<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">go1.24-1.24rc2-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:15755</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-01-24T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-01-24T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-01-24T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">go1.24-1.24rc2-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the go1.24-1.24rc2-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-15755</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45336/</URL>
      <Description>SUSE CVE CVE-2024-45336 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45340/</URL>
      <Description>SUSE CVE CVE-2024-45340 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45341/</URL>
      <Description>SUSE CVE CVE-2024-45341 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-22865/</URL>
      <Description>SUSE CVE CVE-2025-22865 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-1.24rc2-1.1">
      <FullProductName ProductID="go1.24-1.24rc2-1.1">go1.24-1.24rc2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-doc-1.24rc2-1.1">
      <FullProductName ProductID="go1.24-doc-1.24rc2-1.1">go1.24-doc-1.24rc2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-libstd-1.24rc2-1.1">
      <FullProductName ProductID="go1.24-libstd-1.24rc2-1.1">go1.24-libstd-1.24rc2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-race-1.24rc2-1.1">
      <FullProductName ProductID="go1.24-race-1.24rc2-1.1">go1.24-race-1.24rc2-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="go1.24-1.24rc2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:go1.24-1.24rc2-1.1">go1.24-1.24rc2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-doc-1.24rc2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1">go1.24-doc-1.24rc2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-libstd-1.24rc2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1">go1.24-libstd-1.24rc2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-race-1.24rc2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1">go1.24-race-1.24rc2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.</Note>
    </Notes>
    <CVE>CVE-2024-45336</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:go1.24-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45336.html</URL>
        <Description>CVE-2024-45336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236045</URL>
        <Description>SUSE Bug 1236045</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236046</URL>
        <Description>SUSE Bug 1236046</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Credentials provided via the new GOAUTH feature were not being properly segmented by domain, allowing a malicious server to request credentials they should not have access to. By default, unless otherwise set, this only affected credentials stored in the users .netrc file.</Note>
    </Notes>
    <CVE>CVE-2024-45340</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:go1.24-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45340.html</URL>
        <Description>CVE-2024-45340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236360</URL>
        <Description>SUSE Bug 1236360</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.</Note>
    </Notes>
    <CVE>CVE-2024-45341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:go1.24-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45341.html</URL>
        <Description>CVE-2024-45341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236045</URL>
        <Description>SUSE Bug 1236045</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.</Note>
    </Notes>
    <CVE>CVE-2025-22865</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:go1.24-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-22865.html</URL>
        <Description>CVE-2025-22865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236361</URL>
        <Description>SUSE Bug 1236361</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
