Package Release Info

go1.24-openssl-1.24.6-160000.1.2

Update Info: Base Release
Available in Package Hub : 16.0

platforms

AArch64
ppc64le
s390x
x86-64

subpackages

go1.24-openssl-doc

Change Logs

* Mon Aug 11 2025 jkowalczyk@suse.com
- Update to version 1.24.6 cut from the go1.24-fips-release
  branch at the revision tagged go1.24.6-1-openssl-fips.
  Refs jsc#SLE-18320
  * Rebase to 1.24.6
  * Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil
    salt to be passed as a hash length buffer of zeros.
* Wed Aug 06 2025 jkowalczyk@suse.com
- go1.24.6 (released 2025-08-06) includes security fixes to the
  database/sql and os/exec packages, as well as bug fixes to the
  runtime.
  Refs boo#1236217 go1.24 release tracking
  CVE-2025-47906 CVE-2025-47907
  * go#74804 go#74466 boo#1247719 security: fix CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of "", "." and ".." in some PATH configurations
  * go#74833 go#74831 boo#1247720 security: fix CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan
  * go#73800 runtime: RSS seems to have increased in Go 1.24 while the runtime accounting has not
  * go#74416 runtime: use-after-free of allpSnapshot in findRunnable
  * go#74694 runtime: segfaults in runtime.(*unwinder).next
  * go#74760 os/user:nolibgcc: TestGroupIdsTestUser failures
* Thu Jul 31 2025 jkowalczyk@suse.com
- Update to version 1.24.5 cut from the go1.24-fips-release
  branch at the revision tagged go1.24.5-1-openssl-fips.
  Refs jsc#SLE-18320
  * Rebase to 1.24.5
* Tue Jul 08 2025 jkowalczyk@suse.com
- go1.24.5 (released 2025-07-08) includes security fixes to the go
  command, as well as bug fixes to the compiler, the linker, the
  runtime, and the go command.
  Refs boo#1236217 go1.24 release tracking
  CVE-2025-4674
  * go#74381 go#74380 boo#1246118 security: fix CVE-2025-4674 cmd/go: disable support for multiple vcs in one module
  * go#73908 runtime: bad frame pointer during panic during duffcopy
  * go#74098 cmd/compile: regression on ppc64le bit operations
  * go#74113 cmd/go: crash on unknown GOEXPERIMENT during toolchain selection
  * go#74290 runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning
  * go#74294 internal/trace: stress tests triggering suspected deadlock in tracer
  * go#74346 runtime: memlock not unlocked in all control flow paths in sysReserveAlignedSbrk
  * go#74363 runtime/pprof: crash "cannot read stack of running goroutine" in goroutine profile
  * go#74403 cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN
* Fri Jun 06 2025 jkowalczyk@suse.com
- Update to version 1.24.4 cut from the go1.24-fips-release
  branch at the revision tagged go1.24.4-1-openssl-fips.
  Refs jsc#SLE-18320
  * Rebase to 1.24.4
  * Add ubi10, c10s targets to gating
* Thu Jun 05 2025 jkowalczyk@suse.com
- go1.24.4 (released 2025-06-05) includes security fixes to the
  crypto/x509, net/http, and os packages, as well as bug fixes to
  the linker, the go command, and the hash/maphash and os packages.
  Refs boo#1236217 go1.24 release tracking
  CVE-2025-22874 CVE-2025-0913 CVE-2025-4673
  * go#73700 go#73702 boo#1244158 security: fix CVE-2025-22874 crypto/x509: ExtKeyUsageAny bypasses policy validation
  * go#73720 go#73612 boo#1244157 security: fix CVE-2025-0913 os: inconsistent handling of O_CREATE|O_EXCL on Unix and Windows
  * go#73906 go#73816 boo#1244156 security: fix CVE-2025-4673 net/http: sensitive headers not cleared on cross-origin redirect
  * go#73570 os: Root.Mkdir creates directories with zero permissions on OpenBSD
  * go#73669 hash/maphash: hashing channels with purego impl. of maphash.Comparable panics
  * go#73678 runtime/debug: BuildSetting does not document DefaultGODEBUG
  * go#73809 cmd/go: add fips140 module selection mechanism
  * go#73832 cmd/link: Go 1.24.3 and 1.23.9 regression - duplicated definition of symbol dlopen
* Mon Jun 02 2025 jkowalczyk@suse.com
- Update to version 1.24.3 cut from the go1.24-fips-release
  branch at the revision tagged go1.24.3-3-openssl-fips.
  Refs jsc#SLE-18320
  * Fix GOLANG_FIPS=0 and enable CGO for bin/go
* Tue May 27 2025 jkowalczyk@suse.com
- Update to version 1.24.3 cut from the go1.24-fips-release
  branch at the revision tagged go1.24.3-2-openssl-fips.
  Refs jsc#SLE-18320 bsc#1243960
  * Force fips140tls in boring mode and run http tests
  * Implement HKDF for TLS (#297) bsc#1243960. This was previously
    left unimplemented and would panic if invoked. This was not
    caught because we only run a subset of the TLS tests in FIPS
    mode. This patch adds the test case which would have caught
    this into our test script and fixes the panic with an
    implementation of HKDF label expanding.
  * Improve documentation (#294)
* Wed May 07 2025 jkowalczyk@suse.com
- Update to version 1.24.3 cut from the go1.24-fips-release
  branch at the revision tagged go1.24.3-1-openssl-fips.
  Refs jsc#SLE-18320
  * Rebase to 1.24.3
* Tue May 06 2025 jkowalczyk@suse.com
- go1.24.3 (released 2025-05-06) includes security fixes to the os
  package, as well as bug fixes to the runtime, the compiler, the
  linker, the go command, and the crypto/tls and os packages.
  Refs boo#1236217 go1.24 release tracking
  CVE-2025-22873
  * go#73556 go#73555 boo#1242715 security: fix CVE-2025-22873 os: Root permits access to parent directory
  * go#73082 os: Root.Open panics when opening a symlink referencing the root
  * go#73092 cmd/link: linkname directive on userspace variable can override runtime variable
  * go#73118 crypto/tls: ECH decodeInnerClientHello incorrectly rejects ClientHello with GREASE values in supportedVersions
  * go#73144 runtime: segmentation fault from vgetrandomPutState and runtime.growslice w/ runtime.OSLockThread
  * go#73192 runtime: -race data race map traceback report incorrect functions
  * go#73281 cmd/compile: program compiles to wasm but is invalid: go:wasmexport: integer too large
  * go#73379 runtime, x/sys/unix: Connectx is broken on darwin/amd64
  * go#73440 cmd/compile: infinite loop in the inliner
  * go#73500 cmd/go: +dirty in version stamping doesn't combine well with +incompatible
- Packaging improvements:
  * Drop gh-issue-73141.patch to repair random segmentation faults (boo#1240764)
    fixed in upstream release.
Version: 1.24.13-160000.1.1
* Wed Feb 04 2026 jkowalczyk@suse.com
- Update to version 1.24.13 cut from the go1.24-fips-release
  branch at the revision tagged go1.24.13-1-openssl-fips.
  Refs jsc#SLE-18320
  * Rebase to 1.24.13
* Wed Feb 04 2026 jkowalczyk@suse.com
- go1.24.13 (released 2026-02-04) includes security fixes to the go
  command and the crypto/tls package, as well as bug fixes to the
  crypto/x509 package.
  Refs boo#1236217 go1.24 release tracking
  CVE-2025-61732 CVE-2025-68121 CVE-2025-68119
  * go#77128 go#76697 boo#1257692 security: fix CVE-2025-61732 cmd/go: potential code smuggling using doc comments
  * go#77355 go#77217 boo#1256818 crypto/tls:  CVE-2025-68121 revert Config.Clone change and apply lightweight chain validation
  * go#77103 go#77099 boo#1256820 security: fix CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain
  * go#77322 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs
  * go#77424 crypto/tls: CL 737700 broke session resumption on macOS
* Thu Jan 15 2026 jkowalczyk@suse.com
- Update to version 1.24.12 cut from the go1.24-fips-release
  branch at the revision tagged go1.24.12-1-openssl-fips.
  Refs jsc#SLE-18320
  * Rebase to 1.24.12
* Thu Jan 15 2026 jkowalczyk@suse.com
- go1.24.12 (released 2026-01-15) includes security fixes to the go
  command, and the archive/zip, crypto/tls, and net/url packages,
  as well as bug fixes to the compiler, the runtime, and the
  crypto/tls and os packages.
  Refs boo#1236217 go1.24 release tracking
  CVE-2025-61726 CVE-2025-61728 CVE-2025-61730 CVE-2025-61731 CVE-2025-68119 CVE-2025-68121
  * go#76854 go#76443 boo#1256821 security: fix CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level
  * go#77103 go#77099 boo#1256820 security: fix CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain
  * go#77105 go#77100 boo#1256819 security: fix CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution
  * go#77107 go#77101 boo#1256817 security: fix CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm
  * go#77109 go#77102 boo#1256816 security: fix CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives
  * go#77114 go#77113 boo#1256818 security: fix CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain
  * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled
  * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes
  * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386
  * go#76796 runtime: race detector crash on ppc64le
  * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range
* Tue Dec 02 2025 jkowalczyk@suse.com
- Update to version 1.24.11 cut from the go1.24-fips-release
  branch at the revision tagged go1.24.11-1-openssl-fips.
  Refs jsc#SLE-18320
  * Rebase to 1.24.11
* Tue Dec 02 2025 jkowalczyk@suse.com
- go1.24.11 (released 2025-12-02) includes two security fixes to
  the crypto/x509 package, as well as bug fixes to the runtime.
  Refs boo#1236217 go1.24 release tracking
  CVE-2025-61727 CVE-2025-61729
  * go#76460 go#76445 boo#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation
  * go#76463 go#76442 boo#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN
  * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores
* Mon Dec 01 2025 martin.schreiner@suse.com
- Packaging: Migrate from update-alternatives to libalternatives
  Refs boo#1245878
  * This is an optional migration controlled via prjconf definition
    with_libalternatives
  * If with_libalternatives is not defined packaging continues to
    use update-alternatives
* Wed Nov 05 2025 jkowalczyk@suse.com
- go1.24.10 (released 2025-11-05) includes fixes to the
  encoding/pem and net/url packages.
  Refs boo#1236217 go1.24 release tracking
  * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
  * go#75951 encoding/pem: regression when decoding blocks with leading garbage
  * go#76028 pem/encoding: malformed line endings can cause panics
- Packaging improvements:
  * Remove net-url-allow-IP-literals-with-IPv4-mapped-IPv6-addresses.patch
    No longer needed with go#75831 in latest upstream release
* Mon Oct 20 2025 jkowalczyk@suse.com
- Update to version 1.24.9 cut from the go1.24-fips-release
  branch at the revision tagged go1.24.9-1-openssl-fips.
  Refs jsc#SLE-18320
  * Rebase to 1.24.9
* Mon Oct 13 2025 jkowalczyk@suse.com
- go1.24.9 (released 2025-10-13) includes fixes to the crypto/x509
  package.
  Refs boo#1236217 go1.24 release tracking
  * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot
- Packaging improvements:
  * Add net-url-allow-IP-literals-with-IPv4-mapped-IPv6-addresses.patch
    needed today and will be available in the next upstream release