Vulnerability Scan Report for registry.suse.com/bci/golang:1.20-2.16
Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: April 11, 2025 02:23

Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: April 11, 2025 02:23
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:3700-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.8-150000.1.23.1 This update for go1.20 fixes the following issues: Update to go1.20.8 (bsc#1206346). - CVE-2023-39318: Fixed improper handling of HTML-like comments within script contexts in html/template (bsc#1215084). - CVE-2023-39319: Fixed improper handling of special tags within script contexts in html/template (bsc#1215085). The following non-security bug was fixed: - Add missing directory pprof html asset directory to package (bsc#1215090). |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:4018-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.9-150000.1.26.1 This update for go1.20 fixes the following issues: - Updated to version 1.20.9 (bsc#1206346): - CVE-2023-39323: Fixed an arbitrary execution issue during build time due to path directive bypass (bsc#1215985). |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:4068-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.10-150000.1.29.1 This update for go1.20 fixes the following issues: - Update to go1.20.10 (bsc#1206346) - CVE-2023-39325: Fixed a flaw that can lead to a DoS due to a rapid stream resets causing excessive work. This is also known as CVE-2023-44487. (bsc#1216109) |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:4708-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.12-150000.1.35.1 This update for go1.20 fixes the following issues: Update to go1.20.12: - CVE-2023-45285: cmd/go: git VCS qualifier in module path uses git:// scheme (bsc#1217834). - CVE-2023-45284: path/filepath: Clean removes ending slash for volume on Windows in Go 1.21.4 (bsc#1216943). - CVE-2023-39326: net/http: limit chunked data overhead (bsc#1217833). - cmd/compile: internal compiler error: panic during prove while compiling: unexpected induction with too many parents - cmd/go: TestScript/mod_get_direct fails with 'Filename too long' on Windows |
||
go1.20 | MEDIUM | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:2846-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.6-150000.1.17.1 This update for go1.20 fixes the following issues: go was updated to version 1.20.6 (bsc#1206346): - CVE-2023-29406: Fixed insufficient sanitization of Host header in net/http (bsc#1213229). |