  * CVE-2025-4673
  * CVE-2025-4674
  * CVE-2025-47906
  * CVE-2025-47907

  
CVSS scores:

  * CVE-2025-0913 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-0913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-0913 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-22874 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-22874 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-22874 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-4673 ( SUSE ):  8.9
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
  * CVE-2025-4673 ( SUSE ):  6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
  * CVE-2025-4673 ( NVD ):  6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
  * CVE-2025-4674 ( SUSE ):  9.3
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
  * CVE-2025-4674 ( SUSE ):  8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  * CVE-2025-4674 ( NVD ):  8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  * CVE-2025-47906 ( SUSE ):  2.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-47906 ( SUSE ):  4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2025-47907 ( SUSE ):  2.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-47907 ( SUSE ):  5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
  * CVE-2025-47907 ( NVD ):  7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L

  
Affected Products:

  * Development Tools Module 15-SP6
  * Development Tools Module 15-SP7
  * openSUSE Leap 15.6
  * SUSE Linux Enterprise Desktop 15 SP6
  * SUSE Linux Enterprise Desktop 15 SP7
  * SUSE Linux Enterprise Real Time 15 SP6
  * SUSE Linux Enterprise Real Time 15 SP7
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server 15 SP7
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP7

  
  
An update that solves six vulnerabilities, contains one feature and has one
security fix can now be installed.

## Description:

This security update of go1.24-openssl fixes the following issues:

Update to version 1.24.6 cut from the go1.24-fips-release branch at the revision
tagged go1.24.6-1-openssl-fips. Refs jsc#SLE-18320

  * Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil salt to be
    passed as a hash length buffer of zeros.

go1.24.6 (released 2025-08-06) includes security fixes to the database/sql and
os/exec packages, as well as bug fixes to the runtime. ( boo#1236217 go1.24
release tracking)

CVE-2025-47906 CVE-2025-47907:

  * go#74804 go#74466 boo#1247719 security: fix CVE-2025-47906 os/exec: LookPath
    bug: incorrect expansion of "", "." and ".." in some PATH configurations
  * go#74833 go#74831 boo#1247720 security: fix CVE-2025-47907 database/sql:
    incorrect results returned from Rows.Scan

  * go#73800 runtime: RSS seems to have increased in Go 1.24 while the runtime
    accounting has not

  * go#74416 runtime: use-after-free of allpSnapshot in findRunnable
  * go#74694 runtime: segfaults in runtime.(*unwinder).next
  * go#74760 os/user:nolibgcc: TestGroupIdsTestUser failures

go1.24.5 (released 2025-07-08) includes security fixes to the go command, as
well as bug fixes to the compiler, the linker, the , and the go command. (
boo#1236217 go1.24 release tracking) j CVE-2025-4674:

  * go#74381 go#74380 boo#1246118 security: fix CVE-2025-4674 cmd/go: disable
    support for multiple vcs in one module

  * go#73908 runtime: bad frame pointer during panic during duffcopy

  * go#74098 cmd/compile: regression on ppc64le bit operations
  * go#74113 cmd/go: crash on unknown GOEXPERIMENT during toolchain selection
  * go#74290 runtime: heap mspan limit is set too late, causing data race
    between span allocation and conservative scanning
  * go#74294 internal/trace: stress tests triggering suspected deadlock in
    tracer
  * go#74346 runtime: memlock not unlocked in all control flow paths in
    sysReserveAlignedSbrk
  * go#74363 runtime/pprof: crash "cannot read stack of running goroutine" in
    goroutine profile
  * go#74403 cmd/link: duplicated definition of symbol
    github.com/ebitengine/purego.syscall15XABI0 when running with ASAN

go1.24.4 (released 2025-06-05) includes security fixes to the crypto/x509,
net/http, and os packages, as well as bug fixes to the linker, the go command,
and the hash/maphash and os packages. ( boo#1236217 go1.24 release tracking)

CVE-2025-22874 CVE-2025-0913 CVE-2025-4673 * go#73700 go#73702 boo#1244158
security: fix CVE-2025-22874 crypto/x509: ExtKeyUsageAny bypasses policy
validation * go#73720 go#73612 boo#1244157 security: fix CVE-2025-0913 os:
inconsistent handling of O_CREATE|O_EXCL on Unix and Windows * go#73906 go#73816
boo#1244156 security: fix CVE-2025-4673 net/http: sensitive headers not cleared
on cross-origin redirect

  * go#73570 os: Root.Mkdir creates directories with zero permissions on OpenBSD
  * go#73669 hash/maphash: hashing channels with purego impl. of
    maphash.Comparable panics
  * go#73678 runtime/debug: BuildSetting does not document DefaultGODEBUG
  * go#73809 cmd/go: add fips140 module selection mechanism
  * go#73832 cmd/link: Go 1.24.3 and 1.23.9 regression - duplicated definition
    of symbol dlopen

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * Development Tools Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-3158=1

  * Development Tools Module 15-SP7  
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-3158=1

  * openSUSE Leap 15.6  
    zypper in -t patch SUSE-2025-3158=1 openSUSE-SLE-15.6-2025-3158=1

## Package List:

  * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
    * go1.24-openssl-race-1.24.6-150600.13.9.1
    * go1.24-openssl-doc-1.24.6-150600.13.9.1
    * go1.24-openssl-1.24.6-150600.13.9.1
  * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
    * go1.24-openssl-race-1.24.6-150600.13.9.1
    * go1.24-openssl-debuginfo-1.24.6-150600.13.9.1
    * go1.24-openssl-doc-1.24.6-150600.13.9.1
    * go1.24-openssl-1.24.6-150600.13.9.1
  * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
    * go1.24-openssl-debuginfo-1.24.6-150600.13.9.1
    * go1.24-openssl-doc-1.24.6-150600.13.9.1
    * go1.24-openssl-1.24.6-150600.13.9.1
  * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
    * go1.24-openssl-race-1.24.6-150600.13.9.1

## References:

  * https://www.suse.com/security/cve/CVE-2025-0913.html
  * https://www.suse.com/security/cve/CVE-2025-22874.html
  * https://www.suse.com/security/cve/CVE-2025-4673.html
  * https://www.suse.com/security/cve/CVE-2025-4674.html
  * https://www.suse.com/security/cve/CVE-2025-47906.html
  * https://www.suse.com/security/cve/CVE-2025-47907.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1236217
  * https://bugzilla.suse.com/show_bug.cgi?id=1244156
  * https://bugzilla.suse.com/show_bug.cgi?id=1244157
  * https://bugzilla.suse.com/show_bug.cgi?id=1244158
  * https://bugzilla.suse.com/show_bug.cgi?id=1246118
  * https://bugzilla.suse.com/show_bug.cgi?id=1247719
  * https://bugzilla.suse.com/show_bug.cgi?id=1247720
  * https://jira.suse.com/browse/SLE-18320

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250911/4b1efad9/attachment.htm>


More information about the sle-updates mailing list