Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.18.2.2025.0802.1
Category:openSUSE Local Security Checks
Title:openSUSE Security Advisory (SUSE-SU-2025:0802-1)
Summary:The remote host is missing an update for the 'go1.24' package(s) announced via the SUSE-SU-2025:0802-1 advisory.
Description:Summary:
The remote host is missing an update for the 'go1.24' package(s) announced via the SUSE-SU-2025:0802-1 advisory.

Vulnerability Insight:
This update for go1.24 fixes the following issues:

- CVE-2025-22870: golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238572)

Other fixes:

- Updated go version to go1.24.1 (bsc#1236217):
* go#71986 go#71984 bsc#1238572 security: fix CVE-2025-22870 net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs
* go#71687 cmd/go: panics with GOAUTH='git dir' go get -x
* go#71705 runtime: add linkname of runtime.lastmoduledatap for cloudwego/sonic
* go#71728 runtime: usleep computes wrong tv_nsec on s390x
* go#71745 crypto: add fips140 as an opaque GODEBUG setting and add documentation for it
* go#71829 cmd/compile: fail to compile package in 1.24
* go#71836 os: possible regression from Go 1.23 to Go 1.24 when opening DevNull with O_TRUNC
* go#71840 runtime: recover added in range-over-func loop body doesn't stop panic propagation / segfaults printing error
* go#71849 os: spurious SIGCHILD on running child process
* go#71855 cmd/compile: Pow10 freeze the compiler on certain condition on Go 1.24
* go#71858 debug/buildinfo: false positives with external scanners flag for go117 binary in testdata
* go#71876 reflect: Value.Seq panicking on functional iterator methods
* go#71904 cmd/compile: nil dereference when storing field of non-nil struct value
* go#71916 reflect: Value.Seq iteration value types not matching the type of given int types
* go#71938 cmd/compile: 'fatal error: found pointer to free object' on arm64
* go#71955 proposal: runtime: allow cleanups to run concurrently
* go#71963 runtime/cgo: does not build with -Wdeclaration-after-statement
* go#71977 syscall: js/wasm file operations fail on windows / node.js

Affected Software/OS:
'go1.24' package(s) on openSUSE Leap 15.6.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2025-22870
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.