Vulnerability Scan Report for registry.suse.com/suse/mariadb:10.11-36.6
MariaDB Server container based on the SLE Base Container Image.
Last scanned on: May 16, 2025 04:55

MariaDB Server container based on the SLE Base Container Image.
Last scanned on: May 16, 2025 04:55
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
libglib-2_0-0 | HIGH | fixed |
Security update for glib2 Vulnerability ID: SUSE-SU-2024:4254-1 Installed Version: 2.78.6-150600.4.3.1 Fixed Version: 2.78.6-150600.4.8.1 This update for glib2 fixes the following issues: Security issues fixed: - CVE-2024-52533: Fix a single byte buffer overflow in set_connect_msg() (bsc#1233282). Non-security issue fixed: - Fix error when uninstalling packages (bsc#1231463). |
||
libglib-2_0-0 | MEDIUM | fixed |
Security update for glib2 Vulnerability ID: SUSE-SU-2025:1367-1 Installed Version: 2.78.6-150600.4.3.1 Fixed Version: 2.78.6-150600.4.11.1 This update for glib2 fixes the following issues: - CVE-2025-3360: Fixed integer overflow and buffer underread when parsing a very long and invalid ISO 8601 timestamp with g_date_time_new_from_iso8601() (bsc#1240897) |
||
liblzma5 | HIGH | fixed |
Security update for xz Vulnerability ID: SUSE-SU-2025:1137-1 Installed Version: 5.4.1-150600.1.2 Fixed Version: 5.4.1-150600.3.3.1 This update for xz fixes the following issues: - CVE-2025-31115: Fixed heap use after free and writing to an address based on the null pointer plus an offset (bsc#1240414) |
||
libopenssl-3-fips-provider | HIGH | fixed |
Security update for openssl-3 Vulnerability ID: SUSE-SU-2024:2635-1 Installed Version: 3.1.4-150600.5.7.1 Fixed Version: 3.1.4-150600.5.10.1 This update for openssl-3 fixes the following issues: Security fixes: - CVE-2024-5535: Fixed SSL_select_next_proto buffer overread (bsc#1227138) Other fixes: - Build with no-afalgeng (bsc#1226463) - Build with enabled sm2 and sm4 support (bsc#1222899) - Fix non-reproducibility issue (bsc#1223336) |
||
libopenssl-3-fips-provider | HIGH | fixed |
Security update for openssl-3 Vulnerability ID: SUSE-SU-2024:3106-1 Installed Version: 3.1.4-150600.5.7.1 Fixed Version: 3.1.4-150600.5.15.1 This update for openssl-3 fixes the following issues: - CVE-2024-6119: Fixed denial of service in X.509 name checks (bsc#1229465) Other fixes: - FIPS: Deny SHA-1 signature verification in FIPS provider (bsc#1221365). - FIPS: RSA keygen PCT requirements. - FIPS: Check that the fips provider is available before setting it as the default provider in FIPS mode (bsc#1220523). - FIPS: Port openssl to use jitterentropy (bsc#1220523). - FIPS: Block non-Approved Elliptic Curves (bsc#1221786). - FIPS: Service Level Indicator (bsc#1221365). - FIPS: Output the FIPS-validation name and module version which uniquely identify the FIPS validated module (bsc#1221751). - FIPS: Add required selftests: (bsc#1221760). - FIPS: DH: Disable FIPS 186-4 Domain Parameters (bsc#1221821). - FIPS: Recommendation for Password-Based Key Derivation (bsc#1221827). - FIPS: Zero initialization required (bsc#1221752). - FIPS: Reseed DRBG (bsc#1220690, bsc#1220693, bsc#1220696). - FIPS: NIST SP 800-56Brev2 (bsc#1221824). - FIPS: Approved Modulus Sizes for RSA Digital Signature for FIPS 186-4 (bsc#1221787). - FIPS: Port openssl to use jitterentropy (bsc#1220523). - FIPS: NIST SP 800-56Arev3 (bsc#1221822). - FIPS: Error state has to be enforced (bsc#1221753). |
|