Vulnerability Scan Report for registry.suse.com/bci/golang:1.20-2.16
Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: November 05, 2024 19:11
Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: November 05, 2024 19:11
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
glibc-devel | UNKNOWN | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:0870-1 Installed Version: 2.31-150300.46.1 Fixed Version: 2.31-150300.68.1 This update for glibc fixes the following issues: Security issues fixed: - qsort: harden handling of degenerated / non transient compare function (bsc#1218866) Other issues fixed: - getaddrinfo: translate ENOMEM to EAI_MEMORY (bsc#1217589, BZ #31163) - aarch64: correct CFI in rawmemchr (bsc#1217445, BZ #31113) |
||
go1.20 | CRITICAL | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:2526-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.5-150000.1.14.1 This update for go1.20 fixes the following issues: Update to go1.20.5 (bsc#1206346): - CVE-2023-29402: cmd/go: Fixed cgo code injection (bsc#1212073). - CVE-2023-29403: runtime: Fixed unexpected behavior of setuid/setgid binaries (bsc#1212074). - CVE-2023-29404: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212075). - CVE-2023-29405: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212076). |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:1791-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.3-150000.1.8.1 This update for go1.20 fixes the following issues: Update to version 1.20.3: * CVE-2023-24534: security: net/http, net/textproto: denial of service from excessive memory allocation (bsc#1210127) * CVE-2023-24536: security: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (bsc#1210128) * CVE-2023-24537: security: go/parser: infinite loop in parsing (bsc#1210129) * CVE-2023-24538: security: html/template: backticks not treated as string delimiters (bsc#1210130) * x/text: building as a plugin failure on darwin/arm64 * cmd/go: timeout on darwin-amd64-race builder * internal/testpty: fails on some Linux machines due to incorrect error handling * cmd/link: Incorrect symbol linked in darwin/arm64 * cmd/link: linker fails on linux/amd64 when gcc's lto options are used * cmd/link/internal/arm: off-by-one error in trampoline phase call reachability calculation * time: time zone lookup using extend string makes wrong start time for non-DST zones * runtime: crash on linux-ppc64le * cmd/compile: crypto/elliptic build error under -linkshared mode * cmd/compile: unsafe.SliceData incoherent resuilt with nil argument |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:2105-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.4-150000.1.11.1 This update for go1.20 fixes the following issues: Update to 1.20.4 (bnc#1206346): - CVE-2023-24539: Fixed an improper sanitization of CSS values (boo#1211029). - CVE-2023-24540: Fixed an improper handling of JavaScript whitespace (boo#1211030). - CVE-2023-29400: Fixed an improper handling of empty HTML attributes (boo#1211031). - runtime: automatically bump RLIMIT_NOFILE on Unix. - crypto/subtle: xor fails when run with race+purego. - cmd/compile: encoding/binary.PutUint16 sometimes doesn't write. - cmd/compile: internal compiler error: cannot call SetType(go.shape.int) on v (type int). - cmd/compile: miscompilation in star-tex.org/x/cmd/star-tex. - net/http: FileServer no longer serves content for POST. - crypto/tls: TLSv1.3 connection fails with invalid PSK binder. - cmd/compile: incorrect inline function variable. - cmd/compile: Unified IR exports table is binary unstable in presence of generics. - go/internal/gcimporter: lookupGorootExport should use the go command from build.Default.GOROOT. Non-security fixes: - Reverted go1.x Suggests go1.x-race (boo#1210963). - Re-enabled binary stripping and debuginfo (boo#1210938). |
|
|
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:3181-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.7-150000.1.20.1 This update for go1.20 fixes the following issues: - Update to go v1.20.7 (released 2023-08-01) (bsc#1206346) - CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) |