File _patchinfo of Package patchinfo.38616

<patchinfo incident="38616">
  <issue tracker="bnc" id="1236217">go1.24 release tracking</issue>
  <issue tracker="bnc" id="1242715">VUL-0: CVE-2025-22873: go1.24: os: Root permits access to parent directory</issue>
  <issue tracker="cve" id="2025-22873"/>
  <packager>jfkw</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for go1.24</summary>
  <description>This update for go1.24 fixes the following issues:

Update to go1.24.3 (bsc#1236217): 

Security fixes:

 - CVE-2025-22873: Fixed os.Root permits access to parent directory (bsc#1242715)
  
Changelog:
 
 * go#73556 go#73555 security: fix CVE-2025-22873 os: Root permits access to parent directory
 * go#73082 os: Root.Open panics when opening a symlink referencing the root
 * go#73092 cmd/link: linkname directive on userspace variable can override runtime variable
 * go#73118 crypto/tls: ECH decodeInnerClientHello incorrectly rejects ClientHello with GREASE values in supportedVersions
 * go#73144 runtime: segmentation fault from vgetrandomPutState and runtime.growslice w/ runtime.OSLockThread
 * go#73192 runtime: -race data race map traceback report incorrect functions
 * go#73281 cmd/compile: program compiles to wasm but is invalid: go:wasmexport: integer too large
 * go#73379 runtime, x/sys/unix: Connectx is broken on darwin/amd64
 * go#73440 cmd/compile: infinite loop in the inliner
 * go#73500 cmd/go: +dirty in version stamping doesn't combine well with +incompatible
</description>
</patchinfo>
openSUSE Build Service is sponsored by