Vulnerability Scan Report for registry.suse.com/bci/openjdk-devel:17.0.14.0-4.31
OpenJDK 17 development container based on the SLE Base Container Image.
Last scanned on: July 09, 2025 08:53

OpenJDK 17 development container based on the SLE Base Container Image.
Last scanned on: July 09, 2025 08:53
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
libfa1 | LOW | fixed |
Security update for augeas Vulnerability ID: SUSE-SU-2025:1534-1 Installed Version: 1.14.1-150600.1.3 Fixed Version: 1.14.1-150600.3.3.1 This update for augeas fixes the following issues: - CVE-2025-2588: Check for NULL pointers when calling re_case_expand in function fa_expand_nocase. (bsc#1239909) |
||
libglib-2_0-0 | HIGH | fixed |
Security update for glib2 Vulnerability ID: SUSE-SU-2025:02167-1 Installed Version: 2.78.6-150600.4.11.1 Fixed Version: 2.78.6-150600.4.16.1 This update for glib2 fixes the following issues: - CVE-2025-6052: Fixed integer overflow in g_string_maybe_expand() leads to potential buffer overflow in GString (bsc#1244596). - CVE-2025-4373: Fixed buffer underflow through glib/gstring.c via function g_string_insert_unichar (bsc#1242844). |
||
libopenssl-3-fips-provider | HIGH | fixed |
Security update for openssl-3 Vulnerability ID: SUSE-SU-2025:1550-1 Installed Version: 3.1.4-150600.5.24.1 Fixed Version: 3.1.4-150600.5.27.1 This update for openssl-3 fixes the following issues: Security: - CVE-2025-27587: Timing side channel vulnerability in the P-384 implementation when used with ECDSA in the PPC architecture (bsc#1240366). - Missing null pointer check before accessing handshake_func in ssl_lib.c (bsc#1240607). FIPS: - Disabling EMS in OpenSSL configuration prevents sshd from starting (bsc#1230959, bsc#1232326, bsc#1231748). |
||
libopenssl3 | HIGH | fixed |
Security update for openssl-3 Vulnerability ID: SUSE-SU-2025:1550-1 Installed Version: 3.1.4-150600.5.24.1 Fixed Version: 3.1.4-150600.5.27.1 This update for openssl-3 fixes the following issues: Security: - CVE-2025-27587: Timing side channel vulnerability in the P-384 implementation when used with ECDSA in the PPC architecture (bsc#1240366). - Missing null pointer check before accessing handshake_func in ssl_lib.c (bsc#1240607). FIPS: - Disabling EMS in OpenSSL configuration prevents sshd from starting (bsc#1230959, bsc#1232326, bsc#1231748). |
||
libsqlite3-0 | HIGH | fixed |
Security update for sqlite3 Vulnerability ID: SUSE-SU-2025:1456-1 Installed Version: 3.44.0-150000.3.23.1 Fixed Version: 3.49.1-150000.3.27.1 This update for sqlite3 fixes the following issues: - CVE-2025-29087,CVE-2025-3277: Fixed integer overflow in sqlite concat function (bsc#1241020) - CVE-2025-29088: Fixed integer overflow through the SQLITE_DBCONFIG_LOOKASIDE component (bsc#1241078) Other fixes: - Updated to version 3.49.1 from Factory (jsc#SLE-16032) |