Adding patchinfo patchinfo.20250206145038257185.90520734224245
This commit is contained in:
parent
23d201e1fc
commit
ff7486eeb3
3
.gitmodules
vendored
3
.gitmodules
vendored
@ -9170,3 +9170,6 @@
|
||||
[submodule "opencl-headers"]
|
||||
path = opencl-headers
|
||||
url = ../../ALP-pool/opencl-headers
|
||||
[submodule "go1.24"]
|
||||
path = go1.24
|
||||
url = ../../ALP-pool/go1.24
|
||||
|
2
go1.22
2
go1.22
@ -1 +1 @@
|
||||
Subproject commit 0d6198a23ec71ae63dc98aeca3b94a637e2956f9
|
||||
Subproject commit 00fd69e6efafe4122732752dfd7f28a978d48f56
|
2
go1.23
2
go1.23
@ -1 +1 @@
|
||||
Subproject commit ff7cf7244af4406766539327f051784e868e28e4
|
||||
Subproject commit 0deddbf57a07f6cc66c06f3ea1c0ba861b989cc5
|
1
go1.24
Submodule
1
go1.24
Submodule
@ -0,0 +1 @@
|
||||
Subproject commit abc823b62c0d719f3808fcb8331addf16f679515
|
33
patchinfo.20250206145038257185.90520734224245/_patchinfo
Normal file
33
patchinfo.20250206145038257185.90520734224245/_patchinfo
Normal file
@ -0,0 +1,33 @@
|
||||
<patchinfo>
|
||||
<!-- generated from request(s) 360255 -->
|
||||
<issue tracker="bnc" id="1236045">VUL-0: CVE-2024-45341: go1.22,go1.23: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints</issue>
|
||||
<issue tracker="bnc" id="1236046">VUL-0: CVE-2024-45336: go1.22,go1.23: net/http: sensitive headers incorrectly sent after cross-domain redirect</issue>
|
||||
<issue tracker="bnc" id="1236217">go1.24 release tracking</issue>
|
||||
<issue tracker="bnc" id="1236360">VUL-0: CVE-2024-45340: go1.24: cmd/go: GOAUTH credential leak</issue>
|
||||
<issue tracker="bnc" id="1236361">VUL-0: CVE-2025-22865: go1.24: crypto/x509: ParsePKCS1PrivateKey panic with partial keys</issue>
|
||||
<issue tracker="bnc" id="1236801">VUL-0: CVE-2025-22866 go1.22,go1.23,go1.24: crypto/elliptic: timing sidechannel for P-256 on ppc64le</issue>
|
||||
<issue tracker="bnc" id="1236839">VUL-0: CVE-2025-22867: go1.24: cmd/go: arbitrary code execution during build on darwin</issue>
|
||||
<issue tracker="cve" id="2024-45336"/>
|
||||
<issue tracker="cve" id="2024-45340"/>
|
||||
<issue tracker="cve" id="2024-45341"/>
|
||||
<issue tracker="cve" id="2025-22865"/>
|
||||
<issue tracker="cve" id="2025-22866"/>
|
||||
<issue tracker="cve" id="2025-22867"/>
|
||||
<packager>jfkw</packager>
|
||||
<rating>important</rating>
|
||||
<category>security</category>
|
||||
<summary>Security update for go1.24</summary>
|
||||
<description>This update for go1.24 fixes the following issues:
|
||||
|
||||
go1.24rc3 (released 2024-02-05) is a release candidate version of go1.24. (bsc#1236217)
|
||||
|
||||
* CVE-2025-22866: crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le (bsc#1236801)
|
||||
* CVE-2025-22867: cmd/go: arbitrary code execution during build on darwin (bsc#1236839)
|
||||
* CVE-2024-45341: crypto/x509: properly check for IPv6 hosts in URIs (bsc#1236045)
|
||||
* CVE-2024-45336: net/http: persist header stripping across repeated redirects (bsc#1236046)
|
||||
* CVE-2025-22865: crypto/x509: avoid panic when parsing partial PKCS#1 private keys (bsc#1236361)
|
||||
* CVE-2024-45340: cmd/go: restore netrc preferences for GOAUTH and fix domain lookup (bsc#1236360)
|
||||
</description>
|
||||
<package>go1.24</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
Loading…
x
Reference in New Issue
Block a user