Vulnerability Scan Report for registry.suse.com/bci/bci-init:15.4.29.8
Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: October 01, 2024 22:41
Systemd environment for containers based on the SLE Base Container Image. This container is only supported with podman.
Last scanned on: October 01, 2024 22:41
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
glibc | HIGH | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:1895-1 Installed Version: 2.31-150300.46.1 Fixed Version: 2.31-150300.83.1 This update for glibc fixes the following issues: - CVE-2024-33599: Fixed a stack-based buffer overflow in netgroup cache in nscd (bsc#1223423) - CVE-2024-33600: Avoid null pointer crashes after notfound response in nscd (bsc#1223424) - CVE-2024-33600: Do not send missing not-found response in addgetnetgrentX in nscd (bsc#1223424) - CVE-2024-33601, CVE-2024-33602: Fixed use of two buffers in addgetnetgrentX ( bsc#1223425) - CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425) - Avoid creating userspace live patching prologue for _start routine (bsc#1221940) |
||
glibc | MEDIUM | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2023:4110-1 Installed Version: 2.31-150300.46.1 Fixed Version: 2.31-150300.63.1 This update for glibc fixes the following issues: Security issue fixed: - CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931) Also a regression from a previous update was fixed: - elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676) |
||
glibc | UNKNOWN | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:0870-1 Installed Version: 2.31-150300.46.1 Fixed Version: 2.31-150300.68.1 This update for glibc fixes the following issues: Security issues fixed: - qsort: harden handling of degenerated / non transient compare function (bsc#1218866) Other issues fixed: - getaddrinfo: translate ENOMEM to EAI_MEMORY (bsc#1217589, BZ #31163) - aarch64: correct CFI in rawmemchr (bsc#1217445, BZ #31113) |
||
krb5 | HIGH | fixed |
Security update for krb5 Vulnerability ID: SUSE-SU-2023:3363-1 Installed Version: 1.19.2-150400.3.3.1 Fixed Version: 1.19.2-150400.3.6.1 This update for krb5 fixes the following issues: - CVE-2023-36054: Fixed a DoS that could be triggered by an authenticated remote user. (bsc#1214054) |
||
krb5 | HIGH | fixed |
Security update for krb5 Vulnerability ID: SUSE-SU-2024:1006-1 Installed Version: 1.19.2-150400.3.3.1 Fixed Version: 1.19.2-150400.3.9.1 This update for krb5 fixes the following issues: - CVE-2024-26458: Fixed memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770). - CVE-2024-26461: Fixed memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (bsc#1220771). |