Vulnerability Scan Report for registry.suse.com/bci/bci-init:15.5.14.23
Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: April 08, 2025 14:32

Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: April 08, 2025 14:32
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
glibc | LOW | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2025:0562-1 Installed Version: 2.31-150300.63.1 Fixed Version: 2.31-150300.92.1 This update for glibc fixes the following issues: - CVE-2025-0395: Fix underallocation of abort_msg_s struct (bsc#1236282) |
||
glibc | UNKNOWN | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:0870-1 Installed Version: 2.31-150300.63.1 Fixed Version: 2.31-150300.68.1 This update for glibc fixes the following issues: Security issues fixed: - qsort: harden handling of degenerated / non transient compare function (bsc#1218866) Other issues fixed: - getaddrinfo: translate ENOMEM to EAI_MEMORY (bsc#1217589, BZ #31163) - aarch64: correct CFI in rawmemchr (bsc#1217445, BZ #31113) |
||
krb5 | HIGH | fixed |
Security update for krb5 Vulnerability ID: SUSE-SU-2024:0997-1 Installed Version: 1.20.1-150500.3.3.1 Fixed Version: 1.20.1-150500.3.6.1 This update for krb5 fixes the following issues: - CVE-2024-26458: Fixed memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770). - CVE-2024-26461: Fixed memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (bsc#1220771). - CVE-2024-26462: Fixed memory leak at /krb5/src/kdc/ndr.c (bsc#1220772). |
||
krb5 | HIGH | fixed |
Security update for krb5 Vulnerability ID: SUSE-SU-2024:2302-1 Installed Version: 1.20.1-150500.3.3.1 Fixed Version: 1.20.1-150500.3.9.1 This update for krb5 fixes the following issues: - CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186). - CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187). |
||
libapparmor1 | UNKNOWN | fixed |
Security update for apparmor Vulnerability ID: SUSE-SU-2025:1063-1 Installed Version: 3.0.4-150500.11.9.1 Fixed Version: 3.0.4-150500.11.12.2 This update for apparmor fixes the following issues: - Allow dovecot-auth to execute unix check password from /sbin, not only from /usr/bin (bsc#1234452). |