File _patchinfo of Package patchinfo.38650

<patchinfo incident="38650">
  <issue tracker="jsc" id="SLE-18320"/>
  <issue tracker="bnc" id="1238572">VUL-0: CVE-2025-22870: go1.22, go1.22-openssl, go1.23, go1.23-openssl, go1.24: golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: proxy bypass using IPv6 zone IDs</issue>
  <issue tracker="bnc" id="1236046">VUL-0: CVE-2024-45336: go1.22,go1.23: net/http: sensitive headers incorrectly sent after cross-domain redirect</issue>
  <issue tracker="bnc" id="1240550">VUL-0: CVE-2025-22871: go1.23,go1.24: net/http: request smuggling through invalid chunked data</issue>
  <issue tracker="bnc" id="1236801">VUL-0: CVE-2025-22866 go1.22,go1.23,go1.24: crypto/elliptic: timing sidechannel for P-256 on ppc64le</issue>
  <issue tracker="bnc" id="1229122">go1.23 release tracking</issue>
  <issue tracker="bnc" id="1236045">VUL-0: CVE-2024-45341: go1.22,go1.23: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints</issue>
  <issue tracker="cve" id="2025-22871"/>
  <issue tracker="cve" id="2025-22870"/>
  <issue tracker="cve" id="2024-45341"/>
  <issue tracker="cve" id="2025-22866"/>
  <issue tracker="cve" id="2024-45336"/>
  <packager>jfkw</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for go1.23-openssl</summary>
  <description>This update for go1.23-openssl fixes the following issues:

Update to version 1.23.9 (bsc#1229122):

Security fixes:

- CVE-2024-45336: net/http: sensitive headers incorrectly sent after cross-domain redirect (bsc#1236046)
- CVE-2024-45341: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (bsc#1236045)
- CVE-2025-22866: crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le (bsc#1236801)
- CVE-2025-22870: net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs (bsc#1238572)
- CVE-2025-22871: net/http: reject bare LF in chunked encoding (bsc#1240550)
</description>
</patchinfo>
openSUSE Build Service is sponsored by