Vulnerability Scan Report for registry.suse.com/bci/bci-init:15.3.9.13
Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: June 30, 2025 10:00

Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: June 30, 2025 10:00
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
glibc | HIGH | fixed |
Security update for openssl-1_1 Vulnerability ID: SUSE-RU-2022:0861-1 Installed Version: 2.31-150300.9.12.1 Fixed Version: 2.31-150300.20.7 This update for openssl-1_1 fixes the following issues: openssl-1_1: - CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877). - Fix PAC pointer authentication in ARM (bsc#1195856) - Pull libopenssl-1_1 when updating openssl-1_1 with the same version (bsc#1195792) - FIPS: Fix function and reason error codes (bsc#1182959) - Enable zlib compression support (bsc#1195149) glibc: - Resolve installation issue of `glibc-devel` in SUSE Linux Enterprise Micro 5.1 linux-glibc-devel: - Resolve installation issue of `linux-kernel-headers` in SUSE Linux Enterprise Micro 5.1 libxcrypt: - Resolve installation issue of `libxcrypt-devel` in SUSE Linux Enterprise Micro 5.1 zlib: - Resolve installation issue of `zlib-devel` in SUSE Linux Enterprise Micro 5.1 |
||
glibc | HIGH | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:1375-1 Installed Version: 2.31-150300.9.12.1 Fixed Version: 2.31-150300.74.1 This update for glibc fixes the following issues: - iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (CVE-2024-2961, bsc#1222992) |
||
glibc | HIGH | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:1895-1 Installed Version: 2.31-150300.9.12.1 Fixed Version: 2.31-150300.83.1 This update for glibc fixes the following issues: - CVE-2024-33599: Fixed a stack-based buffer overflow in netgroup cache in nscd (bsc#1223423) - CVE-2024-33600: Avoid null pointer crashes after notfound response in nscd (bsc#1223424) - CVE-2024-33600: Do not send missing not-found response in addgetnetgrentX in nscd (bsc#1223424) - CVE-2024-33601, CVE-2024-33602: Fixed use of two buffers in addgetnetgrentX ( bsc#1223425) - CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425) - Avoid creating userspace live patching prologue for _start routine (bsc#1221940) |
||
glibc | HIGH | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2025:01784-1 Installed Version: 2.31-150300.9.12.1 Fixed Version: 2.31-150300.95.1 This update for glibc fixes the following issues: Security issues fixed: - CVE-2025-4802: possible execution of attacker controlled code when statically linked setuid binaries using dlopen search for libraries to load in LD_LIBRARY_PATH (bsc#1243317). Other issues fixed: - Multi-threaded application hang due to deadlock when `pthread_cond_signal` fails to wake up `pthread_cond_wait` as a consequence of a bug related to stealing of signals (bsc#1234128). |
||
glibc | MEDIUM | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2023:1718-1 Installed Version: 2.31-150300.9.12.1 Fixed Version: 2.31-150300.46.1 This update for glibc fixes the following issues: Security issue fixed: - CVE-2023-0687: Fix allocated buffer overflow in gmon (bsc#1207975) Other issues fixed: - Fix avx2 strncmp offset compare condition check (bsc#1208358) - elf: Allow dlopen of filter object to work (bsc#1207571) - powerpc: Fix unrecognized instruction errors with recent GCC - x86: Cache computation for AMD architecture (bsc#1207957) |