MGASA-2025-0184

Source
https://advisories.mageia.org/MGASA-2025-0184.html
Import Source
https://advisories.mageia.org/MGASA-2025-0184.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2025-0184
Related
Published
2025-06-09T18:14:56Z
Modified
2025-06-09T17:38:36Z
Summary
Updated golang packages fix security vulnerabilities
Details

Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information. CVE-2025-4673. os: inconsistent handling of OCREATE|OEXCL on Unix and Windows os.OpenFile(path, os.OCREATE|OEXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with OCREATE and OEXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location - CVE-2025-0913. crypto/x509: usage of ExtKeyUsageAny disables policy validation. Calling Verify with a VerifyOptions.KeyUsages that contains ExtKeyUsageAny unintentionally disabledpolicy validation. This only affected certificate chains which contain policy graphs, which are rather uncommon - CVE-2025-22874. OpenFile now always returns an error when the OCREATE and OEXCL flags are both set and the target path is a symlink.

References
Credits

Affected packages

Mageia:9 / golang

Package

Name
golang
Purl
pkg:rpm/mageia/golang?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.24.4-1.mga9

Ecosystem specific

{
    "section": "core"
}