Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-22873

Опубликовано: 04 фев. 2026
Источник: debian

Описание

It was possible to improperly access the parent directory of an os.Root by opening a filename ending in "../". For example, Root.Open("../") would open the parent directory of the Root. This escape only permits opening the parent directory itself, not ancestors of the parent or files contained within the parent.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-1.24fixed1.24.4-1package
golang-1.23not-affectedpackage
golang-1.19not-affectedpackage
golang-1.15not-affectedpackage

Примечания

  • https://groups.google.com/g/golang-announce/c/UZoIkUT367A/m/5WDxKizJAQAJ

  • https://github.com/golang/go/issues/73555

  • https://github.com/golang/go/commit/8947f3395eb24dce6a5749517c0b40204b585f0a (go1.24.3)

Связанные уязвимости

CVSS3: 3.8
ubuntu
9 месяцев назад

[Unknown description]

CVSS3: 3.8
nvd
3 дня назад

It was possible to improperly access the parent directory of an os.Root by opening a filename ending in "../". For example, Root.Open("../") would open the parent directory of the Root. This escape only permits opening the parent directory itself, not ancestors of the parent or files contained within the parent.

suse-cvrf
9 месяцев назад

Security update for go1.24

suse-cvrf
8 месяцев назад

Security update for go1.24

CVSS3: 3.8
github
3 дня назад

It was possible to improperly access the parent directory of an os.Root by opening a filename ending in "../". For example, Root.Open("../") would open the parent directory of the Root. This escape only permits opening the parent directory itself, not ancestors of the parent or files contained within the parent.