File _patchinfo of Package patchinfo.37752

<patchinfo incident="37752">
  <issue tracker="bnc" id="1238572">VUL-0: CVE-2025-22870: go1.22, go1.22-openssl, go1.23, go1.23-openssl, go1.24: golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: proxy bypass using IPv6 zone IDs</issue>
  <issue tracker="bnc" id="1229122">go1.23 release tracking</issue>
  <issue tracker="cve" id="2025-22870"/>
  <packager>jfkw</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for go1.23</summary>
  <description>This update for go1.23 fixes the following issues:

  - CVE-2025-22870: golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238572)

  Other fixes:

  - Updated go version to go1.23.7 (bsc#1229122):
  * go#71985 go#71984 bsc#1238572 security: fix CVE-2025-22870 net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs
  * go#71727 runtime: usleep computes wrong tv_nsec on s390x
  * go#71839 runtime: recover added in range-over-func loop body doesn't stop panic propagation / segfaults printing error
  * go#71848 os: spurious SIGCHILD on running child process
  * go#71875 reflect: Value.Seq panicking on functional iterator methods
  * go#71915 reflect: Value.Seq iteration value types not matching the type of given int types
  * go#71962 runtime/cgo: does not build with -Wdeclaration-after-statement
</description>
</patchinfo>
openSUSE Build Service is sponsored by