Vulnerability Scan Report for registry.suse.com/bci/bci-init:15.4.29.11
Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: April 10, 2025 15:30

Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: April 10, 2025 15:30
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
login_defs | LOW | fixed |
Security update for shadow Vulnerability ID: SUSE-SU-2023:4024-1 Installed Version: 4.8.1-150400.10.6.1 Fixed Version: 4.8.1-150400.10.12.1 This update for shadow fixes the following issues: - CVE-2023-4641: Fixed potential password leak (bsc#1214806). |
||
ncurses-utils | MEDIUM | fixed |
Security update for ncurses Vulnerability ID: SUSE-SU-2023:4891-1 Installed Version: 6.1-150000.5.15.1 Fixed Version: 6.1-150000.5.20.1 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) |
||
openssl-1_1 | HIGH | fixed |
Security update for openssl-1_1 Vulnerability ID: SUSE-SU-2024:2089-1 Installed Version: 1.1.1l-150400.7.45.1 Fixed Version: 1.1.1l-150400.7.69.1 This update for openssl-1_1 fixes the following issues: - CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551) |
||
openssl-1_1 | MEDIUM | fixed |
Security update for openssl-1_1 Vulnerability ID: SUSE-SU-2023:2962-1 Installed Version: 1.1.1l-150400.7.45.1 Fixed Version: 1.1.1l-150400.7.48.1 This update for openssl-1_1 fixes the following issues: - CVE-2023-3446: Fixed DH_check() excessive time with over sized modulus (bsc#1213487). |
||
openssl-1_1 | MEDIUM | fixed |
Security update for openssl-1_1 Vulnerability ID: SUSE-SU-2023:3397-1 Installed Version: 1.1.1l-150400.7.45.1 Fixed Version: 1.1.1l-150400.7.53.1 This update for openssl-1_1 fixes the following issues: - CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value. (bsc#1213853) - Don't pass zero length input to EVP_Cipher because s390x assembler optimized AES cannot handle zero size. (bsc#1213517) |