Update golang:1.22-bullseye Docker digest to 067c5c7 #277
Annotations
10 errors, 11 warnings, and 10 notices
build / build
CVE-2022-3715 - HIGH severity - bash: a heap-buffer-overflow in valid_parameter_transform vulnerability in bash
|
build / build
CVE-2022-1304 - HIGH severity - e2fsprogs: out-of-bounds read/write via crafted filesystem vulnerability in e2fsprogs
|
build / build
CVE-2022-1304 - HIGH severity - e2fsprogs: out-of-bounds read/write via crafted filesystem vulnerability in libcom-err2
|
build / build
CVE-2019-8457 - CRITICAL severity - sqlite: heap out-of-bound read in function rtreenode() vulnerability in libdb5.3
|
build / build
CVE-2022-1304 - HIGH severity - e2fsprogs: out-of-bounds read/write via crafted filesystem vulnerability in libext2fs2
|
build / build
CVE-2021-33560 - HIGH severity - libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm vulnerability in libgcrypt20
|
build / build
CVE-2024-0553 - HIGH severity - gnutls: incomplete fix for CVE-2023-5981 vulnerability in libgnutls30
|
build / build
CVE-2024-0567 - HIGH severity - gnutls: rejects certificate chain with distributed trust vulnerability in libgnutls30
|
build / build
CVE-2024-26462 - HIGH severity - krb5: Memory leak at /krb5/src/kdc/ndr.c vulnerability in libgssapi-krb5-2
|
build / build
CVE-2024-26462 - HIGH severity - krb5: Memory leak at /krb5/src/kdc/ndr.c vulnerability in libk5crypto3
|
build / build
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: actions/checkout@v3, docker/setup-qemu-action@v2, docker/setup-buildx-action@v2, docker/login-action@v2, docker/metadata-action@v4, crazy-max/ghaction-container-scan@v2. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
|
build / build
CVE-2023-4039 - MEDIUM severity - gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 vulnerability in gcc-10-base
|
build / build
CVE-2023-4039 - MEDIUM severity - gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 vulnerability in gcc-9-base
|
build / build
CVE-2023-4806 - MEDIUM severity - glibc: potential use-after-free in getaddrinfo() vulnerability in libc-bin
|
build / build
CVE-2023-4813 - MEDIUM severity - glibc: potential use-after-free in gaih_inet() vulnerability in libc-bin
|
build / build
CVE-2023-4806 - MEDIUM severity - glibc: potential use-after-free in getaddrinfo() vulnerability in libc6
|
build / build
CVE-2023-4813 - MEDIUM severity - glibc: potential use-after-free in gaih_inet() vulnerability in libc6
|
build / build
CVE-2023-4039 - MEDIUM severity - gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 vulnerability in libgcc-s1
|
build / build
CVE-2024-2236 - MEDIUM severity - libgcrypt: vulnerable to Marvin Attack vulnerability in libgcrypt20
|
build / build
CVE-2024-28834 - MEDIUM severity - gnutls: vulnerable to Minerva side-channel information leak vulnerability in libgnutls30
|
build / build
CVE-2024-28835 - MEDIUM severity - gnutls: potential crash during chain building/verification vulnerability in libgnutls30
|
build / build
CVE-2011-3374 - LOW severity - It was found that apt-key in apt, all versions, do not correctly valid ... vulnerability in apt
|
build / build
TEMP-0841856-B18BAF - LOW severity - [Privilege escalation possible to other user than root] vulnerability in bash
|
build / build
CVE-2022-0563 - LOW severity - util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline vulnerability in bsdutils
|
build / build
CVE-2016-2781 - LOW severity - coreutils: Non-privileged session can escape to the parent session in chroot vulnerability in coreutils
|
build / build
CVE-2017-18018 - LOW severity - coreutils: race condition vulnerability in chown and chgrp vulnerability in coreutils
|
build / build
CVE-2022-3219 - LOW severity - gnupg: denial of service issue (resource consumption) using compressed packets vulnerability in gpgv
|
build / build
CVE-2011-3374 - LOW severity - It was found that apt-key in apt, all versions, do not correctly valid ... vulnerability in libapt-pkg6.0
|
build / build
CVE-2022-0563 - LOW severity - util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline vulnerability in libblkid1
|
build / build
CVE-2010-4756 - LOW severity - glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions vulnerability in libc-bin
|
build / build
CVE-2018-20796 - LOW severity - glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c vulnerability in libc-bin
|