Adding patchinfo patchinfo.20250206145038257185.90520734224245

This commit is contained in:
Adrian Schröter 2025-02-07 16:17:39 +01:00
parent 23d201e1fc
commit ff7486eeb3
5 changed files with 39 additions and 2 deletions

3
.gitmodules vendored
View File

@ -9170,3 +9170,6 @@
[submodule "opencl-headers"]
path = opencl-headers
url = ../../ALP-pool/opencl-headers
[submodule "go1.24"]
path = go1.24
url = ../../ALP-pool/go1.24

2
go1.22

@ -1 +1 @@
Subproject commit 0d6198a23ec71ae63dc98aeca3b94a637e2956f9
Subproject commit 00fd69e6efafe4122732752dfd7f28a978d48f56

2
go1.23

@ -1 +1 @@
Subproject commit ff7cf7244af4406766539327f051784e868e28e4
Subproject commit 0deddbf57a07f6cc66c06f3ea1c0ba861b989cc5

1
go1.24 Submodule

@ -0,0 +1 @@
Subproject commit abc823b62c0d719f3808fcb8331addf16f679515

View File

@ -0,0 +1,33 @@
<patchinfo>
<!-- generated from request(s) 360255 -->
<issue tracker="bnc" id="1236045">VUL-0: CVE-2024-45341: go1.22,go1.23: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints</issue>
<issue tracker="bnc" id="1236046">VUL-0: CVE-2024-45336: go1.22,go1.23: net/http: sensitive headers incorrectly sent after cross-domain redirect</issue>
<issue tracker="bnc" id="1236217">go1.24 release tracking</issue>
<issue tracker="bnc" id="1236360">VUL-0: CVE-2024-45340: go1.24: cmd/go: GOAUTH credential leak</issue>
<issue tracker="bnc" id="1236361">VUL-0: CVE-2025-22865: go1.24: crypto/x509: ParsePKCS1PrivateKey panic with partial keys</issue>
<issue tracker="bnc" id="1236801">VUL-0: CVE-2025-22866 go1.22,go1.23,go1.24: crypto/elliptic: timing sidechannel for P-256 on ppc64le</issue>
<issue tracker="bnc" id="1236839">VUL-0: CVE-2025-22867: go1.24: cmd/go: arbitrary code execution during build on darwin</issue>
<issue tracker="cve" id="2024-45336"/>
<issue tracker="cve" id="2024-45340"/>
<issue tracker="cve" id="2024-45341"/>
<issue tracker="cve" id="2025-22865"/>
<issue tracker="cve" id="2025-22866"/>
<issue tracker="cve" id="2025-22867"/>
<packager>jfkw</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for go1.24</summary>
<description>This update for go1.24 fixes the following issues:
go1.24rc3 (released 2024-02-05) is a release candidate version of go1.24. (bsc#1236217)
* CVE-2025-22866: crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le (bsc#1236801)
* CVE-2025-22867: cmd/go: arbitrary code execution during build on darwin (bsc#1236839)
* CVE-2024-45341: crypto/x509: properly check for IPv6 hosts in URIs (bsc#1236045)
* CVE-2024-45336: net/http: persist header stripping across repeated redirects (bsc#1236046)
* CVE-2025-22865: crypto/x509: avoid panic when parsing partial PKCS#1 private keys (bsc#1236361)
* CVE-2024-45340: cmd/go: restore netrc preferences for GOAUTH and fix domain lookup (bsc#1236360)
</description>
<package>go1.24</package>
<seperate_build_arch/>
</patchinfo>