Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update Dockerfile #15
Update Dockerfile #15
Changes from all commits
020f31d
File filter
Filter by extension
Conversations
Jump to
There are no files selected for viewing
Check notice
Code scanning / Trivy
It was found that apt-key in apt, all versions, do not correctly valid ... Low
Check failure
Code scanning / Trivy
bash: a heap-buffer-overflow in valid_parameter_transform High
Check notice
Code scanning / Trivy
[Privilege escalation possible to other user than root] Low
Check failure
Code scanning / Trivy
util-linux: CVE-2024-28085: wall: escape sequence injection High
Check notice
Code scanning / Trivy
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline Low
Check notice
Code scanning / Trivy
coreutils: Non-privileged session can escape to the parent session in chroot Low
Check notice
Code scanning / Trivy
coreutils: race condition vulnerability in chown and chgrp Low
Check failure
Code scanning / Trivy
e2fsprogs: out-of-bounds read/write via crafted filesystem High
Check notice
Code scanning / Trivy
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 Low
Check notice
Code scanning / Trivy
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 Low
Check notice
Code scanning / Trivy
gnupg: denial of service issue (resource consumption) using compressed packets Low
Check notice
Code scanning / Trivy
It was found that apt-key in apt, all versions, do not correctly valid ... Low
Check failure
Code scanning / Trivy
util-linux: CVE-2024-28085: wall: escape sequence injection High
Check notice
Code scanning / Trivy
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline Low
Check failure
Code scanning / Trivy
glibc: buffer overflow in ld.so leading to privilege escalation High
Check failure
Code scanning / Trivy
glibc: Out of bounds write in iconv may lead to remote code execution High
Check failure
Code scanning / Trivy
glibc: stack-based buffer overflow in netgroup cache High
Check warning
Code scanning / Trivy
glibc: potential use-after-free in getaddrinfo() Medium
Check warning
Code scanning / Trivy
glibc: potential use-after-free in gaih_inet() Medium
Check warning
Code scanning / Trivy
glibc: null pointer dereferences after failed netgroup cache insertion Medium
Check warning
Code scanning / Trivy
glibc: netgroup cache may terminate daemon on memory allocation failure Medium
Check warning
Code scanning / Trivy
glibc: netgroup cache assumes NSS callback uses in-buffer strings Medium
Check notice
Code scanning / Trivy
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions Low
Check notice
Code scanning / Trivy
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c Low
Check notice
Code scanning / Trivy
glibc: stack guard protection bypass Low
Check notice
Code scanning / Trivy
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation Low
Check notice
Code scanning / Trivy
glibc: ASLR bypass using cache of thread stack and heap Low
Check notice
Code scanning / Trivy
glibc: information disclosure of heap addresses of pthread_created thread Low
Check notice
Code scanning / Trivy
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c Low
Check failure
Code scanning / Trivy
glibc: buffer overflow in ld.so leading to privilege escalation High
Check failure
Code scanning / Trivy
glibc: Out of bounds write in iconv may lead to remote code execution High
Check failure
Code scanning / Trivy
glibc: stack-based buffer overflow in netgroup cache High
Check warning
Code scanning / Trivy
glibc: potential use-after-free in getaddrinfo() Medium
Check warning
Code scanning / Trivy
glibc: potential use-after-free in gaih_inet() Medium
Check warning
Code scanning / Trivy
glibc: null pointer dereferences after failed netgroup cache insertion Medium
Check warning
Code scanning / Trivy
glibc: netgroup cache may terminate daemon on memory allocation failure Medium
Check warning
Code scanning / Trivy
glibc: netgroup cache assumes NSS callback uses in-buffer strings Medium
Check notice
Code scanning / Trivy
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions Low
Check notice
Code scanning / Trivy
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c Low
Check notice
Code scanning / Trivy
glibc: stack guard protection bypass Low
Check notice
Code scanning / Trivy
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation Low
Check notice
Code scanning / Trivy
glibc: ASLR bypass using cache of thread stack and heap Low
Check notice
Code scanning / Trivy
glibc: information disclosure of heap addresses of pthread_created thread Low
Check notice
Code scanning / Trivy
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c Low
Check failure
Code scanning / Trivy
e2fsprogs: out-of-bounds read/write via crafted filesystem High
Check failure
Code scanning / Trivy
sqlite: heap out-of-bound read in function rtreenode() Critical
Check failure
Code scanning / Trivy
e2fsprogs: out-of-bounds read/write via crafted filesystem High
Check notice
Code scanning / Trivy
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 Low
Check failure
Code scanning / Trivy
libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm High
Check warning
Code scanning / Trivy
libgcrypt: vulnerable to Marvin Attack Medium
Check notice
Code scanning / Trivy
libgcrypt: ElGamal implementation doesn't have semantic security due to incorrectly encoded plaintexts possibly allowing to obtain sensitive information Low
Check failure
Code scanning / Trivy
gnutls: timing side-channel in the TLS RSA key exchange code High
Check failure
Code scanning / Trivy
gnutls: incomplete fix for CVE-2023-5981 High
Check failure
Code scanning / Trivy
gnutls: rejects certificate chain with distributed trust High
Check warning
Code scanning / Trivy
gnutls: timing side-channel in the RSA-PSK authentication Medium
Check warning
Code scanning / Trivy
gnutls: vulnerable to Minerva side-channel information leak Medium
Check warning
Code scanning / Trivy
gnutls: potential crash during chain building/verification Medium
Check notice
Code scanning / Trivy
HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) Low
Check failure
Code scanning / Trivy
krb5: GSS message token handling Critical
Check failure
Code scanning / Trivy
krb5: GSS message token handling High
Check warning
Code scanning / Trivy
krb5: Denial of service through freeing uninitialized pointer Medium
Check notice
Code scanning / Trivy
krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c Low
Check notice
Code scanning / Trivy
krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c Low
Check notice
Code scanning / Trivy
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c Low
Check failure
Code scanning / Trivy
krb5: GSS message token handling Critical
Check failure
Code scanning / Trivy
krb5: GSS message token handling High
Check warning
Code scanning / Trivy
krb5: Denial of service through freeing uninitialized pointer Medium
Check notice
Code scanning / Trivy
krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c Low
Check notice
Code scanning / Trivy
krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c Low
Check notice
Code scanning / Trivy
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c Low
Check failure
Code scanning / Trivy
krb5: GSS message token handling Critical
Check failure
Code scanning / Trivy
krb5: GSS message token handling High
Check warning
Code scanning / Trivy
krb5: Denial of service through freeing uninitialized pointer Medium
Check notice
Code scanning / Trivy
krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c Low
Check notice
Code scanning / Trivy
krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c Low
Check notice
Code scanning / Trivy
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c Low
Check failure
Code scanning / Trivy
krb5: GSS message token handling Critical
Check failure
Code scanning / Trivy
krb5: GSS message token handling High
Check warning
Code scanning / Trivy
krb5: Denial of service through freeing uninitialized pointer Medium
Check notice
Code scanning / Trivy
krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c Low
Check notice
Code scanning / Trivy
krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c Low
Check notice
Code scanning / Trivy
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c Low
Check failure
Code scanning / Trivy
util-linux: CVE-2024-28085: wall: escape sequence injection High
Check notice
Code scanning / Trivy
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline Low
Check warning
Code scanning / Trivy
pam: allowing unprivileged user to block another user namespace Medium
Check warning
Code scanning / Trivy
pam: allowing unprivileged user to block another user namespace Medium
Check warning
Code scanning / Trivy
pam: allowing unprivileged user to block another user namespace Medium
Check warning
Code scanning / Trivy
pam: allowing unprivileged user to block another user namespace Medium
Check notice
Code scanning / Trivy
pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop Low
Check notice
Code scanning / Trivy
pcre: OP_KETRMAX feature in the match function in pcre_exec.c Low
Check notice
Code scanning / Trivy
pcre: self-recursive call in match() in pcre_exec.c leads to denial of service Low
Check notice
Code scanning / Trivy
pcre: stack-based buffer overflow write in pcre32_copy_substring Low
Check notice
Code scanning / Trivy
pcre: stack-based buffer overflow write in pcre32_copy_substring Low
Check notice
Code scanning / Trivy
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 Low
Check notice
Code scanning / Trivy
libsepol: use-after-free in __cil_verify_classperms() Low
Check notice
Code scanning / Trivy
libsepol: use-after-free in __cil_verify_classperms() Low
Check notice
Code scanning / Trivy
libsepol: use-after-free in cil_reset_classpermission() Low
Check notice
Code scanning / Trivy
libsepol: heap-based buffer overflow in ebitmap_match_any() Low
Check failure
Code scanning / Trivy
util-linux: CVE-2024-28085: wall: escape sequence injection High
Check notice
Code scanning / Trivy
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline Low