SUSE releases a critical Go 1.24.3 security update patching CVE-2025-22873, a directory traversal flaw. Learn how to secure SUSE Linux, SAP, and HPC systems now. Includes patch commands for openSUSE Leap 15.6, SLE 15 SP6, and Enterprise Storage 7.1.
Key Security Fixes in Go 1.24.3
A newly released security patch for Go 1.24 addresses a critical vulnerability (CVE-2025-22873) that could allow unauthorized directory traversal via os.Root. This update also includes multiple stability and performance improvements for enterprise environments.
Vulnerability Details
CVE-2025-22873: A security flaw in
os.Rootpermits unintended access to parent directories (Bug #1242715).CVSS v4.0 Score: 2.0 (Low)
CVSS v3.1 Score: 4.4 (Medium)
Impacted Products:
SUSE Linux Enterprise Server 15 SP3-SP6
SUSE Linux Enterprise High Performance Computing (LTSS/ESPOS)
SUSE Enterprise Storage 7.1
openSUSE Leap 15.6
🔴 Why This Matters for Enterprises:
Directory traversal flaws can lead to data leaks or privilege escalation.
SAP and HPC environments are particularly at risk due to sensitive workloads.
How to Apply the Patch
Recommended Update Methods
Via YaST Online Update (GUI)
Command Line (zypper):
zypper in -t patch [Your-Product-Patch-Code]
(See full patch list below for exact commands.)
Affected Packages
| Product | Patch Command |
|---|---|
| openSUSE Leap 15.6 | zypper in -t patch openSUSE-SLE-15.6-2025-1551=1 |
| SUSE Linux Enterprise Server 15 SP6 | zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-2025-1551=1 |
| SUSE Enterprise Storage 7.1 | zypper in -t patch SUSE-Storage-7.1-2025-1551=1 |
Additional Fixes in Go 1.24.3
This update also resolves:
Runtime crashes (
runtime.growslicesegmentation faults).TLS/ECH handshake failures (GREASE value compatibility).
WASM compilation errors (integer overflow fixes).
📌 For Developers:
linknamedirective fixes prevent runtime variable overrides.crypto/tlsnow correctly processes ECH ClientHello messages.
FAQ: Go 1.24 Security Update
Q: Is this update mandatory for all SUSE systems?
A: Yes, if you use Go 1.24 in production—especially in SAP or HPC workloads.
Q: What’s the risk of not patching?
A: Potential directory traversal exploits, though the attack complexity is moderate.
Q: Are containers affected?
A: Yes, if they use Go 1.24. Rebuild images after updating.

Nenhum comentário:
Postar um comentário