File _patchinfo of Package patchinfo.38652

<patchinfo incident="38652">
  <issue tracker="jsc" id="SLE-18320"/>
  <issue tracker="bnc" id="1236045">VUL-0: CVE-2024-45341: go1.22,go1.23: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints</issue>
  <issue tracker="bnc" id="1218424">go1.22 release tracking</issue>
  <issue tracker="bnc" id="1236046">VUL-0: CVE-2024-45336: go1.22,go1.23: net/http: sensitive headers incorrectly sent after cross-domain redirect</issue>
  <issue tracker="bnc" id="1236801">VUL-0: CVE-2025-22866 go1.22,go1.23,go1.24: crypto/elliptic: timing sidechannel for P-256 on ppc64le</issue>
  <issue tracker="cve" id="2024-45341"/>
  <issue tracker="cve" id="2025-22866"/>
  <issue tracker="cve" id="2024-45336"/>
  <packager>jfkw</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for go1.22-openssl</summary>
  <description>This update for go1.22-openssl fixes the following issues:

Update to version 1.22.12 (bsc#1218424):

Security fixes:

- CVE-2024-45336: net/http: sensitive headers incorrectly sent after cross-domain redirect (bsc#1236046)
- CVE-2024-45341: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (bsc#1236045)
- CVE-2025-22866: crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le (bsc#1236801)
</description>
</patchinfo>
openSUSE Build Service is sponsored by