File _patchinfo of Package patchinfo.42518
<patchinfo incident="42518"> <issue tracker="cve" id="2025-22869"/> <issue tracker="cve" id="2025-47914"/> <issue tracker="cve" id="2025-65105"/> <issue tracker="cve" id="2025-22870"/> <issue tracker="cve" id="2025-27144"/> <issue tracker="cve" id="2024-45310"/> <issue tracker="cve" id="2025-8556"/> <issue tracker="cve" id="2025-22872"/> <issue tracker="cve" id="2025-47913"/> <issue tracker="cve" id="2025-58181"/> <issue tracker="bnc" id="1257432">VUL-0: CVE-2024-45310: apptainer: github.com/opencontainers/runc/libcontainer/utils: runc can be tricked into creating empty files/directories on host</issue> <issue tracker="bnc" id="1255462">VUL-0: CVE-2025-65105: apptainer: security bypass due to disabling security options</issue> <issue tracker="bnc" id="1253967">VUL-0: CVE-2025-47914: TRACKERBUG: golang.org/x/crypto/ssh/agent: non validated message size can cause a panic due to an out of bounds read</issue> <issue tracker="bnc" id="1253784">VUL-0: CVE-2025-58181: TRACKERBUG: golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption</issue> <issue tracker="bnc" id="1253506">VUL-0: CVE-2025-47913: TRACKERBUG: golang.org/x/crypto/ssh/agent: client process termination when receiving an unexpected message type in response to a key listing or</issue> <issue tracker="bnc" id="1241710">VUL-0: CVE-2025-22872: TRACKERBUG: golang.org/x/net/html: tags incorrectly interpreted by tokenizer can lead to content being placed in the wrong scope during</issue> <issue tracker="bnc" id="1238611">VUL-0: CVE-2025-22870: TRACKERBUG: golang.org/net/http, golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: proxy bypass using IPv6 zone IDs</issue> <issue tracker="bnc" id="1239322">VUL-0: CVE-2025-22869: TRACKERBUG: golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh</issue> <issue tracker="bnc" id="1237608">VUL-0: CVE-2025-27144: TRACKERBUG: gopkg.in/square/go-jose.v2,gopkg.in/go-jose/go-jose.v2,github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service</issue> <packager>mslacken</packager> <rating>important</rating> <category>security</category> <summary>Security update for apptainer</summary> <description>This update for apptainer fixes the following issues: Security fixes: - CVE-2024-45310: Fixed runc being tricked into creating empty files/directories on host (bsc#1257432) - CVE-2025-65105: Fixed security bypass due to disabling security options (bsc#1255462) - CVE-2025-47914: Fixed malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent (bsc#1253967) - CVE-2025-58181: Fixed unbounded memory consumption in golang.org/x/crypto/ssh (bsc#1253784) - CVE-2025-47913: Fixed potential denial of service in golang.org/x/crypto/ssh/agent (bsc#1253506) - CVE-2025-22872: Fixed incorrect Neutralization of Input During Web Page Generation in x/net (bsc#1241710) - CVE-2025-22870: Fixed HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net (bsc#1238611) - CVE-2025-22869: Fixed potential denial of service in golang.org/x/crypto (bsc#1239322) - CVE-2025-27144: Fixed DoS in go-jose Parsing in github.com/go-jose/go-jose (bsc#1237608) - CVE-2025-8556: Fixed missing and wrong validation can lead to incorrect results in github.com/cloudflare/circl Other fixes: - Update to 1.4.5 </description> </patchinfo>