File _patchinfo of Package patchinfo.38616
<patchinfo incident="38616">
<issue tracker="bnc" id="1236217">go1.24 release tracking</issue>
<issue tracker="bnc" id="1242715">VUL-0: CVE-2025-22873: go1.24: os: Root permits access to parent directory</issue>
<issue tracker="cve" id="2025-22873"/>
<packager>jfkw</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for go1.24</summary>
<description>This update for go1.24 fixes the following issues:
Update to go1.24.3 (bsc#1236217):
Security fixes:
- CVE-2025-22873: Fixed os.Root permits access to parent directory (bsc#1242715)
Changelog:
* go#73556 go#73555 security: fix CVE-2025-22873 os: Root permits access to parent directory
* go#73082 os: Root.Open panics when opening a symlink referencing the root
* go#73092 cmd/link: linkname directive on userspace variable can override runtime variable
* go#73118 crypto/tls: ECH decodeInnerClientHello incorrectly rejects ClientHello with GREASE values in supportedVersions
* go#73144 runtime: segmentation fault from vgetrandomPutState and runtime.growslice w/ runtime.OSLockThread
* go#73192 runtime: -race data race map traceback report incorrect functions
* go#73281 cmd/compile: program compiles to wasm but is invalid: go:wasmexport: integer too large
* go#73379 runtime, x/sys/unix: Connectx is broken on darwin/amd64
* go#73440 cmd/compile: infinite loop in the inliner
* go#73500 cmd/go: +dirty in version stamping doesn't combine well with +incompatible
</description>
</patchinfo>