Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <829a1cae-f61d-4cb8-b57d-1560e3861100@oracle.com>
Date: Tue, 8 Jul 2025 14:33:12 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Go 1.24.5 & 1.23.11 fix CVE-2025-4674

https://groups.google.com/g/golang-announce/c/gTNJnDXmn34 announces:

> Hello gophers,
> 
> We have just released Go versions 1.24.5 and 1.23.11, minor point releases.
> 
> These minor releases include 1 security fixes following the security policy:
> 
>     cmd/go: unexpected command execution in untrusted VCS repositories
> 
>     Various uses of the Go toolchain in untrusted VCS repositories can result in
>     unexpected code execution. When using the Go toolchain in directories fetched
>     using various VCS tools (such as directly cloning Git or Mercurial repositories)
>     can cause the toolchain to execute unexpected commands, if said directory
>     contains multiple VCS configuration metadata (such as a '.hg' directory in a Git
>     repository). This is due to how the Go toolchain attempts to resolve which VCS
>     is being used in order to embed build information in binaries and determine
>     module versions.
> 
>     The toolchain will now abort attempting to resolve which VCS is being used if it
>     detects multiple VCS configuration metadata in a module directory or nested VCS
>     configuration metadata (such as a '.git' directoy in a parent directory and a
>     '.hg' directory in a child directory). This will not prevent the toolchain from
>     building modules, but will result in binaries omitting VCS related build
>     information.
> 
>     If this behavior is expected by the user, the old behavior can be re-enabled by
>     setting GODEBUG=allowmultiplevcs=1. This should only be done in trusted
>     repositories.
> 
>     Thanks to RyotaK (https://ryotak.net) of GMO Flatt Security Inc for reporting
>     this issue.
> 
>     This is CVE-2025-4674 and https://go.dev/issue/74380.
> 
> View the release notes for more information:
> https://go.dev/doc/devel/release#go1.24.5
> 
> You can download binary and source distributions from the Go website:
> https://go.dev/dl/
> 
> To compile from source using a Git clone, update to the release with
> git checkout go1.24.5 and build as usual.
> 
> Thanks to everyone who contributed to the releases.
> 
> Cheers,
> Carlos and David for the Go team


-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.