Vulnerability Scan Report for registry.suse.com/suse/postgres:14-24.27
PostgreSQL 15 container based on the SLE Base Container Image.
Last scanned on: March 12, 2025 03:21

PostgreSQL 15 container based on the SLE Base Container Image.
Last scanned on: March 12, 2025 03:21
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
libsmartcols1 | HIGH | fixed |
Security update for util-linux Vulnerability ID: SUSE-SU-2024:1169-1 Installed Version: 2.37.2-150400.8.20.1 Fixed Version: 2.37.2-150400.8.29.1 This update for util-linux fixes the following issues: - CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831) |
||
libssh-config | HIGH | fixed |
Security update for libssh Vulnerability ID: SUSE-SU-2024:0140-1 Installed Version: 0.9.6-150400.1.5 Fixed Version: 0.9.8-150400.3.3.1 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code |
||
libssh4 | HIGH | fixed |
Security update for libssh Vulnerability ID: SUSE-SU-2024:0140-1 Installed Version: 0.9.6-150400.1.5 Fixed Version: 0.9.8-150400.3.3.1 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code |
||
libtasn1 | HIGH | fixed |
Security update for libtasn1 Vulnerability ID: SUSE-SU-2025:0548-1 Installed Version: 4.13-150000.4.8.1 Fixed Version: 4.13-150000.4.11.1 This update for libtasn1 fixes the following issues: - CVE-2024-12133: the processing of input DER data containing a large number of SEQUENCE OF or SET OF elements takes quadratic time to complete. (bsc#1236878) |
||
libtasn1-6 | HIGH | fixed |
Security update for libtasn1 Vulnerability ID: SUSE-SU-2025:0548-1 Installed Version: 4.13-150000.4.8.1 Fixed Version: 4.13-150000.4.11.1 This update for libtasn1 fixes the following issues: - CVE-2024-12133: the processing of input DER data containing a large number of SEQUENCE OF or SET OF elements takes quadratic time to complete. (bsc#1236878) |