Testing ghcr.io/datalens-tech/datalens-us:0.96.0... ✗ Low severity vulnerability found in vim/xxd Description: Out-of-bounds Read Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-2939667 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.16 ✗ Low severity vulnerability found in vim/xxd Description: Heap-based Buffer Overflow Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-2939763 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.16 ✗ Low severity vulnerability found in vim/xxd Description: Out-of-bounds Read Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-2940712 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.16 ✗ Low severity vulnerability found in vim/xxd Description: Use After Free Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-2940719 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.16 ✗ Low severity vulnerability found in vim/xxd Description: Out-of-bounds Read Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-2940725 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.16 ✗ Low severity vulnerability found in vim/xxd Description: Integer Overflow or Wraparound Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-2940731 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.16 ✗ Low severity vulnerability found in vim/xxd Description: Heap-based Buffer Overflow Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-2940733 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.16 ✗ Low severity vulnerability found in vim/xxd Description: NULL Pointer Dereference Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-2943683 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.16 ✗ Low severity vulnerability found in vim/xxd Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-2943866 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.16 ✗ Low severity vulnerability found in vim/xxd Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-2965919 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.17 ✗ Low severity vulnerability found in vim/xxd Description: Use After Free Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3037604 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.18 ✗ Low severity vulnerability found in vim/xxd Description: Use After Free Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3155466 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.18 ✗ Low severity vulnerability found in vim/xxd Description: Heap-based Buffer Overflow Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3156149 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.18 ✗ Low severity vulnerability found in vim/xxd Description: Use After Free Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3158783 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.18 ✗ Low severity vulnerability found in vim/xxd Description: Floating Point Comparison with Incorrect Operator Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3159009 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.18 ✗ Low severity vulnerability found in tiff/libtiff5 Description: Out-of-bounds Read Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-5417127 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in tiff/libtiff5 Description: CVE-2023-3164 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-5706843 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in tiff/libtiff5 Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-5710729 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 4.1.0+git191117-2ubuntu0.20.04.9 ✗ Low severity vulnerability found in tiff/libtiff5 Description: NULL Pointer Dereference Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-5725762 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 4.1.0+git191117-2ubuntu0.20.04.9 ✗ Low severity vulnerability found in tiff/libtiff5 Description: CVE-2023-3576 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-5775496 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in tiff/libtiff5 Description: NULL Pointer Dereference Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-577862 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in systemd/libsystemd0 Description: CVE-2023-26604 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-SYSTEMD-3339226 Introduced through: systemd/libsystemd0@245.4-4ubuntu3.21, apt@2.0.9, procps/libprocps8@2:3.3.16-1ubuntu2.3, util-linux/bsdutils@1:2.34-0.1ubuntu9.3, util-linux/mount@2.34-0.1ubuntu9.3, systemd/libudev1@245.4-4ubuntu3.21, libfido2/libfido2-1@1.3.1-1ubuntu2 From: systemd/libsystemd0@245.4-4ubuntu3.21 From: apt@2.0.9 > systemd/libsystemd0@245.4-4ubuntu3.21 From: procps/libprocps8@2:3.3.16-1ubuntu2.3 > systemd/libsystemd0@245.4-4ubuntu3.21 and 7 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in shadow/passwd Description: Arbitrary Code Injection Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-SHADOW-5425687 Introduced through: shadow/passwd@1:4.8.1-1ubuntu5.20.04.4, adduser@3.118ubuntu2, openssh/openssh-client@1:8.2p1-4ubuntu0.7, shadow/login@1:4.8.1-1ubuntu5.20.04.4, util-linux/mount@2.34-0.1ubuntu9.3 From: shadow/passwd@1:4.8.1-1ubuntu5.20.04.4 From: adduser@3.118ubuntu2 > shadow/passwd@1:4.8.1-1ubuntu5.20.04.4 From: openssh/openssh-client@1:8.2p1-4ubuntu0.7 > shadow/passwd@1:4.8.1-1ubuntu5.20.04.4 and 2 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in shadow/passwd Description: Time-of-check Time-of-use (TOCTOU) Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-SHADOW-577863 Introduced through: shadow/passwd@1:4.8.1-1ubuntu5.20.04.4, adduser@3.118ubuntu2, openssh/openssh-client@1:8.2p1-4ubuntu0.7, shadow/login@1:4.8.1-1ubuntu5.20.04.4, util-linux/mount@2.34-0.1ubuntu9.3 From: shadow/passwd@1:4.8.1-1ubuntu5.20.04.4 From: adduser@3.118ubuntu2 > shadow/passwd@1:4.8.1-1ubuntu5.20.04.4 From: openssh/openssh-client@1:8.2p1-4ubuntu0.7 > shadow/passwd@1:4.8.1-1ubuntu5.20.04.4 and 2 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in python3.8/libpython3.8-minimal Description: Open Redirect Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-PYTHON38-2993103 Introduced through: nodejs@18.16.1-deb-1nodesource1, vim@2:8.1.2269-1ubuntu5.15, python3-defaults/python3@3.8.2-0ubuntu2, python3-defaults/libpython3-stdlib@3.8.2-0ubuntu2, python3.8@3.8.10-0ubuntu1~20.04.8 From: nodejs@18.16.1-deb-1nodesource1 > python3-defaults/python3-minimal@3.8.2-0ubuntu2 > python3.8/python3.8-minimal@3.8.10-0ubuntu1~20.04.8 > python3.8/libpython3.8-minimal@3.8.10-0ubuntu1~20.04.8 From: vim@2:8.1.2269-1ubuntu5.15 > python3.8/libpython3.8@3.8.10-0ubuntu1~20.04.8 > python3.8/libpython3.8-stdlib@3.8.10-0ubuntu1~20.04.8 > python3.8/libpython3.8-minimal@3.8.10-0ubuntu1~20.04.8 From: nodejs@18.16.1-deb-1nodesource1 > python3-defaults/python3-minimal@3.8.2-0ubuntu2 > python3.8/python3.8-minimal@3.8.10-0ubuntu1~20.04.8 and 7 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in procps/libprocps8 Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-PROCPS-5816664 Introduced through: procps/libprocps8@2:3.3.16-1ubuntu2.3, procps@2:3.3.16-1ubuntu2.3 From: procps/libprocps8@2:3.3.16-1ubuntu2.3 From: procps@2:3.3.16-1ubuntu2.3 > procps/libprocps8@2:3.3.16-1ubuntu2.3 From: procps@2:3.3.16-1ubuntu2.3 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in pcre3/libpcre3 Description: Uncontrolled Recursion Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-PCRE3-580031 Introduced through: pcre3/libpcre3@2:8.39-12ubuntu0.1, grep@3.4-1, nginx@1.18.0-0ubuntu1.4 From: pcre3/libpcre3@2:8.39-12ubuntu0.1 From: grep@3.4-1 > pcre3/libpcre3@2:8.39-12ubuntu0.1 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > pcre3/libpcre3@2:8.39-12ubuntu0.1 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in patch Description: Release of Invalid Pointer or Reference Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-PATCH-2325780 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > patch@2.7.6-6 Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Low severity vulnerability found in patch Description: Double Free Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-PATCH-582546 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > patch@2.7.6-6 Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Low severity vulnerability found in openssh/openssh-client Description: Information Exposure Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-OPENSSH-1047872 Introduced through: openssh/openssh-client@1:8.2p1-4ubuntu0.7 From: openssh/openssh-client@1:8.2p1-4ubuntu0.7 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in openssh/openssh-client Description: Improper Privilege Management Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-OPENSSH-1726887 Introduced through: openssh/openssh-client@1:8.2p1-4ubuntu0.7 From: openssh/openssh-client@1:8.2p1-4ubuntu0.7 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in openldap/libldap-common Description: NULL Pointer Dereference Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-OPENLDAP-5661783 Introduced through: curl@7.68.0-1ubuntu2.18, git@1:2.25.1-1ubuntu3.11, gnupg2/gnupg@2.2.19-3ubuntu2.2, postgresql-13/postgresql-client-13@13.12-1.pgdg20.04+1 From: curl@7.68.0-1ubuntu2.18 > curl/libcurl4@7.68.0-1ubuntu2.18 > openldap/libldap-2.4-2@2.4.49+dfsg-2ubuntu1.9 > openldap/libldap-common@2.4.49+dfsg-2ubuntu1.9 From: curl@7.68.0-1ubuntu2.18 > curl/libcurl4@7.68.0-1ubuntu2.18 > openldap/libldap-2.4-2@2.4.49+dfsg-2ubuntu1.9 From: git@1:2.25.1-1ubuntu3.11 > curl/libcurl3-gnutls@7.68.0-1ubuntu2.18 > openldap/libldap-2.4-2@2.4.49+dfsg-2ubuntu1.9 and 2 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in libpng1.6/libpng16-16 Description: NULL Pointer Dereference Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-LIBPNG16-3124878 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > libpng1.6/libpng16-16@1.6.37-2 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > fontconfig/libfontconfig1@2.13.1-2ubuntu3 > freetype/libfreetype6@2.10.1-2ubuntu0.3 > libpng1.6/libpng16-16@1.6.37-2 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in libgd2/libgd3 Description: Out-of-bounds Read Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-LIBGD2-1583941 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in krb5/libkrb5support0 Description: Integer Overflow or Wraparound Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-KRB5-579303 Introduced through: curl@7.68.0-1ubuntu2.18, openssh/openssh-client@1:8.2p1-4ubuntu0.7, git@1:2.25.1-1ubuntu3.11, postgresql-13/postgresql-client-13@13.12-1.pgdg20.04+1, krb5/krb5-locales@1.17-6ubuntu4.3 From: curl@7.68.0-1ubuntu2.18 > curl/libcurl4@7.68.0-1ubuntu2.18 > krb5/libgssapi-krb5-2@1.17-6ubuntu4.3 > krb5/libkrb5support0@1.17-6ubuntu4.3 From: curl@7.68.0-1ubuntu2.18 > curl/libcurl4@7.68.0-1ubuntu2.18 > krb5/libgssapi-krb5-2@1.17-6ubuntu4.3 > krb5/libk5crypto3@1.17-6ubuntu4.3 > krb5/libkrb5support0@1.17-6ubuntu4.3 From: curl@7.68.0-1ubuntu2.18 > curl/libcurl4@7.68.0-1ubuntu2.18 > krb5/libgssapi-krb5-2@1.17-6ubuntu4.3 > krb5/libkrb5-3@1.17-6ubuntu4.3 > krb5/libkrb5support0@1.17-6ubuntu4.3 and 9 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in gnupg2/gpgv Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-GNUPG2-3035407 Introduced through: gnupg2/gpgv@2.2.19-3ubuntu2.2, apt@2.0.9, gnupg2/gnupg@2.2.19-3ubuntu2.2 From: gnupg2/gpgv@2.2.19-3ubuntu2.2 From: apt@2.0.9 > gnupg2/gpgv@2.2.19-3ubuntu2.2 From: gnupg2/gnupg@2.2.19-3ubuntu2.2 > gnupg2/gpgv@2.2.19-3ubuntu2.2 and 18 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in glibc/libc6-dev Description: Use After Free Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-GLIBC-1297554 Introduced through: build-essential@12.8ubuntu1.1, glibc/libc-bin@2.31-0ubuntu9.9, glibc/libc6@2.31-0ubuntu9.12 From: build-essential@12.8ubuntu1.1 > glibc/libc6-dev@2.31-0ubuntu9.12 From: build-essential@12.8ubuntu1.1 > gcc-defaults/g++@4:9.3.0-1ubuntu2 > gcc-9/g++-9@9.4.0-1ubuntu1~20.04.2 > gcc-9/libstdc++-9-dev@9.4.0-1ubuntu1~20.04.2 > glibc/libc6-dev@2.31-0ubuntu9.12 From: build-essential@12.8ubuntu1.1 > glibc/libc6-dev@2.31-0ubuntu9.12 > glibc/libc-dev-bin@2.31-0ubuntu9.12 and 2 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Low severity vulnerability found in glibc/libc6-dev Description: Allocation of Resources Without Limits or Throttling Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-GLIBC-2415100 Introduced through: build-essential@12.8ubuntu1.1, glibc/libc-bin@2.31-0ubuntu9.9, glibc/libc6@2.31-0ubuntu9.12 From: build-essential@12.8ubuntu1.1 > glibc/libc6-dev@2.31-0ubuntu9.12 From: build-essential@12.8ubuntu1.1 > gcc-defaults/g++@4:9.3.0-1ubuntu2 > gcc-9/g++-9@9.4.0-1ubuntu1~20.04.2 > gcc-9/libstdc++-9-dev@9.4.0-1ubuntu1~20.04.2 > glibc/libc6-dev@2.31-0ubuntu9.12 From: build-essential@12.8ubuntu1.1 > glibc/libc6-dev@2.31-0ubuntu9.12 > glibc/libc-dev-bin@2.31-0ubuntu9.12 and 2 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Low severity vulnerability found in git/git-man Description: Improper Input Validation Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-GIT-580979 Introduced through: git@1:2.25.1-1ubuntu3.11 From: git@1:2.25.1-1ubuntu3.11 > git/git-man@1:2.25.1-1ubuntu3.11 From: git@1:2.25.1-1ubuntu3.11 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in elfutils/libelf1 Description: Loop with Unreachable Exit Condition ('Infinite Loop') Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-ELFUTILS-5787881 Introduced through: iproute2@5.5.0-1ubuntu1 From: iproute2@5.5.0-1ubuntu1 > elfutils/libelf1@0.176-1.1build1 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 0.176-1.1ubuntu0.1 ✗ Low severity vulnerability found in curl/libcurl4 Description: CVE-2023-28322 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-CURL-5561922 Introduced through: curl@7.68.0-1ubuntu2.18, git@1:2.25.1-1ubuntu3.11 From: curl@7.68.0-1ubuntu2.18 > curl/libcurl4@7.68.0-1ubuntu2.18 From: curl@7.68.0-1ubuntu2.18 From: git@1:2.25.1-1ubuntu3.11 > curl/libcurl3-gnutls@7.68.0-1ubuntu2.18 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 7.68.0-1ubuntu2.19 ✗ Low severity vulnerability found in curl/libcurl4 Description: Improper Certificate Validation Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-CURL-5561950 Introduced through: curl@7.68.0-1ubuntu2.18, git@1:2.25.1-1ubuntu3.11 From: curl@7.68.0-1ubuntu2.18 > curl/libcurl4@7.68.0-1ubuntu2.18 From: curl@7.68.0-1ubuntu2.18 From: git@1:2.25.1-1ubuntu3.11 > curl/libcurl3-gnutls@7.68.0-1ubuntu2.18 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 7.68.0-1ubuntu2.19 ✗ Low severity vulnerability found in coreutils Description: Improper Input Validation Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-COREUTILS-583876 Introduced through: coreutils@8.30-3ubuntu2, nginx@1.18.0-0ubuntu1.4 From: coreutils@8.30-3ubuntu2 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > fontconfig/libfontconfig1@2.13.1-2ubuntu3 > fontconfig/fontconfig-config@2.13.1-2ubuntu3 > ucf@3.0038+nmu1 > coreutils@8.30-3ubuntu2 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Low severity vulnerability found in binutils Description: Allocation of Resources Without Limits or Throttling Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-583560 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Low severity vulnerability found in binutils Description: Improper Input Validation Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-584269 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Low severity vulnerability found in binutils Description: Resource Exhaustion Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5855066 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Low severity vulnerability found in binutils Description: Missing Release of Resource after Effective Lifetime Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-842774 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in xz-utils Description: CVE-2020-22916 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-XZUTILS-5854646 Introduced through: build-essential@12.8ubuntu1.1, xz-utils/liblzma5@5.2.4-1ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > xz-utils@5.2.4-1ubuntu1.1 From: xz-utils/liblzma5@5.2.4-1ubuntu1.1 Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in wget Description: Open Redirect Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-WGET-1278730 Introduced through: wget@1.20.3-1ubuntu2 From: wget@1.20.3-1ubuntu2 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Medium severity vulnerability found in vim/xxd Description: Use After Free Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3009094 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.17 ✗ Medium severity vulnerability found in vim/xxd Description: Use After Free Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3012805 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.17 ✗ Medium severity vulnerability found in vim/xxd Description: Use After Free Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3017233 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.17 ✗ Medium severity vulnerability found in vim/xxd Description: Use After Free Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3031935 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.18 ✗ Medium severity vulnerability found in vim/xxd Description: Heap-based Buffer Overflow Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3033761 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.18 ✗ Medium severity vulnerability found in vim/xxd Description: Stack-based Buffer Overflow Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3035260 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.18 ✗ Medium severity vulnerability found in vim/xxd Description: Out-of-Bounds Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-VIM-3087214 Introduced through: vim@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 > vim/xxd@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-common@2:8.1.2269-1ubuntu5.15 From: vim@2:8.1.2269-1ubuntu5.15 > vim/vim-runtime@2:8.1.2269-1ubuntu5.15 and 1 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:8.1.2269-1ubuntu5.18 ✗ Medium severity vulnerability found in tiff/libtiff5 Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-3249974 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 4.1.0+git191117-2ubuntu0.20.04.9 ✗ Medium severity vulnerability found in tiff/libtiff5 Description: Buffer Overflow Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-5751841 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 4.1.0+git191117-2ubuntu0.20.04.9 ✗ Medium severity vulnerability found in tiff/libtiff5 Description: Buffer Overflow Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-5752114 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 4.1.0+git191117-2ubuntu0.20.04.9 ✗ Medium severity vulnerability found in tiff/libtiff5 Description: NULL Pointer Dereference Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-5752212 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 4.1.0+git191117-2ubuntu0.20.04.9 ✗ Medium severity vulnerability found in tiff/libtiff5 Description: Buffer Overflow Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-5775783 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 4.1.0+git191117-2ubuntu0.20.04.9 ✗ Medium severity vulnerability found in tiff/libtiff5 Description: CVE-2023-38289 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-5811599 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 4.1.0+git191117-2ubuntu0.20.04.9 ✗ Medium severity vulnerability found in tiff/libtiff5 Description: CVE-2023-38288 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-TIFF-5811611 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 4.1.0+git191117-2ubuntu0.20.04.9 ✗ Medium severity vulnerability found in python3.8/libpython3.8-minimal Description: Improper Input Validation Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-PYTHON38-5438704 Introduced through: nodejs@18.16.1-deb-1nodesource1, vim@2:8.1.2269-1ubuntu5.15, python3-defaults/python3@3.8.2-0ubuntu2, python3-defaults/libpython3-stdlib@3.8.2-0ubuntu2, python3.8@3.8.10-0ubuntu1~20.04.8 From: nodejs@18.16.1-deb-1nodesource1 > python3-defaults/python3-minimal@3.8.2-0ubuntu2 > python3.8/python3.8-minimal@3.8.10-0ubuntu1~20.04.8 > python3.8/libpython3.8-minimal@3.8.10-0ubuntu1~20.04.8 From: vim@2:8.1.2269-1ubuntu5.15 > python3.8/libpython3.8@3.8.10-0ubuntu1~20.04.8 > python3.8/libpython3.8-stdlib@3.8.10-0ubuntu1~20.04.8 > python3.8/libpython3.8-minimal@3.8.10-0ubuntu1~20.04.8 From: nodejs@18.16.1-deb-1nodesource1 > python3-defaults/python3-minimal@3.8.2-0ubuntu2 > python3.8/python3.8-minimal@3.8.10-0ubuntu1~20.04.8 and 7 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Medium severity vulnerability found in openssh/openssh-client Description: Unquoted Search Path or Element Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-OPENSSH-5788088 Introduced through: openssh/openssh-client@1:8.2p1-4ubuntu0.7 From: openssh/openssh-client@1:8.2p1-4ubuntu0.7 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 1:8.2p1-4ubuntu0.8 ✗ Medium severity vulnerability found in nodejs Description: OS Command Injection Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-NODEJS-2948907 Introduced through: nodejs@18.16.1-deb-1nodesource1 From: nodejs@18.16.1-deb-1nodesource1 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Medium severity vulnerability found in nodejs Description: Untrusted Search Path Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-NODEJS-3331498 Introduced through: nodejs@18.16.1-deb-1nodesource1 From: nodejs@18.16.1-deb-1nodesource1 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Medium severity vulnerability found in nodejs Description: CVE-2023-32006 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-NODEJS-5838232 Introduced through: nodejs@18.16.1-deb-1nodesource1 From: nodejs@18.16.1-deb-1nodesource1 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Medium severity vulnerability found in nodejs Description: CVE-2023-32002 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-NODEJS-5838268 Introduced through: nodejs@18.16.1-deb-1nodesource1 From: nodejs@18.16.1-deb-1nodesource1 Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Medium severity vulnerability found in libxpm/libxpm4 Description: CVE-2023-43789 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-LIBXPM-5927301 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > libxpm/libxpm4@1:3.5.12-1ubuntu0.20.04.1 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 1:3.5.12-1ubuntu0.20.04.2 ✗ Medium severity vulnerability found in libxpm/libxpm4 Description: CVE-2023-43788 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-LIBXPM-5927401 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > libxpm/libxpm4@1:3.5.12-1ubuntu0.20.04.1 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 1:3.5.12-1ubuntu0.20.04.2 ✗ Medium severity vulnerability found in libxpm/libxpm4 Description: CVE-2023-43786 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-LIBXPM-5927422 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > libxpm/libxpm4@1:3.5.12-1ubuntu0.20.04.1 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 1:3.5.12-1ubuntu0.20.04.2 ✗ Medium severity vulnerability found in libxpm/libxpm4 Description: CVE-2023-43787 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-LIBXPM-5927446 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > libxpm/libxpm4@1:3.5.12-1ubuntu0.20.04.1 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 1:3.5.12-1ubuntu0.20.04.2 ✗ Medium severity vulnerability found in libx11/libx11-6 Description: CVE-2023-43785 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-LIBX11-5927336 Introduced through: libxext/libxext6@2:1.3.4-0ubuntu1, libxmu/libxmuu1@2:1.1.3-0ubuntu1, xauth@1:1.1-0ubuntu1, nginx@1.18.0-0ubuntu1.4 From: libxext/libxext6@2:1.3.4-0ubuntu1 > libx11/libx11-6@2:1.6.9-2ubuntu1.5 From: libxmu/libxmuu1@2:1.1.3-0ubuntu1 > libx11/libx11-6@2:1.6.9-2ubuntu1.5 From: xauth@1:1.1-0ubuntu1 > libx11/libx11-6@2:1.6.9-2ubuntu1.5 and 2 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:1.6.9-2ubuntu1.6 ✗ Medium severity vulnerability found in libx11/libx11-6 Description: CVE-2023-43786 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-LIBX11-5927421 Introduced through: libxext/libxext6@2:1.3.4-0ubuntu1, libxmu/libxmuu1@2:1.1.3-0ubuntu1, xauth@1:1.1-0ubuntu1, nginx@1.18.0-0ubuntu1.4 From: libxext/libxext6@2:1.3.4-0ubuntu1 > libx11/libx11-6@2:1.6.9-2ubuntu1.5 From: libxmu/libxmuu1@2:1.1.3-0ubuntu1 > libx11/libx11-6@2:1.6.9-2ubuntu1.5 From: xauth@1:1.1-0ubuntu1 > libx11/libx11-6@2:1.6.9-2ubuntu1.5 and 2 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:1.6.9-2ubuntu1.6 ✗ Medium severity vulnerability found in libx11/libx11-6 Description: CVE-2023-43787 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-LIBX11-5927445 Introduced through: libxext/libxext6@2:1.3.4-0ubuntu1, libxmu/libxmuu1@2:1.1.3-0ubuntu1, xauth@1:1.1-0ubuntu1, nginx@1.18.0-0ubuntu1.4 From: libxext/libxext6@2:1.3.4-0ubuntu1 > libx11/libx11-6@2:1.6.9-2ubuntu1.5 From: libxmu/libxmuu1@2:1.1.3-0ubuntu1 > libx11/libx11-6@2:1.6.9-2ubuntu1.5 From: xauth@1:1.1-0ubuntu1 > libx11/libx11-6@2:1.6.9-2ubuntu1.5 and 2 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 2:1.6.9-2ubuntu1.6 ✗ Medium severity vulnerability found in libwebp/libwebp6 Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-LIBWEBP-5893523 Introduced through: nginx@1.18.0-0ubuntu1.4 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > libwebp/libwebp6@0.6.1-2ubuntu0.20.04.2 From: nginx@1.18.0-0ubuntu1.4 > nginx/nginx-core@1.18.0-0ubuntu1.4 > nginx/libnginx-mod-http-image-filter@1.18.0-0ubuntu1.4 > libgd2/libgd3@2.2.5-5.2ubuntu2.1 > tiff/libtiff5@4.1.0+git191117-2ubuntu0.20.04.8 > libwebp/libwebp6@0.6.1-2ubuntu0.20.04.2 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 0.6.1-2ubuntu0.20.04.3 ✗ Medium severity vulnerability found in krb5/libkrb5support0 Description: Access of Uninitialized Pointer Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-KRB5-5838334 Introduced through: curl@7.68.0-1ubuntu2.18, openssh/openssh-client@1:8.2p1-4ubuntu0.7, git@1:2.25.1-1ubuntu3.11, postgresql-13/postgresql-client-13@13.12-1.pgdg20.04+1, krb5/krb5-locales@1.17-6ubuntu4.3 From: curl@7.68.0-1ubuntu2.18 > curl/libcurl4@7.68.0-1ubuntu2.18 > krb5/libgssapi-krb5-2@1.17-6ubuntu4.3 > krb5/libkrb5support0@1.17-6ubuntu4.3 From: curl@7.68.0-1ubuntu2.18 > curl/libcurl4@7.68.0-1ubuntu2.18 > krb5/libgssapi-krb5-2@1.17-6ubuntu4.3 > krb5/libk5crypto3@1.17-6ubuntu4.3 > krb5/libkrb5support0@1.17-6ubuntu4.3 From: curl@7.68.0-1ubuntu2.18 > curl/libcurl4@7.68.0-1ubuntu2.18 > krb5/libgssapi-krb5-2@1.17-6ubuntu4.3 > krb5/libkrb5-3@1.17-6ubuntu4.3 > krb5/libkrb5support0@1.17-6ubuntu4.3 and 9 more... Image layer: Introduced by your base image (ubuntu:focal-20230605) ✗ Medium severity vulnerability found in gcc-defaults/cpp Description: Information Exposure Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-GCCDEFAULTS-584255 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > gcc-defaults/g++@4:9.3.0-1ubuntu2 > gcc-defaults/cpp@4:9.3.0-1ubuntu2 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-defaults/cpp@4:9.3.0-1ubuntu2 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 and 2 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in elfutils/libelf1 Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-ELFUTILS-5855109 Introduced through: iproute2@5.5.0-1ubuntu1 From: iproute2@5.5.0-1ubuntu1 > elfutils/libelf1@0.176-1.1build1 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 0.176-1.1ubuntu0.1 ✗ Medium severity vulnerability found in binutils Description: Memory Leak Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5853806 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: Memory Leak Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5853888 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: NULL Pointer Dereference Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5853914 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5853950 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: CVE-2020-19726 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5853956 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: Resource Exhaustion Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5854022 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5854124 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: Reachable Assertion Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5854226 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: Memory Leak Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5854249 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: Memory Leak Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5854280 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: CVE-2022-47695 Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5854400 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5854784 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ✗ Medium severity vulnerability found in binutils Description: Memory Leak Info: https://security.snyk.io/vuln/SNYK-UBUNTU2004-BINUTILS-5855102 Introduced through: build-essential@12.8ubuntu1.1 From: build-essential@12.8ubuntu1.1 > dpkg/dpkg-dev@1.19.7ubuntu3.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 From: build-essential@12.8ubuntu1.1 > gcc-defaults/gcc@4:9.3.0-1ubuntu2 > gcc-9@9.4.0-1ubuntu1~20.04.2 > binutils@2.34-6ubuntu1.6 > binutils/binutils-common@2.34-6ubuntu1.6 and 8 more... Image layer: 'apt-get install -y postgresql-client-13 build-essential' ------------ Detected 3 vulnerabilities for node@18.16.1 ------------ ✗ Medium severity vulnerability found in node Description: Improper Access Control Info: https://security.snyk.io/vuln/SNYK-UPSTREAM-NODE-5843454 Introduced through: node@18.16.1 From: node@18.16.1 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 18.17.1 ✗ Medium severity vulnerability found in node Description: Access Restriction Bypass Info: https://security.snyk.io/vuln/SNYK-UPSTREAM-NODE-5848030 Introduced through: node@18.16.1 From: node@18.16.1 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 18.17.1 ✗ High severity vulnerability found in node Description: Arbitrary Code Injection Info: https://security.snyk.io/vuln/SNYK-UPSTREAM-NODE-5848038 Introduced through: node@18.16.1 From: node@18.16.1 Image layer: Introduced by your base image (ubuntu:focal-20230605) Fixed in: 18.17.1 Organization: pawelkosykh Package manager: deb Project name: docker-image|ghcr.io/datalens-tech/datalens-us Docker image: ghcr.io/datalens-tech/datalens-us:0.96.0 Platform: linux/amd64 Base image: ubuntu:focal-20230605 Licenses: enabled Tested 283 dependencies for known issues, found 96 issues. According to our scan, you are currently using the most secure version of the selected base image Learn more: https://docs.snyk.io/products/snyk-container/getting-around-the-snyk-container-ui/base-image-detection ------------------------------------------------------- Testing ghcr.io/datalens-tech/datalens-us:0.96.0... Organization: pawelkosykh Package manager: npm Target file: /opt/app/package.json Project name: @datalens-tech/datalens-us Docker image: ghcr.io/datalens-tech/datalens-us:0.96.0 Licenses: enabled ✔ Tested 15 dependencies for known issues, no vulnerable paths found. Tested 2 projects, 1 contained vulnerable paths.