[ALSA-2026:3343] Important: skopeo security update
Type:
security
Severity:
important
Release date:
2026-02-26
Description:
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 skopeo-tests-1.20.0-3.el10_1.aarch64.rpm 607b98cf2c3e6eb9e7b22365e1e4a1fcfad9cb3509ff612e2800eb2368a3ddf1
aarch64 skopeo-1.20.0-3.el10_1.aarch64.rpm f52fc23718f13ece5e0a4e307b46356f22e08ba72ceb522570bb148293a93ab5
ppc64le skopeo-tests-1.20.0-3.el10_1.ppc64le.rpm 1e50b05e6fcc1b264e621101d2c0847d10b4051cc273454f6507e5099246d74f
ppc64le skopeo-1.20.0-3.el10_1.ppc64le.rpm bf651a730e1e08d32c09aaa34499964c9fde97913b1fbeddd3a0a73af0163026
s390x skopeo-tests-1.20.0-3.el10_1.s390x.rpm 0ea5977edb3e53a115a9534097e1b0b1a8f6c8f0e8788792e17069e0ac4364d2
s390x skopeo-1.20.0-3.el10_1.s390x.rpm b11dd22e916bb80d1d94e01272668da2f0f4ebb95713682c0e93724d09613558
x86_64 skopeo-1.20.0-3.el10_1.x86_64.rpm 7c267ee61a7337514962612dd0a619b3b845d9a8d83de0730999b322d3d0da1a
x86_64 skopeo-tests-1.20.0-3.el10_1.x86_64.rpm cf2ac70b948d353d3fa30527aeca361c98113901e8bf26ae50cfb36e20141a2e
x86_64_v2 skopeo-1.20.0-3.el10_1.x86_64_v2.rpm 233a5e1c89f5010e47e50d04dbdd7774c1ef32732e0bd8f97694aff4a327ccd5
x86_64_v2 skopeo-tests-1.20.0-3.el10_1.x86_64_v2.rpm 743b5428a405e0d190e013412b4035eae4d20cbaef038bc852fa65c42d5b23b7
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.