{"affected":[{"ecosystem_specific":{"binaries":[{"go1.24":"1.24.13-160000.1.1","go1.24-doc":"1.24.13-160000.1.1","go1.24-libstd":"1.24.13-160000.1.1","go1.24-race":"1.24.13-160000.1.1"}]},"package":{"ecosystem":"openSUSE:Leap 16.0","name":"go1.24","purl":"pkg:rpm/opensuse/go1.24&distro=openSUSE%20Leap%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.24.13-160000.1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for go1.24 fixes the following issues:\n\nUpdate to version 1.24.13.\n\nSecurity issues fixed:\n\n- CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing  allows for C code smuggling (bsc#1257692).\n- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does\n  not account for the expiration of full certificate chain (bsc#1256818).\n- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc1256820).\n\nOther updates and bugfixes:\n\n- version update to 1.24.13:\n\n  * go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs\n  * go#77424 crypto/tls: CL 737700 broke session resumption on macOS\n","id":"openSUSE-SU-2026:20220-1","modified":"2026-02-13T11:53:30Z","published":"2026-02-13T11:53:30Z","references":[{"type":"ADVISORY","url":null},{"type":"REPORT","url":"https://bugzilla.suse.com/1236217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256818"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257692"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-61732"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68121"}],"related":["CVE-2025-61732","CVE-2025-68119","CVE-2025-68121"],"summary":"Security update for go1.24","upstream":["CVE-2025-61732","CVE-2025-68119","CVE-2025-68121"]}