openSUSE 16 Security Update : go1.24 (openSUSE-SU-2025:20158-1)

medium Nessus Plugin ID 278641

Language:

Synopsis

The remote openSUSE host is missing one or more security updates.

Description

The remote openSUSE 16 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2025:20158-1 advisory.

Update to go1.24.11.

Security issues fixed:

- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).


Other issues fixed and changes:

- Version 1.24.11:
* go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores

- Version 1.24.10:
* go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
* go#75951 encoding/pem: regression when decoding blocks with leading garbage
* go#76028 pem/encoding: malformed line endings can cause panics

- Version 1.24.9:
* go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot

- Version 1.24.8:
* go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root
* go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol
* go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
* go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9
* go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75538 net/http: internal error: connCount underflow
* go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
* go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value

- Version 1.24.7:
* go#75007 os/exec: TestLookPath fails on plan9 after CL 685755
* go#74821 cmd/go: get toolchain@latest should ignore release candidates
* go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets

- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).
- Package svgpan.js to fix issues with go tool pprof (bsc#1249985).
- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected go1.24, go1.24-libstd and / or go1.24-race packages.

See Also

https://bugzilla.suse.com/1236217

https://bugzilla.suse.com/1245878

https://bugzilla.suse.com/1247816

https://bugzilla.suse.com/1248082

https://bugzilla.suse.com/1249985

https://bugzilla.suse.com/1251253

https://bugzilla.suse.com/1251254

https://bugzilla.suse.com/1251255

https://bugzilla.suse.com/1251256

https://bugzilla.suse.com/1251257

https://bugzilla.suse.com/1251258

https://bugzilla.suse.com/1251259

https://bugzilla.suse.com/1251260

https://bugzilla.suse.com/1251261

https://bugzilla.suse.com/1251262

https://bugzilla.suse.com/1254430

https://bugzilla.suse.com/1254431

https://www.suse.com/security/cve/CVE-2025-47912

https://www.suse.com/security/cve/CVE-2025-58183

https://www.suse.com/security/cve/CVE-2025-58185

https://www.suse.com/security/cve/CVE-2025-58186

https://www.suse.com/security/cve/CVE-2025-58187

https://www.suse.com/security/cve/CVE-2025-58188

https://www.suse.com/security/cve/CVE-2025-58189

https://www.suse.com/security/cve/CVE-2025-61723

https://www.suse.com/security/cve/CVE-2025-61724

https://www.suse.com/security/cve/CVE-2025-61725

https://www.suse.com/security/cve/CVE-2025-61727

https://www.suse.com/security/cve/CVE-2025-61729

Plugin Details

Severity: Medium

ID: 278641

File Name: openSUSE-2025-20158-1.nasl

Version: 1.2

Type: local

Agent: unix

Published: 12/15/2025

Updated: 12/16/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:C

CVSS Score Source: CVE-2025-47912

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2025-61727

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:go1.24, p-cpe:/a:novell:opensuse:go1.24-race, cpe:/o:novell:opensuse:16.0, p-cpe:/a:novell:opensuse:go1.24-libstd

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/12/2025

Vulnerability Publication Date: 10/23/2025

Reference Information

CVE: CVE-2025-47912, CVE-2025-58183, CVE-2025-58185, CVE-2025-58186, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729