File _patchinfo of Package patchinfo.37505
<patchinfo incident="37505"> <issue tracker="cve" id="2023-45288"/> <issue tracker="cve" id="2025-27144"/> <issue tracker="bnc" id="1237681">VUL-0: CVE-2025-27144: buildah: github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service</issue> <issue tracker="bnc" id="1236531">VUL-0: CVE-2023-45288: buildah: golang.org/x/net/http2: close connections when receiving too many headers</issue> <packager>dancermak</packager> <rating>important</rating> <category>security</category> <summary>Security update for buildah</summary> <description>This update for buildah fixes the following issues: - CVE-2023-45288: possible excessive CPU consumption due to no limit being set on the number of CONTINUATION frames read for an HTTP/2 request in golang.org/x/net/http2. (bsc#1236531) - CVE-2025-27144: Fixed denial of service in parsing function of embedded library Go JOSE (bsc#1237681) </description> </patchinfo>