Vulnerability Scan Report for registry.suse.com/bci/bci-init:15.4.28.3
Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: May 20, 2025 00:51

Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: May 20, 2025 00:51
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
login_defs | MEDIUM | fixed |
Security update for shadow Vulnerability ID: SUSE-SU-2024:2658-1 Installed Version: 4.8.1-150400.10.6.1 Fixed Version: 4.8.1-150400.10.18.1 This update for shadow fixes the following issues: - CVE-2013-4235: Fixed a race condition when copying and removing directory trees (bsc#916845). |
||
login_defs | LOW | fixed |
Security update for shadow Vulnerability ID: SUSE-SU-2023:4024-1 Installed Version: 4.8.1-150400.10.6.1 Fixed Version: 4.8.1-150400.10.12.1 This update for shadow fixes the following issues: - CVE-2023-4641: Fixed potential password leak (bsc#1214806). |
||
ncurses-utils | MEDIUM | fixed |
Security update for ncurses Vulnerability ID: SUSE-SU-2023:4891-1 Installed Version: 6.1-150000.5.15.1 Fixed Version: 6.1-150000.5.20.1 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) |
||
openssl-1_1 | HIGH | fixed |
Security update for openssl-1_1 Vulnerability ID: SUSE-SU-2024:2089-1 Installed Version: 1.1.1l-150400.7.37.1 Fixed Version: 1.1.1l-150400.7.69.1 This update for openssl-1_1 fixes the following issues: - CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551) |
||
openssl-1_1 | MEDIUM | fixed |
Security update for openssl-1_1 Vulnerability ID: SUSE-SU-2023:2648-1 Installed Version: 1.1.1l-150400.7.37.1 Fixed Version: 1.1.1l-150400.7.42.1 This update for openssl-1_1 fixes the following issues: - CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption. The previous fix for this timing side channel turned out to cause a severe 2-3x performance regression in the typical use case (bsc#1207534). - Update further expiring certificates that affect the testsuite (bsc#1201627). |