File _patchinfo of Package patchinfo.23173
<patchinfo incident="23173">
<issue tracker="bnc" id="1182345">go1.16 release tracking</issue>
<issue tracker="bnc" id="1196732">VUL-0: CVE-2022-24921: go1.17,go1.16: regexp: stack overflow (process exit) handling deeply nested regexp</issue>
<issue tracker="cve" id="2022-24921"/>
<packager>jfkw</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for go1.16</summary>
<description>This update for go1.16 fixes the following issues:
Update to go version 1.16.15.
Security issue fixed:
- CVE-2022-24921: Fixed a stack overflow (process exit) handling deeply nested regular expressions (bsc#1196732).
Non-security issues fixed:
- go#51117 regexp: stack overflow (process exit) handling deeply nested regexp
- go#51331 cmd/go/internal/modfetch: erroneously resolves a v2+incompatible version when a v2/go.mod file exists
- go#51198 cmd/compile: "runtime: bad pointer in frame" in riscv64 with complier optimizations
- go#51161 net: use EDNS to increase DNS packet size [freeze exception]
- go#50733 runtime/metrics: time histogram sub-bucket ranges are off by a factor of two
</description>
</patchinfo>