File _patchinfo of Package patchinfo.38616
<patchinfo incident="38616"> <issue tracker="bnc" id="1236217">go1.24 release tracking</issue> <issue tracker="bnc" id="1242715">VUL-0: CVE-2025-22873: go1.24: os: Root permits access to parent directory</issue> <issue tracker="cve" id="2025-22873"/> <packager>jfkw</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for go1.24</summary> <description>This update for go1.24 fixes the following issues: Update to go1.24.3 (bsc#1236217): Security fixes: - CVE-2025-22873: Fixed os.Root permits access to parent directory (bsc#1242715) Changelog: * go#73556 go#73555 security: fix CVE-2025-22873 os: Root permits access to parent directory * go#73082 os: Root.Open panics when opening a symlink referencing the root * go#73092 cmd/link: linkname directive on userspace variable can override runtime variable * go#73118 crypto/tls: ECH decodeInnerClientHello incorrectly rejects ClientHello with GREASE values in supportedVersions * go#73144 runtime: segmentation fault from vgetrandomPutState and runtime.growslice w/ runtime.OSLockThread * go#73192 runtime: -race data race map traceback report incorrect functions * go#73281 cmd/compile: program compiles to wasm but is invalid: go:wasmexport: integer too large * go#73379 runtime, x/sys/unix: Connectx is broken on darwin/amd64 * go#73440 cmd/compile: infinite loop in the inliner * go#73500 cmd/go: +dirty in version stamping doesn't combine well with +incompatible </description> </patchinfo>