Vulnerability Scan Report for registry.suse.com/bci/bci-init:15.4.27.6
Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: September 29, 2024 23:10
Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: September 29, 2024 23:10
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
curl | MEDIUM | fixed |
Security update for curl Vulnerability ID: SUSE-SU-2023:2891-1 Installed Version: 8.0.1-150400.5.23.1 Fixed Version: 8.0.1-150400.5.26.1 This update for curl fixes the following issues: - CVE-2023-32001: Fixed TOCTOU race condition (bsc#1213237). |
||
curl | MEDIUM | fixed |
Security update for curl Vulnerability ID: SUSE-SU-2023:4659-1 Installed Version: 8.0.1-150400.5.23.1 Fixed Version: 8.0.1-150400.5.36.1 This update for curl fixes the following issues: - CVE-2023-46218: Fixed cookie mixed case PSL bypass (bsc#1217573). - CVE-2023-46219: HSTS long file name clears contents (bsc#1217574). |
||
curl | MEDIUM | fixed |
Security update for curl Vulnerability ID: SUSE-SU-2024:1151-2 Installed Version: 8.0.1-150400.5.23.1 Fixed Version: 8.0.1-150400.5.44.1 This update for curl fixes the following issues: - CVE-2024-2004: Fix the uUsage of disabled protocol logic. (bsc#1221665) - CVE-2024-2398: Fix HTTP/2 push headers memory-leak. (bsc#1221667) |
||
curl | MEDIUM | fixed |
Security update for curl Vulnerability ID: SUSE-SU-2024:3080-2 Installed Version: 8.0.1-150400.5.23.1 Fixed Version: 8.0.1-150400.5.47.1 This update for curl fixes the following issues: - CVE-2024-7264: Fixed out-of-bounds read in ASN.1 date parser GTime2str() (bsc#1228535) |
||
dbus-1 | MEDIUM | fixed |
Security update for dbus-1 Vulnerability ID: SUSE-SU-2023:2877-1 Installed Version: 1.12.2-150400.18.5.1 Fixed Version: 1.12.2-150400.18.8.1 This update for dbus-1 fixes the following issues: - CVE-2023-34969: Fixed a possible dbus-daemon crash by an unprivileged users (bsc#1212126). |