File _patchinfo of Package patchinfo.37356

<patchinfo incident="37356">
  <issue tracker="cve" id="2023-45288"/>
  <issue tracker="cve" id="2024-6104"/>
  <issue tracker="cve" id="2025-27144"/>
  <issue tracker="bnc" id="1237613">VUL-0: CVE-2025-27144: skopeo: gopkg.in/square/go-jose.v2,gopkg.in/go-jose/go-jose.v2,github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service</issue>
  <issue tracker="bnc" id="1227056">VUL-0: CVE-2024-6104: skopeo: hashicorp/go-retryablehttp: url might write sensitive information to log file</issue>
  <issue tracker="bnc" id="1236483">VUL-0: CVE-2023-45288: skopeo: golang.org/x/net/http2: close connections when receiving too many headers</issue>
  <packager>dancermak</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for skopeo</summary>
  <description>This update for skopeo fixes the following issues:

- CVE-2024-6104: possible sensitive data exposure due to hashicorp/go-retryablehttp not sanitizing URLs when writing
  them to log files. (bsc#1227056)
- CVE-2023-45288: possible excessive CPU consumption due to no limit being set on the number of CONTINUATION frames
  read for an HTTP/2 request in golang.org/x/net/http2. (bsc#1236483)
- CVE-2025-27144: possible excessive memory consumption due to go-jose/go-jose using the strings.Split function when
  parsing compact JWS or JWE input containing a large number of '.' characters. (bsc#1237613)
</description>
</patchinfo>
openSUSE Build Service is sponsored by