Vulnerability Scan Report for registry.suse.com/bci/bci-init:15.4.24.39
Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: June 20, 2025 12:50

Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: June 20, 2025 12:50
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
suse-build-key | UNKNOWN | fixed |
Security update for suse-build-key Vulnerability ID: SUSE-SU-2024:0444-1 Installed Version: 12.0-150000.8.25.1 Fixed Version: 12.0-150000.8.40.1 This update for suse-build-key fixes the following issues: This update runs a import-suse-build-key script. The previous libzypp-post-script based installation is replaced with a systemd timer and service (bsc#1217215 bsc#1216410 jsc#PED-2777). - suse-build-key-import.service - suse-build-key-import.timer It imports the future SUSE Linux Enterprise 15 4096 bit RSA key primary and reserve keys. After successful import the timer is disabled. To manually import them you can also run: # rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-3fa1d6ce-63c9481c.asc # rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-d588dc46-63c939db.asc Bugfix added since last update: - run rpm commands in import script only when libzypp is not active. bsc#1219189 bsc#1219123 |
||
systemd | MEDIUM | fixed |
Security update for systemd Vulnerability ID: SUSE-SU-2022:4629-1 Installed Version: 249.12-150400.8.13.1 Fixed Version: 249.12-150400.8.16.1 This update for systemd fixes the following issues: - CVE-2022-4415: Fixed systemd-coredump that did not respect the fs.suid_dumpable kernel setting (bsc#1205000). Bug fixes: - Support by-path devlink for multipath nvme block devices (bsc#1200723). |
||
systemd | MEDIUM | fixed |
Security update for systemd Vulnerability ID: SUSE-SU-2023:0201-1 Installed Version: 249.12-150400.8.13.1 Fixed Version: 249.14-150400.8.19.1 This update for systemd fixes the following issues: - CVE-2022-4415: Fixed an issue where users could access coredumps with changed uid, gid or capabilities (bsc#1205000). Non-security fixes: - Enabled the pstore service (jsc#PED-2663). - Fixed an issue accessing TPM when secure boot is enabled (bsc#1204944). - Fixed an issue where a pamd file could get accidentally overwritten after an update (bsc#1207264). |
||
terminfo-base | MEDIUM | fixed |
Security update for ncurses Vulnerability ID: SUSE-SU-2023:2111-1 Installed Version: 6.1-150000.5.12.1 Fixed Version: 6.1-150000.5.15.1 This update for ncurses fixes the following issues: - CVE-2023-29491: Fixed memory corruption issues when processing malformed terminfo data (bsc#1210434). |
||
terminfo-base | MEDIUM | fixed |
Security update for ncurses Vulnerability ID: SUSE-SU-2023:4891-1 Installed Version: 6.1-150000.5.12.1 Fixed Version: 6.1-150000.5.20.1 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) |