Vulnerability Scan Report for registry.suse.com/bci/golang:1.20-2.16
Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: December 12, 2024 23:22
Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: December 12, 2024 23:22
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:3181-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.7-150000.1.20.1 This update for go1.20 fixes the following issues: - Update to go v1.20.7 (released 2023-08-01) (bsc#1206346) - CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:3700-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.8-150000.1.23.1 This update for go1.20 fixes the following issues: Update to go1.20.8 (bsc#1206346). - CVE-2023-39318: Fixed improper handling of HTML-like comments within script contexts in html/template (bsc#1215084). - CVE-2023-39319: Fixed improper handling of special tags within script contexts in html/template (bsc#1215085). The following non-security bug was fixed: - Add missing directory pprof html asset directory to package (bsc#1215090). |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:4018-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.9-150000.1.26.1 This update for go1.20 fixes the following issues: - Updated to version 1.20.9 (bsc#1206346): - CVE-2023-39323: Fixed an arbitrary execution issue during build time due to path directive bypass (bsc#1215985). |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:4068-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.10-150000.1.29.1 This update for go1.20 fixes the following issues: - Update to go1.20.10 (bsc#1206346) - CVE-2023-39325: Fixed a flaw that can lead to a DoS due to a rapid stream resets causing excessive work. This is also known as CVE-2023-44487. (bsc#1216109) |
||
go1.20 | HIGH | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:4708-1 Installed Version: 1.20.2-150000.1.5.1 Fixed Version: 1.20.12-150000.1.35.1 This update for go1.20 fixes the following issues: Update to go1.20.12: - CVE-2023-45285: cmd/go: git VCS qualifier in module path uses git:// scheme (bsc#1217834). - CVE-2023-45284: path/filepath: Clean removes ending slash for volume on Windows in Go 1.21.4 (bsc#1216943). - CVE-2023-39326: net/http: limit chunked data overhead (bsc#1217833). - cmd/compile: internal compiler error: panic during prove while compiling: unexpected induction with too many parents - cmd/go: TestScript/mod_get_direct fails with 'Filename too long' on Windows |