File _patchinfo of Package patchinfo.37505
<patchinfo incident="37505">
<issue tracker="cve" id="2023-45288"/>
<issue tracker="cve" id="2025-27144"/>
<issue tracker="bnc" id="1237681">VUL-0: CVE-2025-27144: buildah: github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service</issue>
<issue tracker="bnc" id="1236531">VUL-0: CVE-2023-45288: buildah: golang.org/x/net/http2: close connections when receiving too many headers</issue>
<packager>dancermak</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for buildah</summary>
<description>This update for buildah fixes the following issues:
- CVE-2023-45288: possible excessive CPU consumption due to no limit being set on the number of CONTINUATION frames
read for an HTTP/2 request in golang.org/x/net/http2. (bsc#1236531)
- CVE-2025-27144: Fixed denial of service in parsing function of embedded library Go JOSE (bsc#1237681)
</description>
</patchinfo>