Vulnerability Scan Report for registry.suse.com/bci/golang:1.20-2.15
Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: November 02, 2024 09:52
Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: November 02, 2024 09:52
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
glibc-devel | MEDIUM | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2023:1718-1 Installed Version: 2.31-150300.41.1 Fixed Version: 2.31-150300.46.1 This update for glibc fixes the following issues: Security issue fixed: - CVE-2023-0687: Fix allocated buffer overflow in gmon (bsc#1207975) Other issues fixed: - Fix avx2 strncmp offset compare condition check (bsc#1208358) - elf: Allow dlopen of filter object to work (bsc#1207571) - powerpc: Fix unrecognized instruction errors with recent GCC - x86: Cache computation for AMD architecture (bsc#1207957) |
||
glibc-devel | MEDIUM | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2023:4110-1 Installed Version: 2.31-150300.41.1 Fixed Version: 2.31-150300.63.1 This update for glibc fixes the following issues: Security issue fixed: - CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931) Also a regression from a previous update was fixed: - elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676) |
||
glibc-devel | UNKNOWN | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:0870-1 Installed Version: 2.31-150300.41.1 Fixed Version: 2.31-150300.68.1 This update for glibc fixes the following issues: Security issues fixed: - qsort: harden handling of degenerated / non transient compare function (bsc#1218866) Other issues fixed: - getaddrinfo: translate ENOMEM to EAI_MEMORY (bsc#1217589, BZ #31163) - aarch64: correct CFI in rawmemchr (bsc#1217445, BZ #31113) |
||
go1.20 | CRITICAL | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:2526-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.5-150000.1.14.1 This update for go1.20 fixes the following issues: Update to go1.20.5 (bsc#1206346): - CVE-2023-29402: cmd/go: Fixed cgo code injection (bsc#1212073). - CVE-2023-29403: runtime: Fixed unexpected behavior of setuid/setgid binaries (bsc#1212074). - CVE-2023-29404: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212075). - CVE-2023-29405: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212076). |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:1791-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.3-150000.1.8.1 This update for go1.20 fixes the following issues: Update to version 1.20.3: * CVE-2023-24534: security: net/http, net/textproto: denial of service from excessive memory allocation (bsc#1210127) * CVE-2023-24536: security: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (bsc#1210128) * CVE-2023-24537: security: go/parser: infinite loop in parsing (bsc#1210129) * CVE-2023-24538: security: html/template: backticks not treated as string delimiters (bsc#1210130) * x/text: building as a plugin failure on darwin/arm64 * cmd/go: timeout on darwin-amd64-race builder * internal/testpty: fails on some Linux machines due to incorrect error handling * cmd/link: Incorrect symbol linked in darwin/arm64 * cmd/link: linker fails on linux/amd64 when gcc's lto options are used * cmd/link/internal/arm: off-by-one error in trampoline phase call reachability calculation * time: time zone lookup using extend string makes wrong start time for non-DST zones * runtime: crash on linux-ppc64le * cmd/compile: crypto/elliptic build error under -linkshared mode * cmd/compile: unsafe.SliceData incoherent resuilt with nil argument |