{"affected":[{"ecosystem_specific":{"binaries":[{"skopeo":"1.15.1-slfo.1.1_2.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"skopeo","purl":"pkg:rpm/suse/skopeo&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.15.1-slfo.1.1_2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for skopeo fixes the following issues:\n\n- CVE-2024-6104: url might write sensitive information to log file (bsc#1227056).\n- CVE-2023-45288: close connections when receiving too many headers (bsc#1236483).\n- CVE-2025-27144: Go JOSE's Parsing Vulnerable to Denial of Service (bsc#1237613).\n","id":"SUSE-SU-2025:20363-1","modified":"2025-05-28T08:56:42Z","published":"2025-05-28T08:56:42Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520363-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237613"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-6104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-27144"}],"related":["CVE-2023-45288","CVE-2024-6104","CVE-2025-27144"],"summary":"Security update for skopeo","upstream":["CVE-2023-45288","CVE-2024-6104","CVE-2025-27144"]}