<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for go1.25</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:20157-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-12-12T07:23:58Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-12-12T07:23:58Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-12-12T07:23:58Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for go1.25</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for go1.25 fixes the following issues:

Update to go1.25.5.

Security issues fixed:

- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation
  (bsc#1254431).
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion
  (bsc#1251258).
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-47910: net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).

Other issues fixed and changes:

- Version 1.25.5:
  * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25
  * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access
    is denied, ReOpenFile error handling followup

- Version 1.25.4:
  * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining
  * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64
  * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS
  * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
  * go#75952 encoding/pem: regression when decoding blocks with leading garbage
  * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access
    is denied
  * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should
  * go#76029 pem/encoding: malformed line endings can cause panics

- Version 1.25.3:
  * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot
  * go#75777 spec: Go1.25 spec should be dated closer to actual release date

- Version 1.25.2:
  * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt
  * go#75116 os: Root.MkdirAll can return "file exists" when called concurrently on the same path
  * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root
  * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
  * go#75255 cmd/compile: export to DWARF types only referenced through interfaces
  * go#75347 testing/synctest: test timeout with no runnable goroutines
  * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
  * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail
  * go#75537 context: Err can return non-nil before Done channel is closed
  * go#75539 net/http: internal error: connCount underflow
  * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
  * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value
  * go#75669 runtime: debug.decoratemappings don't work as expected

- Version 1.25.1:
  * go#74822 cmd/go: "get toolchain@latest" should ignore release candidates
  * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
  * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755
  * go#75021 testing/synctest: bubble not terminating
  * go#75083 os: File.Seek doesn't set the correct offset with Windows overlapped handles

- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).
- Fix runtime condition for gcc/gcc7 dependency.
- Use at least gcc 7 for all architectures (bsc#1254227).
- Package svgpan.js to fix issues with "go tool pprof" (boo#1249985).
- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Leap-16.0-102</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244485</URL>
      <Description>SUSE Bug 1244485</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245878</URL>
      <Description>SUSE Bug 1245878</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247816</URL>
      <Description>SUSE Bug 1247816</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248082</URL>
      <Description>SUSE Bug 1248082</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1249141</URL>
      <Description>SUSE Bug 1249141</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1249985</URL>
      <Description>SUSE Bug 1249985</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251253</URL>
      <Description>SUSE Bug 1251253</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251254</URL>
      <Description>SUSE Bug 1251254</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251255</URL>
      <Description>SUSE Bug 1251255</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251256</URL>
      <Description>SUSE Bug 1251256</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251257</URL>
      <Description>SUSE Bug 1251257</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251258</URL>
      <Description>SUSE Bug 1251258</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251259</URL>
      <Description>SUSE Bug 1251259</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251260</URL>
      <Description>SUSE Bug 1251260</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251261</URL>
      <Description>SUSE Bug 1251261</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251262</URL>
      <Description>SUSE Bug 1251262</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254227</URL>
      <Description>SUSE Bug 1254227</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254430</URL>
      <Description>SUSE Bug 1254430</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254431</URL>
      <Description>SUSE Bug 1254431</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-47910/</URL>
      <Description>SUSE CVE CVE-2025-47910 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-47912/</URL>
      <Description>SUSE CVE CVE-2025-47912 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58183/</URL>
      <Description>SUSE CVE CVE-2025-58183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58185/</URL>
      <Description>SUSE CVE CVE-2025-58185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58186/</URL>
      <Description>SUSE CVE CVE-2025-58186 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58187/</URL>
      <Description>SUSE CVE CVE-2025-58187 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58188/</URL>
      <Description>SUSE CVE CVE-2025-58188 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58189/</URL>
      <Description>SUSE CVE CVE-2025-58189 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61723/</URL>
      <Description>SUSE CVE CVE-2025-61723 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61724/</URL>
      <Description>SUSE CVE CVE-2025-61724 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61725/</URL>
      <Description>SUSE CVE CVE-2025-61725 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61727/</URL>
      <Description>SUSE CVE CVE-2025-61727 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61729/</URL>
      <Description>SUSE CVE CVE-2025-61729 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 16.0">
      <Branch Type="Product Name" Name="openSUSE Leap 16.0">
        <FullProductName ProductID="openSUSE Leap 16.0">openSUSE Leap 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="go1.25-1.25.5-160000.1.1">
      <FullProductName ProductID="go1.25-1.25.5-160000.1.1">go1.25-1.25.5-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.25-doc-1.25.5-160000.1.1">
      <FullProductName ProductID="go1.25-doc-1.25.5-160000.1.1">go1.25-doc-1.25.5-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.25-libstd-1.25.5-160000.1.1">
      <FullProductName ProductID="go1.25-libstd-1.25.5-160000.1.1">go1.25-libstd-1.25.5-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.25-race-1.25.5-160000.1.1">
      <FullProductName ProductID="go1.25-race-1.25.5-160000.1.1">go1.25-race-1.25.5-160000.1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="go1.25-1.25.5-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1">go1.25-1.25.5-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.25-doc-1.25.5-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1">go1.25-doc-1.25.5-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.25-libstd-1.25.5-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1">go1.25-libstd-1.25.5-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.25-race-1.25.5-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1">go1.25-race-1.25.5-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.</Note>
    </Notes>
    <CVE>CVE-2025-47910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-47910.html</URL>
        <Description>CVE-2025-47910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249141</URL>
        <Description>SUSE Bug 1249141</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.</Note>
    </Notes>
    <CVE>CVE-2025-47912</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-47912.html</URL>
        <Description>CVE-2025-47912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251257</URL>
        <Description>SUSE Bug 1251257</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.</Note>
    </Notes>
    <CVE>CVE-2025-58183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58183.html</URL>
        <Description>CVE-2025-58183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251261</URL>
        <Description>SUSE Bug 1251261</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.</Note>
    </Notes>
    <CVE>CVE-2025-58185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58185.html</URL>
        <Description>CVE-2025-58185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251258</URL>
        <Description>SUSE Bug 1251258</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.</Note>
    </Notes>
    <CVE>CVE-2025-58186</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58186.html</URL>
        <Description>CVE-2025-58186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251259</URL>
        <Description>SUSE Bug 1251259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.</Note>
    </Notes>
    <CVE>CVE-2025-58187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58187.html</URL>
        <Description>CVE-2025-58187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251254</URL>
        <Description>SUSE Bug 1251254</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.</Note>
    </Notes>
    <CVE>CVE-2025-58188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58188.html</URL>
        <Description>CVE-2025-58188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251260</URL>
        <Description>SUSE Bug 1251260</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.</Note>
    </Notes>
    <CVE>CVE-2025-58189</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58189.html</URL>
        <Description>CVE-2025-58189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251255</URL>
        <Description>SUSE Bug 1251255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.</Note>
    </Notes>
    <CVE>CVE-2025-61723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61723.html</URL>
        <Description>CVE-2025-61723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251256</URL>
        <Description>SUSE Bug 1251256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.</Note>
    </Notes>
    <CVE>CVE-2025-61724</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61724.html</URL>
        <Description>CVE-2025-61724</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251262</URL>
        <Description>SUSE Bug 1251262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.</Note>
    </Notes>
    <CVE>CVE-2025-61725</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61725.html</URL>
        <Description>CVE-2025-61725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251253</URL>
        <Description>SUSE Bug 1251253</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.</Note>
    </Notes>
    <CVE>CVE-2025-61727</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61727.html</URL>
        <Description>CVE-2025-61727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254430</URL>
        <Description>SUSE Bug 1254430</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.</Note>
    </Notes>
    <CVE>CVE-2025-61729</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61729.html</URL>
        <Description>CVE-2025-61729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254431</URL>
        <Description>SUSE Bug 1254431</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
