![]() |
|
Message-ID: <e53c2ff3-6a27-4318-8245-8b99b3609e1d@oracle.com> Date: Thu, 5 Jun 2025 12:11:49 -0700 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com Subject: Go 1.24.4 and Go 1.23.10 fix CVE-2025-4673, CVE-2025-0913, CVE-2025-22874 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A/m/XDxq7uidAgAJ announces: > Hello gophers, > > We have just released Go versions 1.24.4 and 1.23.10, minor point releases. > > These minor releases include 3 security fixes following the security policy: > > * net/http: sensitive headers not cleared on cross-origin redirect > > Proxy-Authorization and Proxy-Authenticate headers persisted on > cross-origin redirects potentially leaking sensitive information. > > Thanks to Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.) for reporting > this issue. > > This is CVE-2025-4673 and Go issue https://go.dev/issue/73816. > > * os: inconsistent handling of O_CREATE|O_EXCL on Unix and Windows > > os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and > Windows systems when the target path was a dangling symlink. On Unix > systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. > On Windows, when the target path was a symlink to a nonexistent location, > OpenFile would create a file in that location. > > OpenFile now always returns an error when the O_CREATE and O_EXCL flags > are both set and the target path is a symlink. > > Thanks to Junyoung Park and Dong-uk Kim of KAIST Hacking Lab for > discovering this issue. > > This is CVE-2025-0913 and Go issue https://go.dev/issue/73702. > > * crypto/x509: usage of ExtKeyUsageAny disables policy validation > > Calling Verify with a VerifyOptions.KeyUsages that contains ExtKeyUsageAny > unintentionally disabledpolicy validation. This only affected certificate > chains which contain policy graphs, which are rather uncommon. > > Thanks to Krzysztof Skrzętnicki (@Tener) of Teleport for reporting this > issue. > > This is CVE-2025-22874 and Go issue https://go.dev/issue/73612. > > View the release notes for more information: > https://go.dev/doc/devel/release#go1.24.4 > > You can download binary and source distributions from the Go website: > https://go.dev/dl/ > > To compile from source using a Git clone, update to the release with > git checkout go1.24.4 and build as usual. > > Thanks to everyone who contributed to the releases. > > Cheers, > Carlos and Michael for the Go team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.