File _patchinfo of Package patchinfo.39820
<patchinfo incident="39820"> <issue tracker="jsc" id="SLE-23879"/> <issue tracker="cve" id="2025-46569"/> <issue tracker="bnc" id="1246725">VUL-0: CVE-2025-46569: cosign: github.com/open-policy-agent/opa: HTTP request path can be crafted to inject Rego code into a constructed query when a virtual document is requested through the Data API</issue> <packager>msmeissn</packager> <rating>important</rating> <category>security</category> <summary>Security update for cosign</summary> <description>This update for cosign fixes the following issues: Update to version 2.5.3 (jsc#SLE-23879): - CVE-2025-46569: Fixed OPA server Data API HTTP path injection of Rego (bsc#1246725) Changelog: Update to 2.5.3: - Add signing-config create command (#4280) - Allow multiple services to be specified for trusted-root create (#4285) - force when copying the latest image to overwrite (#4298) - Fix cert verification logic for trusted-root/SCTs (#4294) - Fix lint error for types package (#4295) - feat: Add OCI 1.1+ experimental support to tree (#4205) - Add validity period end for trusted-root create (#4271) - avoid double-loading trustedroot from file (#4264) Update to 2.5.2: - Do not load trusted root when CT env key is set - docs: improve doc for --no-upload option (#4206) Update to 2.5.1: - Add Rekor v2 support for trusted-root create (#4242) - Add baseUrl and Uri to trusted-root create command - Upgrade to TUF v2 client with trusted root - Don't verify SCT for a private PKI cert (#4225) - Bump TSA library to relax EKU chain validation rules (#4219) - Bump sigstore-go to pick up log index=0 fix (#4162) - remove unused recursive flag on attest command (#4187) </description> </patchinfo>