{"affected":[{"ecosystem_specific":{"binaries":[{"kubernetes1.25-client":"1.25.16-150400.9.16.1","kubernetes1.25-client-common":"1.25.16-150400.9.16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 15 SP5","name":"kubernetes1.25","purl":"pkg:rpm/suse/kubernetes1.25&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.25.16-150400.9.16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kubernetes1.25-client":"1.25.16-150400.9.16.1","kubernetes1.25-client-common":"1.25.16-150400.9.16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 15 SP6","name":"kubernetes1.25","purl":"pkg:rpm/suse/kubernetes1.25&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.25.16-150400.9.16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kubernetes1.25-client":"1.25.16-150400.9.16.1","kubernetes1.25-client-common":"1.25.16-150400.9.16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP4-ESPOS","name":"kubernetes1.25","purl":"pkg:rpm/suse/kubernetes1.25&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.25.16-150400.9.16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kubernetes1.25-client":"1.25.16-150400.9.16.1","kubernetes1.25-client-common":"1.25.16-150400.9.16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP4-LTSS","name":"kubernetes1.25","purl":"pkg:rpm/suse/kubernetes1.25&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.25.16-150400.9.16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kubernetes1.25-client":"1.25.16-150400.9.16.1","kubernetes1.25-client-common":"1.25.16-150400.9.16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP4-LTSS","name":"kubernetes1.25","purl":"pkg:rpm/suse/kubernetes1.25&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.25.16-150400.9.16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kubernetes1.25-client":"1.25.16-150400.9.16.1","kubernetes1.25-client-common":"1.25.16-150400.9.16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP4","name":"kubernetes1.25","purl":"pkg:rpm/suse/kubernetes1.25&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.25.16-150400.9.16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kubernetes1.25-client":"1.25.16-150400.9.16.1","kubernetes1.25-client-common":"1.25.16-150400.9.16.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kubernetes1.25","purl":"pkg:rpm/opensuse/kubernetes1.25&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.25.16-150400.9.16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kubernetes1.25-apiserver":"1.25.16-150400.9.16.1","kubernetes1.25-client":"1.25.16-150400.9.16.1","kubernetes1.25-client-bash-completion":"1.25.16-150400.9.16.1","kubernetes1.25-client-common":"1.25.16-150400.9.16.1","kubernetes1.25-client-fish-completion":"1.25.16-150400.9.16.1","kubernetes1.25-controller-manager":"1.25.16-150400.9.16.1","kubernetes1.25-kubeadm":"1.25.16-150400.9.16.1","kubernetes1.25-kubelet":"1.25.16-150400.9.16.1","kubernetes1.25-kubelet-common":"1.25.16-150400.9.16.1","kubernetes1.25-proxy":"1.25.16-150400.9.16.1","kubernetes1.25-scheduler":"1.25.16-150400.9.16.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kubernetes1.25","purl":"pkg:rpm/opensuse/kubernetes1.25&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.25.16-150400.9.16.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for kubernetes1.25 fixes the following issues:\n\n- CVE-2023-45288: golang.org/x/net: excessive CPU consumption when processing unlimited sets of headers. (bsc#1229869)\n- CVE-2023-44487: google.golang.org/grpc, kube-apiserver: HTTP/2 rapid reset vulnerability. (bsc#1229869)\n- CVE-2024-24786: github.com/golang/protobuf: infinite loop when unmarshaling invalid JSON. (bsc#1229867)\n\nBug fixes:\n\n- Update go to version 1.22.5 in build requirements. (bsc#1229858)\n","id":"SUSE-SU-2024:3344-1","modified":"2024-09-19T14:51:59Z","published":"2024-09-19T14:51:59Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243344-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216109"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226136"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-39325"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-44487"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-24786"}],"related":["CVE-2023-39325","CVE-2023-44487","CVE-2023-45288","CVE-2024-24786"],"summary":"Security update for kubernetes1.25","upstream":["CVE-2023-39325","CVE-2023-44487","CVE-2023-45288","CVE-2024-24786"]}