Vulnerability Scan Report for registry.suse.com/suse/postgres:14-22.66
PostgreSQL 14 container based on the SLE Base Container Image.
Last scanned on: December 09, 2024 20:13
PostgreSQL 14 container based on the SLE Base Container Image.
Last scanned on: December 09, 2024 20:13
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
postgresql14-server | HIGH | fixed |
Security update for postgresql14 Vulnerability ID: SUSE-SU-2024:0552-1 Installed Version: 14.9-150200.5.29.1 Fixed Version: 14.11-150200.5.39.1 This update for postgresql14 fixes the following issues: Upgrade to 14.11: - CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). |
||
postgresql14-server | HIGH | fixed |
Security update for postgresql16 Vulnerability ID: SUSE-SU-2024:3169-1 Installed Version: 14.9-150200.5.29.1 Fixed Version: 14.13-150200.5.47.1 This update for postgresql16 fixes the following issues: - Upgrade to 14.13 (bsc#1229013) - CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes arbitrary SQL. (bsc#1229013) |
||
postgresql14-server | HIGH | fixed |
Security update for postgresql14 Vulnerability ID: SUSE-SU-2024:4176-1 Installed Version: 14.9-150200.5.29.1 Fixed Version: 14.15-150200.5.50.1 This update for postgresql14 fixes the following issues: - CVE-2024-10976: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (bsc#1233323). - CVE-2024-10977: Make libpq discard error messages received during SSL or GSS protocol negotiation (bsc#1233325). - CVE-2024-10978: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (bsc#1233326). - CVE-2024-10979: Prevent trusted PL/Perl code from changing environment variables (bsc#1233327). |
||
rpm-ndb | MEDIUM | fixed |
Security update for rpm Vulnerability ID: SUSE-SU-2024:1557-1 Installed Version: 4.14.3-150300.55.1 Fixed Version: 4.14.3-150400.59.16.1 This update for rpm fixes the following issues: Security fixes: - CVE-2021-3521: Fixed missing subkey binding signature checking (bsc#1191175) Other fixes: - accept more signature subpackets marked as critical (bsc#1218686) - backport limit support for the autopatch macro (bsc#1189495) |
||
shadow | MEDIUM | fixed |
Security update for shadow Vulnerability ID: SUSE-SU-2024:2658-1 Installed Version: 4.8.1-150400.10.9.1 Fixed Version: 4.8.1-150400.10.18.1 This update for shadow fixes the following issues: - CVE-2013-4235: Fixed a race condition when copying and removing directory trees (bsc#916845). |