{"affected":[{"ecosystem_specific":{"binaries":[{"etcd":"3.5.21-150000.7.12.1","etcdctl":"3.5.21-150000.7.12.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"etcd","purl":"pkg:rpm/opensuse/etcd&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.5.21-150000.7.12.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for etcd fixes the following issues:\n\n- Update to version 3.5.21:\n- CVE-2025-30204: Fixed a bug that could allow excessive memory allocation during header parsing in jwt-go. (bsc#1240515)\n","id":"SUSE-SU-2025:1285-1","modified":"2025-04-15T16:24:41Z","published":"2025-04-15T16:24:41Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20251285-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240515"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-30204"}],"related":["CVE-2025-30204"],"summary":"Security update for etcd","upstream":["CVE-2025-30204"]}