Vulnerability Scan Report for registry.suse.com/bci/golang:1.23.7
Go 1.23 development container based on the SLE Base Container Image.
Last scanned on: May 04, 2025 22:52

Go 1.23 development container based on the SLE Base Container Image.
Last scanned on: May 04, 2025 22:52
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
go1.23 | HIGH | fixed |
Security update for go1.23 Vulnerability ID: SUSE-SU-2025:1141-1 Installed Version: 1.23.7-150000.1.24.1 Fixed Version: 1.23.8-150000.1.27.1 This update for go1.23 fixes the following issues: - Update to go1.23.8 - CVE-2025-22871: Fix an issue with request smuggling through invalid chunked data. (bsc#1240550) |
||
go1.23-doc | HIGH | fixed |
Security update for go1.23 Vulnerability ID: SUSE-SU-2025:1141-1 Installed Version: 1.23.7-150000.1.24.1 Fixed Version: 1.23.8-150000.1.27.1 This update for go1.23 fixes the following issues: - Update to go1.23.8 - CVE-2025-22871: Fix an issue with request smuggling through invalid chunked data. (bsc#1240550) |
||
go1.23-race | HIGH | fixed |
Security update for go1.23 Vulnerability ID: SUSE-SU-2025:1141-1 Installed Version: 1.23.7-150000.1.24.1 Fixed Version: 1.23.8-150000.1.27.1 This update for go1.23 fixes the following issues: - Update to go1.23.8 - CVE-2025-22871: Fix an issue with request smuggling through invalid chunked data. (bsc#1240550) |
||
libexpat1 | HIGH | fixed |
Security update for expat Vulnerability ID: SUSE-SU-2025:1201-1 Installed Version: 2.4.4-150400.3.25.1 Fixed Version: 2.7.1-150400.3.28.1 This update for expat fixes the following issues: - CVE-2024-8176: Fixed denial of service from chaining a large number of entities caused by stack overflow by resolving use of recursion (bsc#1239618) Other fixes: - version update to 2.7.1 (jsc#PED-12500) Bug fixes: #980 #989 Restore event pointer behavior from Expat 2.6.4 (that the fix to CVE-2024-8176 changed in 2.7.0); affected API functions are: - XML_GetCurrentByteCount - XML_GetCurrentByteIndex - XML_GetCurrentColumnNumber - XML_GetCurrentLineNumber - XML_GetInputContext Other changes: #976 #977 Autotools: Integrate files 'fuzz/xml_lpm_fuzzer.{cpp,proto}' with Automake that were missing from 2.7.0 release tarballs #983 #984 Fix printf format specifiers for 32bit Emscripten #992 docs: Promote OpenSSF Best Practices self-certification #978 tests/benchmark: Resolve mistaken double close #986 Address compiler warnings #990 #993 Version info bumped from 11:1:10 (libexpat*.so.1.10.1) to 11:2:10 (libexpat*.so.1.10.2); see https://verbump.de/ for what these numbers do Infrastructure: #982 CI: Start running Perl XML::Parser integration tests #987 CI: Enforce Clang Static Analyzer clean code #991 CI: Re-enable warning clang-analyzer-valist.Uninitialized for clang-tidy #981 CI: Cover compilation with musl #983 #984 CI: Cover compilation with 32bit Emscripten #976 #977 CI: Protect against fuzzer files missing from future release archives - version update to 2.7.0 #935 #937 Autotools: Make generated CMake files look for libexpat.@SO_MAJOR@.dylib on macOS #925 Autotools: Sync CMake templates with CMake 3.29 #945 #962 #966 CMake: Drop support for CMake <3.13 #942 CMake: Small fuzzing related improvements #921 docs: Add missing documentation of error code XML_ERROR_NOT_STARTED that was introduced with 2.6.4 #941 docs: Document need for C++11 compiler for use from C++ #959 tests/benchmark: Fix a (harmless) TOCTTOU #944 Windows: Fix installer target location of file xmlwf.xml for CMake #953 Windows: Address warning -Wunknown-warning-option about -Wno-pedantic-ms-format from LLVM MinGW #971 Address Cppcheck warnings #969 #970 Mass-migrate links from http:// to https:// #947 #958 .. #974 #975 Document changes since the previous release #974 #975 Version info bumped from 11:0:10 (libexpat*.so.1.10.0) to 11:1:10 (libexpat*.so.1.10.1); see https://verbump.de/ for what these numbers do |
||
libglib-2_0-0 | MEDIUM | fixed |
Security update for glib2 Vulnerability ID: SUSE-SU-2025:1367-1 Installed Version: 2.78.6-150600.4.8.1 Fixed Version: 2.78.6-150600.4.11.1 This update for glib2 fixes the following issues: - CVE-2025-3360: Fixed integer overflow and buffer underread when parsing a very long and invalid ISO 8601 timestamp with g_date_time_new_from_iso8601() (bsc#1240897) |