{"affected":[{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-10.1","podman-docker":"4.9.5-10.1","podman-remote":"4.9.5-10.1","podmansh":"4.9.5-10.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-10.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for podman fixes the following issues:\n\n- CVE-2025-47914: lack of message size validation when SSH Agent server is processing new identity requests can lead to\n  out-of-bounds read and an application panic (bsc#1253993).\n- CVE-2025-47913: receiving an `SSH_AGENT_SUCCESS` reply when the SSH client is expecting a typed response can lead to\n  the early termination of the client process (bsc#1253542).\n","id":"SUSE-SU-2026:20035-1","modified":"2025-12-30T20:16:23Z","published":"2025-12-30T20:16:23Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620035-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253542"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253993"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-47913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-47914"}],"related":["CVE-2025-47913","CVE-2025-47914"],"summary":"Security update for podman","upstream":["CVE-2025-47913","CVE-2025-47914"]}