vulnerability
SUSE: CVE-2025-0913: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:C/A:N) | Jun 10, 2025 | Jun 10, 2025 | Nov 4, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:C/A:N)
Published
Jun 10, 2025
Added
Jun 10, 2025
Modified
Nov 4, 2025
Description
os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink.
Solutions
suse-upgrade-go1-23suse-upgrade-go1-23-docsuse-upgrade-go1-23-opensslsuse-upgrade-go1-23-openssl-docsuse-upgrade-go1-23-openssl-racesuse-upgrade-go1-23-racesuse-upgrade-go1-24suse-upgrade-go1-24-docsuse-upgrade-go1-24-libstdsuse-upgrade-go1-24-opensslsuse-upgrade-go1-24-openssl-docsuse-upgrade-go1-24-openssl-racesuse-upgrade-go1-24-racesuse-upgrade-govulncheck-vulndb
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.