Vulnerability Scan Report for registry.suse.com/bci/golang:1.20-2.16
Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: June 04, 2025 14:11

Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: June 04, 2025 14:11
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:2105-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.4-150000.1.11.1 This update for go1.20 fixes the following issues: Update to 1.20.4 (bnc#1206346): - CVE-2023-24539: Fixed an improper sanitization of CSS values (boo#1211029). - CVE-2023-24540: Fixed an improper handling of JavaScript whitespace (boo#1211030). - CVE-2023-29400: Fixed an improper handling of empty HTML attributes (boo#1211031). - runtime: automatically bump RLIMIT_NOFILE on Unix. - crypto/subtle: xor fails when run with race+purego. - cmd/compile: encoding/binary.PutUint16 sometimes doesn't write. - cmd/compile: internal compiler error: cannot call SetType(go.shape.int) on v (type int). - cmd/compile: miscompilation in star-tex.org/x/cmd/star-tex. - net/http: FileServer no longer serves content for POST. - crypto/tls: TLSv1.3 connection fails with invalid PSK binder. - cmd/compile: incorrect inline function variable. - cmd/compile: Unified IR exports table is binary unstable in presence of generics. - go/internal/gcimporter: lookupGorootExport should use the go command from build.Default.GOROOT. Non-security fixes: - Reverted go1.x Suggests go1.x-race (boo#1210963). - Re-enabled binary stripping and debuginfo (boo#1210938). |
|
|
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:3181-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.7-150000.1.20.1 This update for go1.20 fixes the following issues: - Update to go v1.20.7 (released 2023-08-01) (bsc#1206346) - CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:3700-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.8-150000.1.23.1 This update for go1.20 fixes the following issues: Update to go1.20.8 (bsc#1206346). - CVE-2023-39318: Fixed improper handling of HTML-like comments within script contexts in html/template (bsc#1215084). - CVE-2023-39319: Fixed improper handling of special tags within script contexts in html/template (bsc#1215085). The following non-security bug was fixed: - Add missing directory pprof html asset directory to package (bsc#1215090). |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:4018-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.9-150000.1.26.1 This update for go1.20 fixes the following issues: - Updated to version 1.20.9 (bsc#1206346): - CVE-2023-39323: Fixed an arbitrary execution issue during build time due to path directive bypass (bsc#1215985). |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:4068-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.10-150000.1.29.1 This update for go1.20 fixes the following issues: - Update to go1.20.10 (bsc#1206346) - CVE-2023-39325: Fixed a flaw that can lead to a DoS due to a rapid stream resets causing excessive work. This is also known as CVE-2023-44487. (bsc#1216109) |