Vulnerability Scan Report for registry.suse.com/bci/openjdk-devel:17-15.4
OpenJDK 17 development container based on the SLE Base Container Image.
Last scanned on: September 13, 2024 20:31
OpenJDK 17 development container based on the SLE Base Container Image.
Last scanned on: September 13, 2024 20:31
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
libmount1 | HIGH | fixed |
Security update for util-linux Vulnerability ID: SUSE-SU-2024:1169-1 Installed Version: 2.37.2-150400.8.17.1 Fixed Version: 2.37.2-150400.8.29.1 This update for util-linux fixes the following issues: - CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831) |
||
libncurses6 | MEDIUM | fixed |
Security update for ncurses Vulnerability ID: SUSE-SU-2023:4891-1 Installed Version: 6.1-150000.5.15.1 Fixed Version: 6.1-150000.5.20.1 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) |
||
libnghttp2-14 | HIGH | fixed |
Security update for nghttp2 Vulnerability ID: SUSE-SU-2023:3997-1 Installed Version: 1.40.0-6.1 Fixed Version: 1.40.0-150200.9.1 This update for nghttp2 fixes the following issues: - CVE-2023-35945: Fixed memory leak when PUSH_PROMISE or HEADERS frame cannot be sent (bsc#1215713). |
||
libnghttp2-14 | HIGH | fixed |
Security update for nghttp2 Vulnerability ID: SUSE-SU-2023:4200-1 Installed Version: 1.40.0-6.1 Fixed Version: 1.40.0-150200.12.1 This update for nghttp2 fixes the following issues: - CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack. (bsc#1216174) |
||
libnghttp2-14 | HIGH | fixed |
Security update for nghttp2 Vulnerability ID: SUSE-SU-2024:1167-1 Installed Version: 1.40.0-6.1 Fixed Version: 1.40.0-150200.17.1 This update for nghttp2 fixes the following issues: - CVE-2024-28182: Fixed denial of service via http/2 continuation frames (bsc#1221399) |