File _patchinfo of Package patchinfo.42816

<patchinfo incident="42816">
  <issue tracker="bnc" id="1257138">VUL-0: CVE-2026-24137: vexctl: github.com/sigstore/sigstore/pkg/tuf: legacy TUF client allows for arbitrary file writes with target cache path traversal</issue>
  <issue tracker="bnc" id="1256535">VUL-0: CVE-2026-22772: vexctl: github.com/sigstore/fulcio: bypass MetaIssuer URL validation bypass can trigger SSRF to arbitrary internal services</issue>
  <issue tracker="bnc" id="1239323">VUL-0: CVE-2025-22869: vexctl: golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh</issue>
  <issue tracker="bnc" id="1240444">VUL-0: CVE-2025-30204: vexctl: github.com/golang-jwt/jwt/v4: jwt-go allows excessive memory allocation during header parsing</issue>
  <issue tracker="bnc" id="1239186">VUL-0: CVE-2025-22868: vexctl: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2</issue>
  <issue tracker="bnc" id="1234486">VUL-0: CVE-2024-45337: vexctl: golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto</issue>
  <issue tracker="bnc" id="1253802">VUL-0: CVE-2025-58181: vexctl: golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption</issue>
  <issue tracker="bnc" id="1237611">VUL-0: CVE-2025-27144: vexctl: github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service</issue>
  <issue tracker="bnc" id="1238683">VUL-0: CVE-2025-22870: vexctl: golang.org/x/net/proxy: proxy bypass using IPv6 zone IDs</issue>
  <issue tracker="cve" id="2025-22869"/>
  <issue tracker="cve" id="2026-22772"/>
  <issue tracker="cve" id="2025-30204"/>
  <issue tracker="cve" id="2025-27144"/>
  <issue tracker="cve" id="2025-58181"/>
  <issue tracker="cve" id="2025-22870"/>
  <issue tracker="cve" id="2026-24137"/>
  <issue tracker="cve" id="2024-45337"/>
  <issue tracker="cve" id="2025-22868"/>
  <packager>jfkw</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for vexctl</summary>
  <description>This update for vexctl fixes the following issues:

- Update to version 0.4.1+git78.f951e3a:
- CVE-2025-22868: Unexpected memory consumption during token parsing in golang.org/x/oauth2. (bsc#1239186)
- CVE-2024-45337: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto. (bsc#1234486)
- CVE-2025-27144: Go JOSE's Parsing Vulnerable to Denial of Service. (bsc#1237611)
- CVE-2025-22870: proxy bypass using IPv6 zone IDs. (bsc#1238683)
- CVE-2025-22869: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh. (bsc#1239323)
- CVE-2025-30204: jwt-go allows excessive memory allocation during header parsing. (bsc#1240444)
- CVE-2025-58181: invalidated number of mechanisms can cause unbounded memory consumption. (bsc#1253802)
- CVE-2026-22772: MetaIssuer URL validation bypass can trigger SSRF to arbitrary internal services. (bsc#1256535)
- CVE-2026-24137: legacy TUF client allows for arbitrary file writes with target cache path traversal. (bsc#1257138)
</description>
</patchinfo>
openSUSE Build Service is sponsored by