Vulnerability Scan Report for registry.suse.com/bci/openjdk-devel:17-13.10
OpenJDK 17 development container based on the SLE Base Container Image.
Last scanned on: June 09, 2025 12:55

OpenJDK 17 development container based on the SLE Base Container Image.
Last scanned on: June 09, 2025 12:55
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
git-core | HIGH | fixed |
Security update for git Vulnerability ID: SUSE-SU-2024:2656-1 Installed Version: 2.35.3-150300.10.33.1 Fixed Version: 2.35.3-150300.10.42.1 This update for git fixes the following issues: - CVE-2024-24577: Fixed arbitrary code execution due to heap corruption in git_index_add (bsc#1219660) |
||
git-core | MEDIUM | fixed |
Security update for git Vulnerability ID: SUSE-SU-2025:0144-1 Installed Version: 2.35.3-150300.10.33.1 Fixed Version: 2.35.3-150300.10.48.1 This update for git fixes the following issues: - CVE-2024-50349: Passwords for trusted sites could be sent to untrusted sites (bsc#1235600). - CVE-2024-52006: Carriage Returns via the credential protocol to credential helpers (bsc#1235601). |
||
glibc | HIGH | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:1375-1 Installed Version: 2.31-150300.63.1 Fixed Version: 2.31-150300.74.1 This update for glibc fixes the following issues: - iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (CVE-2024-2961, bsc#1222992) |
||
glibc | HIGH | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:1895-1 Installed Version: 2.31-150300.63.1 Fixed Version: 2.31-150300.83.1 This update for glibc fixes the following issues: - CVE-2024-33599: Fixed a stack-based buffer overflow in netgroup cache in nscd (bsc#1223423) - CVE-2024-33600: Avoid null pointer crashes after notfound response in nscd (bsc#1223424) - CVE-2024-33600: Do not send missing not-found response in addgetnetgrentX in nscd (bsc#1223424) - CVE-2024-33601, CVE-2024-33602: Fixed use of two buffers in addgetnetgrentX ( bsc#1223425) - CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425) - Avoid creating userspace live patching prologue for _start routine (bsc#1221940) |
||
glibc | HIGH | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2025:01784-1 Installed Version: 2.31-150300.63.1 Fixed Version: 2.31-150300.95.1 This update for glibc fixes the following issues: Security issues fixed: - CVE-2025-4802: possible execution of attacker controlled code when statically linked setuid binaries using dlopen search for libraries to load in LD_LIBRARY_PATH (bsc#1243317). Other issues fixed: - Multi-threaded application hang due to deadlock when `pthread_cond_signal` fails to wake up `pthread_cond_wait` as a consequence of a bug related to stealing of signals (bsc#1234128). |