Vulnerability Scan Report for registry.suse.com/suse/postgres:14-24.9
PostgreSQL 14 container based on the SLE Base Container Image.
Last scanned on: December 08, 2024 12:41
PostgreSQL 14 container based on the SLE Base Container Image.
Last scanned on: December 08, 2024 12:41
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
libsmartcols1 | HIGH | fixed |
Security update for util-linux Vulnerability ID: SUSE-SU-2024:1169-1 Installed Version: 2.37.2-150400.8.20.1 Fixed Version: 2.37.2-150400.8.29.1 This update for util-linux fixes the following issues: - CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831) |
||
libsqlite3-0 | HIGH | fixed |
Security update for sqlite3 Vulnerability ID: SUSE-SU-2023:4619-1 Installed Version: 3.39.3-150000.3.20.1 Fixed Version: 3.44.0-150000.3.23.1 This update for sqlite3 fixes the following issues: - CVE-2023-2137: Fixed heap buffer overflow (bsc#1210660). |
||
libssh-config | HIGH | fixed |
Security update for libssh Vulnerability ID: SUSE-SU-2024:0140-1 Installed Version: 0.9.6-150400.1.5 Fixed Version: 0.9.8-150400.3.3.1 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code |
||
libssh4 | HIGH | fixed |
Security update for libssh Vulnerability ID: SUSE-SU-2024:0140-1 Installed Version: 0.9.6-150400.1.5 Fixed Version: 0.9.8-150400.3.3.1 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code |
||
libuuid1 | HIGH | fixed |
Security update for util-linux Vulnerability ID: SUSE-SU-2024:1169-1 Installed Version: 2.37.2-150400.8.20.1 Fixed Version: 2.37.2-150400.8.29.1 This update for util-linux fixes the following issues: - CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831) |