File _patchinfo of Package patchinfo.37753
<patchinfo incident="37753"> <issue tracker="bnc" id="1238572">VUL-0: CVE-2025-22870: go1.22, go1.22-openssl, go1.23, go1.23-openssl, go1.24: golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: proxy bypass using IPv6 zone IDs</issue> <issue tracker="bnc" id="1229122">go1.23 release tracking</issue> <issue tracker="cve" id="2025-22870"/> <packager>jfkw</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for go1.23</summary> <description>This update for go1.23 fixes the following issues: - CVE-2025-22870: golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238572) Other fixes: - Updated go version to go1.23.7 (bsc#1229122): * go#71985 go#71984 bsc#1238572 security: fix CVE-2025-22870 net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs * go#71727 runtime: usleep computes wrong tv_nsec on s390x * go#71839 runtime: recover added in range-over-func loop body doesn't stop panic propagation / segfaults printing error * go#71848 os: spurious SIGCHILD on running child process * go#71875 reflect: Value.Seq panicking on functional iterator methods * go#71915 reflect: Value.Seq iteration value types not matching the type of given int types * go#71962 runtime/cgo: does not build with -Wdeclaration-after-statement </description> </patchinfo>