Vulnerability Scan Report for registry.suse.com/bci/golang:1.20-3.3
Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: July 06, 2025 15:43

Go 1.21 development container based on the SLE Base Container Image.
Last scanned on: July 06, 2025 15:43
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
glibc-devel | HIGH | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2025:01784-1 Installed Version: 2.31-150300.46.1 Fixed Version: 2.31-150300.95.1 This update for glibc fixes the following issues: Security issues fixed: - CVE-2025-4802: possible execution of attacker controlled code when statically linked setuid binaries using dlopen search for libraries to load in LD_LIBRARY_PATH (bsc#1243317). Other issues fixed: - Multi-threaded application hang due to deadlock when `pthread_cond_signal` fails to wake up `pthread_cond_wait` as a consequence of a bug related to stealing of signals (bsc#1234128). |
||
glibc-devel | MEDIUM | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2023:4110-1 Installed Version: 2.31-150300.46.1 Fixed Version: 2.31-150300.63.1 This update for glibc fixes the following issues: Security issue fixed: - CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931) Also a regression from a previous update was fixed: - elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676) |
||
glibc-devel | LOW | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2025:0562-1 Installed Version: 2.31-150300.46.1 Fixed Version: 2.31-150300.92.1 This update for glibc fixes the following issues: - CVE-2025-0395: Fix underallocation of abort_msg_s struct (bsc#1236282) |
||
glibc-devel | UNKNOWN | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:0870-1 Installed Version: 2.31-150300.46.1 Fixed Version: 2.31-150300.68.1 This update for glibc fixes the following issues: Security issues fixed: - qsort: harden handling of degenerated / non transient compare function (bsc#1218866) Other issues fixed: - getaddrinfo: translate ENOMEM to EAI_MEMORY (bsc#1217589, BZ #31163) - aarch64: correct CFI in rawmemchr (bsc#1217445, BZ #31113) |
||
go1.20 | CRITICAL | fixed |
Security update for go1.20 Vulnerability ID: SUSE-SU-2023:2526-1 Installed Version: 1.20.4-150000.1.11.1 Fixed Version: 1.20.5-150000.1.14.1 This update for go1.20 fixes the following issues: Update to go1.20.5 (bsc#1206346): - CVE-2023-29402: cmd/go: Fixed cgo code injection (bsc#1212073). - CVE-2023-29403: runtime: Fixed unexpected behavior of setuid/setgid binaries (bsc#1212074). - CVE-2023-29404: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212075). - CVE-2023-29405: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212076). |