{"affected":[{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150400.4.38.1","podman-remote":"4.9.5-150400.4.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.3","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Micro%205.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150400.4.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150400.4.38.1","podman-remote":"4.9.5-150400.4.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.4","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Micro%205.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150400.4.38.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for podman fixes the following issues:\n\n- CVE-2024-6104: possible sensitive data exposure due to hashicorp/go-retryablehttp not sanitizing URLs when writing\n  them to log files. (bsc#1227052)\n- CVE-2023-45288: possible excessive CPU consumption due to no limit being set on the number of CONTINUATION frames\n  read for an HTTP/2 request in golang.org/x/net/http2. (bsc#1236507)\n","id":"SUSE-SU-2025:0579-1","modified":"2025-02-18T13:00:26Z","published":"2025-02-18T13:00:26Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250579-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227052"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236507"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-6104"}],"related":["CVE-2023-45288","CVE-2024-6104"],"summary":"Security update for podman","upstream":["CVE-2023-45288","CVE-2024-6104"]}