File _patchinfo of Package patchinfo.37752
<patchinfo incident="37752">
<issue tracker="bnc" id="1238572">VUL-0: CVE-2025-22870: go1.22, go1.22-openssl, go1.23, go1.23-openssl, go1.24: golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: proxy bypass using IPv6 zone IDs</issue>
<issue tracker="bnc" id="1229122">go1.23 release tracking</issue>
<issue tracker="cve" id="2025-22870"/>
<packager>jfkw</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for go1.23</summary>
<description>This update for go1.23 fixes the following issues:
- CVE-2025-22870: golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238572)
Other fixes:
- Updated go version to go1.23.7 (bsc#1229122):
* go#71985 go#71984 bsc#1238572 security: fix CVE-2025-22870 net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs
* go#71727 runtime: usleep computes wrong tv_nsec on s390x
* go#71839 runtime: recover added in range-over-func loop body doesn't stop panic propagation / segfaults printing error
* go#71848 os: spurious SIGCHILD on running child process
* go#71875 reflect: Value.Seq panicking on functional iterator methods
* go#71915 reflect: Value.Seq iteration value types not matching the type of given int types
* go#71962 runtime/cgo: does not build with -Wdeclaration-after-statement
</description>
</patchinfo>