Vulnerability Scan Report for registry.suse.com/bci/bci-init:15.5.18.4
Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: May 21, 2025 23:20

Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: May 21, 2025 23:20
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
curl | MEDIUM | fixed |
Security update for curl Vulnerability ID: SUSE-SU-2024:4359-1 Installed Version: 8.0.1-150400.5.44.1 Fixed Version: 8.0.1-150400.5.59.1 This update for curl fixes the following issues: - CVE-2024-11053: Fixed password leak in curl used for the first host to the followed-to host under certain circumstances (bsc#1234068) |
||
curl | MEDIUM | fixed |
Security update for curl Vulnerability ID: SUSE-SU-2025:0370-1 Installed Version: 8.0.1-150400.5.44.1 Fixed Version: 8.0.1-150400.5.62.1 This update for curl fixes the following issues: - CVE-2025-0725: Fixed gzip integer overflow (bsc#1236590) - CVE-2025-0167: Fixed netrc and default credential leak (bsc#1236588) |
||
glibc | HIGH | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:1895-1 Installed Version: 2.31-150300.74.1 Fixed Version: 2.31-150300.83.1 This update for glibc fixes the following issues: - CVE-2024-33599: Fixed a stack-based buffer overflow in netgroup cache in nscd (bsc#1223423) - CVE-2024-33600: Avoid null pointer crashes after notfound response in nscd (bsc#1223424) - CVE-2024-33600: Do not send missing not-found response in addgetnetgrentX in nscd (bsc#1223424) - CVE-2024-33601, CVE-2024-33602: Fixed use of two buffers in addgetnetgrentX ( bsc#1223425) - CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425) - Avoid creating userspace live patching prologue for _start routine (bsc#1221940) |
||
glibc | LOW | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2025:0562-1 Installed Version: 2.31-150300.74.1 Fixed Version: 2.31-150300.92.1 This update for glibc fixes the following issues: - CVE-2025-0395: Fix underallocation of abort_msg_s struct (bsc#1236282) |
||
krb5 | HIGH | fixed |
Security update for krb5 Vulnerability ID: SUSE-SU-2024:2302-1 Installed Version: 1.20.1-150500.3.6.1 Fixed Version: 1.20.1-150500.3.9.1 This update for krb5 fixes the following issues: - CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186). - CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187). |