{"affected":[{"ecosystem_specific":{"binaries":[{"skopeo":"1.14.4-3.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"skopeo","purl":"pkg:rpm/suse/skopeo&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.14.4-3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for skopeo fixes the following issues:\n\n- CVE-2025-22870: golang.org/x/net/proxy: proxy bypass using IPv6 zone IDs  (bsc#1238685)\n- CVE-2025-27144: gopkg.in/square/go-jose.v2,gopkg.in/go-jose/go-jose.v2,github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service  (bsc#1237613)\n- CVE-2024-6104: hashicorp/go-retryablehttp: url might write sensitive information to log file (bsc#1227056)\n- CVE-2023-45288: golang.org/x/net/http2: close connections when receiving too many headers (bsc#1236483)\n","id":"SUSE-SU-2025:20179-1","modified":"2025-04-07T09:36:08Z","published":"2025-04-07T09:36:08Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520179-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237613"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238685"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-6104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-27144"}],"related":["CVE-2023-45288","CVE-2024-6104","CVE-2025-22870","CVE-2025-27144"],"summary":"Security update for skopeo","upstream":["CVE-2023-45288","CVE-2024-6104","CVE-2025-22870","CVE-2025-27144"]}