File _patchinfo of Package patchinfo.38652
<patchinfo incident="38652"> <issue tracker="jsc" id="SLE-18320"/> <issue tracker="bnc" id="1236045">VUL-0: CVE-2024-45341: go1.22,go1.23: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints</issue> <issue tracker="bnc" id="1218424">go1.22 release tracking</issue> <issue tracker="bnc" id="1236046">VUL-0: CVE-2024-45336: go1.22,go1.23: net/http: sensitive headers incorrectly sent after cross-domain redirect</issue> <issue tracker="bnc" id="1236801">VUL-0: CVE-2025-22866 go1.22,go1.23,go1.24: crypto/elliptic: timing sidechannel for P-256 on ppc64le</issue> <issue tracker="cve" id="2024-45341"/> <issue tracker="cve" id="2025-22866"/> <issue tracker="cve" id="2024-45336"/> <packager>jfkw</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for go1.22-openssl</summary> <description>This update for go1.22-openssl fixes the following issues: Update to version 1.22.12 (bsc#1218424): Security fixes: - CVE-2024-45336: net/http: sensitive headers incorrectly sent after cross-domain redirect (bsc#1236046) - CVE-2024-45341: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (bsc#1236045) - CVE-2025-22866: crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le (bsc#1236801) </description> </patchinfo>