File _patchinfo of Package patchinfo.37356
<patchinfo incident="37356"> <issue tracker="cve" id="2023-45288"/> <issue tracker="cve" id="2024-6104"/> <issue tracker="cve" id="2025-27144"/> <issue tracker="bnc" id="1237613">VUL-0: CVE-2025-27144: skopeo: gopkg.in/square/go-jose.v2,gopkg.in/go-jose/go-jose.v2,github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service</issue> <issue tracker="bnc" id="1227056">VUL-0: CVE-2024-6104: skopeo: hashicorp/go-retryablehttp: url might write sensitive information to log file</issue> <issue tracker="bnc" id="1236483">VUL-0: CVE-2023-45288: skopeo: golang.org/x/net/http2: close connections when receiving too many headers</issue> <packager>dancermak</packager> <rating>important</rating> <category>security</category> <summary>Security update for skopeo</summary> <description>This update for skopeo fixes the following issues: - CVE-2024-6104: possible sensitive data exposure due to hashicorp/go-retryablehttp not sanitizing URLs when writing them to log files. (bsc#1227056) - CVE-2023-45288: possible excessive CPU consumption due to no limit being set on the number of CONTINUATION frames read for an HTTP/2 request in golang.org/x/net/http2. (bsc#1236483) - CVE-2025-27144: possible excessive memory consumption due to go-jose/go-jose using the strings.Split function when parsing compact JWS or JWE input containing a large number of '.' characters. (bsc#1237613) </description> </patchinfo>