<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for containerized-data-importer</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:20550-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-02-26T16:03:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-02-26T16:03:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-02-26T16:03:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for containerized-data-importer</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for containerized-data-importer fixes the following issues:

Update to version 1.64.0.

Security issues fixed:

- CVE-2024-28180: improper handling of highly compressed data (bsc#1235204).
- CVE-2024-45338: denial of service due to non-linear parsing of case-insensitive content (bsc#1235365).
- CVE-2025-22868: unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239205).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SL-Micro-6.2-317</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620550-1/</URL>
      <Description>Link for SUSE-SU-2026:20550-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2026-March/044567.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:20550-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235204</URL>
      <Description>SUSE Bug 1235204</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235365</URL>
      <Description>SUSE Bug 1235365</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239205</URL>
      <Description>SUSE Bug 1239205</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-28180/</URL>
      <Description>SUSE CVE CVE-2024-28180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45338/</URL>
      <Description>SUSE CVE CVE-2024-45338 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-22868/</URL>
      <Description>SUSE CVE CVE-2025-22868 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.2">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.2">
        <FullProductName ProductID="SUSE Linux Micro 6.2" CPE="cpe:/o:suse:sles:16:16.0:transactional">SUSE Linux Micro 6.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="containerized-data-importer-manifests-1.64.0-160000.1.1">
      <FullProductName ProductID="containerized-data-importer-manifests-1.64.0-160000.1.1">containerized-data-importer-manifests-1.64.0-160000.1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="containerized-data-importer-manifests-1.64.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.2">
      <FullProductName ProductID="SUSE Linux Micro 6.2:containerized-data-importer-manifests-1.64.0-160000.1.1">containerized-data-importer-manifests-1.64.0-160000.1.1 as a component of SUSE Linux Micro 6.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.</Note>
    </Notes>
    <CVE>CVE-2024-28180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.2:containerized-data-importer-manifests-1.64.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620550-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-28180.html</URL>
        <Description>CVE-2024-28180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234984</URL>
        <Description>SUSE Bug 1234984</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2024-45338</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.2:containerized-data-importer-manifests-1.64.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620550-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45338.html</URL>
        <Description>CVE-2024-45338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234794</URL>
        <Description>SUSE Bug 1234794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.</Note>
    </Notes>
    <CVE>CVE-2025-22868</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.2:containerized-data-importer-manifests-1.64.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620550-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-22868.html</URL>
        <Description>CVE-2025-22868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239185</URL>
        <Description>SUSE Bug 1239185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239186</URL>
        <Description>SUSE Bug 1239186</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
