* Mon Aug 11 2025 jkowalczyk@suse.com
- Update to version 1.24.6 cut from the go1.24-fips-release
branch at the revision tagged go1.24.6-1-openssl-fips.
Refs jsc#SLE-18320
* Rebase to 1.24.6
* Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil
salt to be passed as a hash length buffer of zeros.
* Wed Aug 06 2025 jkowalczyk@suse.com
- go1.24.6 (released 2025-08-06) includes security fixes to the
database/sql and os/exec packages, as well as bug fixes to the
runtime.
Refs boo#1236217 go1.24 release tracking
CVE-2025-47906 CVE-2025-47907
* go#74804 go#74466 boo#1247719 security: fix CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of "", "." and ".." in some PATH configurations
* go#74833 go#74831 boo#1247720 security: fix CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan
* go#73800 runtime: RSS seems to have increased in Go 1.24 while the runtime accounting has not
* go#74416 runtime: use-after-free of allpSnapshot in findRunnable
* go#74694 runtime: segfaults in runtime.(*unwinder).next
* go#74760 os/user:nolibgcc: TestGroupIdsTestUser failures
* Thu Jul 31 2025 jkowalczyk@suse.com
- Update to version 1.24.5 cut from the go1.24-fips-release
branch at the revision tagged go1.24.5-1-openssl-fips.
Refs jsc#SLE-18320
* Rebase to 1.24.5
* Tue Jul 08 2025 jkowalczyk@suse.com
- go1.24.5 (released 2025-07-08) includes security fixes to the go
command, as well as bug fixes to the compiler, the linker, the
runtime, and the go command.
Refs boo#1236217 go1.24 release tracking
CVE-2025-4674
* go#74381 go#74380 boo#1246118 security: fix CVE-2025-4674 cmd/go: disable support for multiple vcs in one module
* go#73908 runtime: bad frame pointer during panic during duffcopy
* go#74098 cmd/compile: regression on ppc64le bit operations
* go#74113 cmd/go: crash on unknown GOEXPERIMENT during toolchain selection
* go#74290 runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning
* go#74294 internal/trace: stress tests triggering suspected deadlock in tracer
* go#74346 runtime: memlock not unlocked in all control flow paths in sysReserveAlignedSbrk
* go#74363 runtime/pprof: crash "cannot read stack of running goroutine" in goroutine profile
* go#74403 cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN
* Fri Jun 06 2025 jkowalczyk@suse.com
- Update to version 1.24.4 cut from the go1.24-fips-release
branch at the revision tagged go1.24.4-1-openssl-fips.
Refs jsc#SLE-18320
* Rebase to 1.24.4
* Add ubi10, c10s targets to gating
* Thu Jun 05 2025 jkowalczyk@suse.com
- go1.24.4 (released 2025-06-05) includes security fixes to the
crypto/x509, net/http, and os packages, as well as bug fixes to
the linker, the go command, and the hash/maphash and os packages.
Refs boo#1236217 go1.24 release tracking
CVE-2025-22874 CVE-2025-0913 CVE-2025-4673
* go#73700 go#73702 boo#1244158 security: fix CVE-2025-22874 crypto/x509: ExtKeyUsageAny bypasses policy validation
* go#73720 go#73612 boo#1244157 security: fix CVE-2025-0913 os: inconsistent handling of O_CREATE|O_EXCL on Unix and Windows
* go#73906 go#73816 boo#1244156 security: fix CVE-2025-4673 net/http: sensitive headers not cleared on cross-origin redirect
* go#73570 os: Root.Mkdir creates directories with zero permissions on OpenBSD
* go#73669 hash/maphash: hashing channels with purego impl. of maphash.Comparable panics
* go#73678 runtime/debug: BuildSetting does not document DefaultGODEBUG
* go#73809 cmd/go: add fips140 module selection mechanism
* go#73832 cmd/link: Go 1.24.3 and 1.23.9 regression - duplicated definition of symbol dlopen
* Mon Jun 02 2025 jkowalczyk@suse.com
- Update to version 1.24.3 cut from the go1.24-fips-release
branch at the revision tagged go1.24.3-3-openssl-fips.
Refs jsc#SLE-18320
* Fix GOLANG_FIPS=0 and enable CGO for bin/go
* Tue May 27 2025 jkowalczyk@suse.com
- Update to version 1.24.3 cut from the go1.24-fips-release
branch at the revision tagged go1.24.3-2-openssl-fips.
Refs jsc#SLE-18320 bsc#1243960
* Force fips140tls in boring mode and run http tests
* Implement HKDF for TLS (#297) bsc#1243960. This was previously
left unimplemented and would panic if invoked. This was not
caught because we only run a subset of the TLS tests in FIPS
mode. This patch adds the test case which would have caught
this into our test script and fixes the panic with an
implementation of HKDF label expanding.
* Improve documentation (#294)
* Wed May 07 2025 jkowalczyk@suse.com
- Update to version 1.24.3 cut from the go1.24-fips-release
branch at the revision tagged go1.24.3-1-openssl-fips.
Refs jsc#SLE-18320
* Rebase to 1.24.3
* Tue May 06 2025 jkowalczyk@suse.com
- go1.24.3 (released 2025-05-06) includes security fixes to the os
package, as well as bug fixes to the runtime, the compiler, the
linker, the go command, and the crypto/tls and os packages.
Refs boo#1236217 go1.24 release tracking
CVE-2025-22873
* go#73556 go#73555 boo#1242715 security: fix CVE-2025-22873 os: Root permits access to parent directory
* go#73082 os: Root.Open panics when opening a symlink referencing the root
* go#73092 cmd/link: linkname directive on userspace variable can override runtime variable
* go#73118 crypto/tls: ECH decodeInnerClientHello incorrectly rejects ClientHello with GREASE values in supportedVersions
* go#73144 runtime: segmentation fault from vgetrandomPutState and runtime.growslice w/ runtime.OSLockThread
* go#73192 runtime: -race data race map traceback report incorrect functions
* go#73281 cmd/compile: program compiles to wasm but is invalid: go:wasmexport: integer too large
* go#73379 runtime, x/sys/unix: Connectx is broken on darwin/amd64
* go#73440 cmd/compile: infinite loop in the inliner
* go#73500 cmd/go: +dirty in version stamping doesn't combine well with +incompatible
- Packaging improvements:
* Drop gh-issue-73141.patch to repair random segmentation faults (boo#1240764)
fixed in upstream release.