Skip to content

Update golang Docker tag to v1.22.4 #147

Update golang Docker tag to v1.22.4

Update golang Docker tag to v1.22.4 #147

Triggered via push June 14, 2024 04:51
Status Success
Total duration 3m 50s
Artifacts

build-image.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

10 errors, 11 warnings, and 10 notices
build / build
CVE-2024-28085 - HIGH severity - util-linux: CVE-2024-28085: wall: escape sequence injection vulnerability in bsdutils
build / build
CVE-2024-28085 - HIGH severity - util-linux: CVE-2024-28085: wall: escape sequence injection vulnerability in libblkid1
build / build
CVE-2023-6246 - HIGH severity - glibc: heap-based buffer overflow in __vsyslog_internal() vulnerability in libc-bin
build / build
CVE-2023-6779 - HIGH severity - glibc: off-by-one heap-based buffer overflow in __vsyslog_internal() vulnerability in libc-bin
build / build
CVE-2024-2961 - HIGH severity - glibc: Out of bounds write in iconv may lead to remote code execution vulnerability in libc-bin
build / build
CVE-2024-33599 - HIGH severity - glibc: stack-based buffer overflow in netgroup cache vulnerability in libc-bin
build / build
CVE-2023-6246 - HIGH severity - glibc: heap-based buffer overflow in __vsyslog_internal() vulnerability in libc6
build / build
CVE-2023-6779 - HIGH severity - glibc: off-by-one heap-based buffer overflow in __vsyslog_internal() vulnerability in libc6
build / build
CVE-2024-2961 - HIGH severity - glibc: Out of bounds write in iconv may lead to remote code execution vulnerability in libc6
build / build
CVE-2024-33599 - HIGH severity - glibc: stack-based buffer overflow in netgroup cache vulnerability in libc6
build / build
CVE-2011-3374 - LOW severity - It was found that apt-key in apt, all versions, do not correctly valid ... vulnerability in apt
build / build
TEMP-0841856-B18BAF - LOW severity - [Privilege escalation possible to other user than root] vulnerability in bash
build / build
CVE-2022-0563 - LOW severity - util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline vulnerability in bsdutils
build / build
CVE-2016-2781 - LOW severity - coreutils: Non-privileged session can escape to the parent session in chroot vulnerability in coreutils
build / build
CVE-2017-18018 - LOW severity - coreutils: race condition vulnerability in chown and chgrp vulnerability in coreutils
build / build
CVE-2022-27943 - LOW severity - binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const vulnerability in gcc-12-base
build / build
CVE-2022-3219 - LOW severity - gnupg: denial of service issue (resource consumption) using compressed packets vulnerability in gpgv
build / build
CVE-2011-3374 - LOW severity - It was found that apt-key in apt, all versions, do not correctly valid ... vulnerability in libapt-pkg6.0
build / build
CVE-2022-0563 - LOW severity - util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline vulnerability in libblkid1
build / build
CVE-2010-4756 - LOW severity - glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions vulnerability in libc-bin
build / build
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: actions/checkout@v3, docker/setup-qemu-action@v2, docker/setup-buildx-action@v2, docker/login-action@v2, docker/metadata-action@v4, crazy-max/ghaction-container-scan@v2. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
build / build
CVE-2023-4039 - MEDIUM severity - gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 vulnerability in gcc-12-base
build / build
CVE-2023-6780 - MEDIUM severity - glibc: integer overflow in __vsyslog_internal() vulnerability in libc-bin
build / build
CVE-2024-33600 - MEDIUM severity - glibc: null pointer dereferences after failed netgroup cache insertion vulnerability in libc-bin
build / build
CVE-2024-33601 - MEDIUM severity - glibc: netgroup cache may terminate daemon on memory allocation failure vulnerability in libc-bin
build / build
CVE-2024-33602 - MEDIUM severity - glibc: netgroup cache assumes NSS callback uses in-buffer strings vulnerability in libc-bin
build / build
CVE-2023-6780 - MEDIUM severity - glibc: integer overflow in __vsyslog_internal() vulnerability in libc6
build / build
CVE-2024-33600 - MEDIUM severity - glibc: null pointer dereferences after failed netgroup cache insertion vulnerability in libc6
build / build
CVE-2024-33601 - MEDIUM severity - glibc: netgroup cache may terminate daemon on memory allocation failure vulnerability in libc6
build / build
CVE-2024-33602 - MEDIUM severity - glibc: netgroup cache assumes NSS callback uses in-buffer strings vulnerability in libc6
build / build
CVE-2023-4039 - MEDIUM severity - gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 vulnerability in libgcc-s1