USN-7574-1: Go vulnerabilities
USN-7574-1: Go vulnerabilities
Publication date : 18 June 2025
Overview: Several security issues were fixed in Go.
Releases: 24.04 LTS
Packages
golang-1.22 - Go programming language compiler
Details
Kyle Seely discovered that the Go net/http module did not properly handle
sensitive headers during repeated redirects. An attacker could possibly
use this issue to obtain sensitive information. (CVE-2024-45336)
Juho Forsén discovered that the Go crypto/x509 module incorrectly handled
IPv6 addresses during URI parsing. An attacker could possibly use this
issue to bypass certificate URI constraints. (CVE-2024-45341)
It was discovered that the Go crypto module did not properly handle
variable time instructions under certain circumstances on 64-bit Power
(ppc64el) systems. An attacker could possibly use this issue to expose
sensitive information. (CVE-2025-22866)
It was discovered that the Go http/httpproxy module did not properly
handle IPv6 zone IDs during hostname matching. An attacker could possibly
use this issue to cause a denial of service. (CVE-2025-22870)
Takeshi Kaneko discovered that the Go net/http module did not properly
strip sensitive proxy headers during redirect requests. An attacker could
possibly use this issue to obtain sensitive information. (CVE-2025-4673)
The problem can be corrected by updating your system to the following package versions:
24.10 oracular:
- golang-1.22 – 1.22.8-1ubuntu0.1
- golang-1.22-go – 1.22.8-1ubuntu0.1
- golang-1.22-src – 1.22.8-1ubuntu0.1
24.04 noble golang:
- 1.22 – 1.22.2-2ubuntu0.4
- golang-1.22-go – 1.22.2-2ubuntu0.4
- golang-1.22-src – 1.22.2-2ubuntu0.4
22.04 jammy golang
- 1.22 – 1.22.2-2~22.04.3
- golang-1.22-go – 1.22.2-2~22.04.3
- golang-1.22-src – 1.22.2-2~22.04.3