MGASA-2025-0021

Source
https://advisories.mageia.org/MGASA-2025-0021.html
Import Source
https://advisories.mageia.org/MGASA-2025-0021.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2025-0021
Related
Published
2025-01-23T17:38:33Z
Modified
2025-01-23T17:10:32Z
Summary
Updated golang packages fix security vulnerabilities
Details

net/http: sensitive headers incorrectly sent after cross-domain redirect, (CVE-2024-45336). crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints, (CVE-2024-45341).

References
Credits

Affected packages

Mageia:9 / golang

Package

Name
golang
Purl
pkg:rpm/mageia/golang?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.22.11-1.mga9

Ecosystem specific

{
    "section": "core"
}