File _patchinfo of Package patchinfo.37505

<patchinfo incident="37505">
  <issue tracker="cve" id="2023-45288"/>
  <issue tracker="cve" id="2025-27144"/>
  <issue tracker="bnc" id="1237681">VUL-0: CVE-2025-27144: buildah: github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service</issue>
  <issue tracker="bnc" id="1236531">VUL-0: CVE-2023-45288: buildah: golang.org/x/net/http2: close connections when receiving too many headers</issue>
  <packager>dancermak</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for buildah</summary>
  <description>This update for buildah fixes the following issues:

- CVE-2023-45288: possible excessive CPU consumption due to no limit being set on the number of CONTINUATION frames
  read for an HTTP/2 request in golang.org/x/net/http2. (bsc#1236531)
- CVE-2025-27144: Fixed denial of service in parsing function of embedded library Go JOSE (bsc#1237681)                                                                                                                
</description>
</patchinfo>
openSUSE Build Service is sponsored by