Vulnerability Scan Report for registry.suse.com/bci/golang:1.20-2.15
Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: November 02, 2024 09:52
Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: November 02, 2024 09:52
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
perl-base | HIGH | fixed |
Security update for perl Vulnerability ID: SUSE-SU-2023:2882-1 Installed Version: 5.26.1-150300.17.11.1 Fixed Version: 5.26.1-150300.17.14.1 This update for perl fixes the following issues: - CVE-2023-31484: Enable TLS cert verification in CPAN (bsc#1210999). |
||
perl-base | HIGH | fixed |
Security update for perl Vulnerability ID: SUSE-SU-2024:1762-1 Installed Version: 5.26.1-150300.17.11.1 Fixed Version: 5.26.1-150300.17.17.1 This update for perl fixes the following issues: Security issues fixed: - CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216) - CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233) Non-security issue fixed: - make Net::FTP work with TLS 1.3 (bsc#1213638) |
||
procps | LOW | fixed |
Security update for procps Vulnerability ID: SUSE-SU-2023:3472-1 Installed Version: 3.3.15-150000.7.28.1 Fixed Version: 3.3.15-150000.7.34.1 This update for procps fixes the following issues: - CVE-2023-4016: Fixed ps buffer overflow (bsc#1214290). |
||
rpm-ndb | MEDIUM | fixed |
Security update for rpm Vulnerability ID: SUSE-SU-2024:1557-1 Installed Version: 4.14.3-150300.55.1 Fixed Version: 4.14.3-150400.59.16.1 This update for rpm fixes the following issues: Security fixes: - CVE-2021-3521: Fixed missing subkey binding signature checking (bsc#1191175) Other fixes: - accept more signature subpackets marked as critical (bsc#1218686) - backport limit support for the autopatch macro (bsc#1189495) |
||
shadow | MEDIUM | fixed |
Security update for shadow Vulnerability ID: SUSE-SU-2023:2066-1 Installed Version: 4.8.1-150400.10.3.1 Fixed Version: 4.8.1-150400.10.6.1 This update for shadow fixes the following issues: - CVE-2023-29383: Fixed apparent /etc/shadow manipulation via chfn (bsc#1210507). |