File _patchinfo of Package patchinfo.37356
<patchinfo incident="37356">
<issue tracker="cve" id="2023-45288"/>
<issue tracker="cve" id="2024-6104"/>
<issue tracker="cve" id="2025-27144"/>
<issue tracker="bnc" id="1237613">VUL-0: CVE-2025-27144: skopeo: gopkg.in/square/go-jose.v2,gopkg.in/go-jose/go-jose.v2,github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service</issue>
<issue tracker="bnc" id="1227056">VUL-0: CVE-2024-6104: skopeo: hashicorp/go-retryablehttp: url might write sensitive information to log file</issue>
<issue tracker="bnc" id="1236483">VUL-0: CVE-2023-45288: skopeo: golang.org/x/net/http2: close connections when receiving too many headers</issue>
<packager>dancermak</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for skopeo</summary>
<description>This update for skopeo fixes the following issues:
- CVE-2024-6104: possible sensitive data exposure due to hashicorp/go-retryablehttp not sanitizing URLs when writing
them to log files. (bsc#1227056)
- CVE-2023-45288: possible excessive CPU consumption due to no limit being set on the number of CONTINUATION frames
read for an HTTP/2 request in golang.org/x/net/http2. (bsc#1236483)
- CVE-2025-27144: possible excessive memory consumption due to go-jose/go-jose using the strings.Split function when
parsing compact JWS or JWE input containing a large number of '.' characters. (bsc#1237613)
</description>
</patchinfo>