File _patchinfo of Package patchinfo.38650
<patchinfo incident="38650"> <issue tracker="jsc" id="SLE-18320"/> <issue tracker="bnc" id="1238572">VUL-0: CVE-2025-22870: go1.22, go1.22-openssl, go1.23, go1.23-openssl, go1.24: golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: proxy bypass using IPv6 zone IDs</issue> <issue tracker="bnc" id="1236046">VUL-0: CVE-2024-45336: go1.22,go1.23: net/http: sensitive headers incorrectly sent after cross-domain redirect</issue> <issue tracker="bnc" id="1240550">VUL-0: CVE-2025-22871: go1.23,go1.24: net/http: request smuggling through invalid chunked data</issue> <issue tracker="bnc" id="1236801">VUL-0: CVE-2025-22866 go1.22,go1.23,go1.24: crypto/elliptic: timing sidechannel for P-256 on ppc64le</issue> <issue tracker="bnc" id="1229122">go1.23 release tracking</issue> <issue tracker="bnc" id="1236045">VUL-0: CVE-2024-45341: go1.22,go1.23: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints</issue> <issue tracker="cve" id="2025-22871"/> <issue tracker="cve" id="2025-22870"/> <issue tracker="cve" id="2024-45341"/> <issue tracker="cve" id="2025-22866"/> <issue tracker="cve" id="2024-45336"/> <packager>jfkw</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for go1.23-openssl</summary> <description>This update for go1.23-openssl fixes the following issues: Update to version 1.23.9 (bsc#1229122): Security fixes: - CVE-2024-45336: net/http: sensitive headers incorrectly sent after cross-domain redirect (bsc#1236046) - CVE-2024-45341: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (bsc#1236045) - CVE-2025-22866: crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le (bsc#1236801) - CVE-2025-22870: net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs (bsc#1238572) - CVE-2025-22871: net/http: reject bare LF in chunked encoding (bsc#1240550) </description> </patchinfo>