<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for go1.24</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:20429-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-02-13T11:58:52Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-02-13T11:58:52Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-02-13T11:58:52Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for go1.24</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for go1.24 fixes the following issues:

Update to version 1.24.13.

Security issues fixed:

- CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing  allows for C code smuggling (bsc#1257692).
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does
  not account for the expiration of full certificate chain (bsc#1256818).
- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc1256820).

Other updates and bugfixes:

- version update to 1.24.13:

  * go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs
  * go#77424 crypto/tls: CL 737700 broke session resumption on macOS
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLES-16.0-270</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620429-1/</URL>
      <Description>Link for SUSE-SU-2026:20429-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:20429-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236217</URL>
      <Description>SUSE Bug 1236217</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256818</URL>
      <Description>SUSE Bug 1256818</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256820</URL>
      <Description>SUSE Bug 1256820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257692</URL>
      <Description>SUSE Bug 1257692</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61732/</URL>
      <Description>SUSE CVE CVE-2025-61732 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-68119/</URL>
      <Description>SUSE CVE CVE-2025-68119 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-68121/</URL>
      <Description>SUSE CVE CVE-2025-68121 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 16.0">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 16.0">
        <FullProductName ProductID="SUSE Linux Enterprise Server 16.0" CPE="cpe:/o:suse:sles:16:16.0:server">SUSE Linux Enterprise Server 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP applications 16.0">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP applications 16.0">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP applications 16.0" CPE="cpe:/o:suse:sles:16:16.0:server-sap">SUSE Linux Enterprise Server for SAP applications 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-1.24.13-160000.1.1">
      <FullProductName ProductID="go1.24-1.24.13-160000.1.1">go1.24-1.24.13-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-doc-1.24.13-160000.1.1">
      <FullProductName ProductID="go1.24-doc-1.24.13-160000.1.1">go1.24-doc-1.24.13-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-libstd-1.24.13-160000.1.1">
      <FullProductName ProductID="go1.24-libstd-1.24.13-160000.1.1">go1.24-libstd-1.24.13-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-race-1.24.13-160000.1.1">
      <FullProductName ProductID="go1.24-race-1.24.13-160000.1.1">go1.24-race-1.24.13-160000.1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="go1.24-1.24.13-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:go1.24-1.24.13-160000.1.1">go1.24-1.24.13-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-doc-1.24.13-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.13-160000.1.1">go1.24-doc-1.24.13-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-libstd-1.24.13-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.13-160000.1.1">go1.24-libstd-1.24.13-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-race-1.24.13-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.13-160000.1.1">go1.24-race-1.24.13-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-1.24.13-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.13-160000.1.1">go1.24-1.24.13-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-doc-1.24.13-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.13-160000.1.1">go1.24-doc-1.24.13-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-libstd-1.24.13-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.13-160000.1.1">go1.24-libstd-1.24.13-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-race-1.24.13-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.13-160000.1.1">go1.24-race-1.24.13-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP applications 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.</Note>
    </Notes>
    <CVE>CVE-2025-61732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.13-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620429-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61732.html</URL>
        <Description>CVE-2025-61732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257692</URL>
        <Description>SUSE Bug 1257692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.</Note>
    </Notes>
    <CVE>CVE-2025-68119</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.13-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620429-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-68119.html</URL>
        <Description>CVE-2025-68119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256820</URL>
        <Description>SUSE Bug 1256820</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.</Note>
    </Notes>
    <CVE>CVE-2025-68121</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.13-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.13-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620429-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-68121.html</URL>
        <Description>CVE-2025-68121</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256818</URL>
        <Description>SUSE Bug 1256818</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
