Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security Alert #1

Closed
github-actions bot opened this issue Nov 16, 2021 · 1 comment
Closed

Security Alert #1

github-actions bot opened this issue Nov 16, 2021 · 1 comment

Comments

@github-actions
Copy link

docker.io/piii/java-hello-world:5ef3eb29895b8f886d993dae8c9b81cc4c70353e (debian 11.1) - Trivy Report - 2021-11-16T08:07:25.622764168Z

debian
Package Vulnerability ID Severity Installed Version Fixed Version Links
curl CVE-2021-22945 CRITICAL 7.74.0-1.3 https://curl.se/docs/CVE-2021-22945.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945 https://hackerone.com/reports/1269242 https://lists.fedoraproject.org/archives/list/[email protected]/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://security.netapp.com/advisory/ntap-20211029-0003/ https://ubuntu.com/security/notices/USN-5079-1 https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22946 HIGH 7.74.0-1.3 https://curl.se/docs/CVE-2021-22946.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946 https://hackerone.com/reports/1334111 https://linux.oracle.com/cve/CVE-2021-22946.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/[email protected]/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://security.netapp.com/advisory/ntap-20211029-0003/ https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://www.oracle.com/security-alerts/cpuoct2021.html
libc-bin CVE-2021-33574 CRITICAL 2.31-13+deb11u2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574 https://lists.fedoraproject.org/archives/list/[email protected]/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc-bin CVE-2021-43396 HIGH 2.31-13+deb11u2 https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396 https://sourceware.org/bugzilla/show_bug.cgi?id=28524 https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
libc6 CVE-2021-33574 CRITICAL 2.31-13+deb11u2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574 https://lists.fedoraproject.org/archives/list/[email protected]/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc6 CVE-2021-43396 HIGH 2.31-13+deb11u2 https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396 https://sourceware.org/bugzilla/show_bug.cgi?id=28524 https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
libcurl3-gnutls CVE-2021-22945 CRITICAL 7.74.0-1.3 https://curl.se/docs/CVE-2021-22945.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945 https://hackerone.com/reports/1269242 https://lists.fedoraproject.org/archives/list/[email protected]/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://security.netapp.com/advisory/ntap-20211029-0003/ https://ubuntu.com/security/notices/USN-5079-1 https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl3-gnutls CVE-2021-22946 HIGH 7.74.0-1.3 https://curl.se/docs/CVE-2021-22946.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946 https://hackerone.com/reports/1334111 https://linux.oracle.com/cve/CVE-2021-22946.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/[email protected]/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://security.netapp.com/advisory/ntap-20211029-0003/ https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2021-22945 CRITICAL 7.74.0-1.3 https://curl.se/docs/CVE-2021-22945.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945 https://hackerone.com/reports/1269242 https://lists.fedoraproject.org/archives/list/[email protected]/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://security.netapp.com/advisory/ntap-20211029-0003/ https://ubuntu.com/security/notices/USN-5079-1 https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2021-22946 HIGH 7.74.0-1.3 https://curl.se/docs/CVE-2021-22946.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946 https://hackerone.com/reports/1334111 https://linux.oracle.com/cve/CVE-2021-22946.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/[email protected]/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://security.netapp.com/advisory/ntap-20211029-0003/ https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://www.oracle.com/security-alerts/cpuoct2021.html
libpython3.9-minimal CVE-2021-29921 CRITICAL 3.9.2-1 https://bugs.python.org/issue36384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921 https://docs.python.org/3/library/ipaddress.html https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst python/cpython#12577 python/cpython#25099 https://github.com/sickcodes https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html https://security.netapp.com/advisory/ntap-20210622-0003/ https://sick.codes/sick-2021-014 https://ubuntu.com/security/notices/USN-4973-1 https://ubuntu.com/security/notices/USN-4973-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuoct2021.html
libpython3.9-stdlib CVE-2021-29921 CRITICAL 3.9.2-1 https://bugs.python.org/issue36384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921 https://docs.python.org/3/library/ipaddress.html https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst python/cpython#12577 python/cpython#25099 https://github.com/sickcodes https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html https://security.netapp.com/advisory/ntap-20210622-0003/ https://sick.codes/sick-2021-014 https://ubuntu.com/security/notices/USN-4973-1 https://ubuntu.com/security/notices/USN-4973-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuoct2021.html
openssh-client CVE-2021-41617 HIGH 1:8.4p1-5 https://bugzilla.suse.com/show_bug.cgi?id=1190975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617 https://lists.fedoraproject.org/archives/list/[email protected]/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ https://lists.fedoraproject.org/archives/list/[email protected]/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ https://lists.fedoraproject.org/archives/list/[email protected]/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ https://security.netapp.com/advisory/ntap-20211014-0004/ https://www.openssh.com/security.html https://www.openssh.com/txt/release-8.8 https://www.openwall.com/lists/oss-security/2021/09/26/1
python3.9 CVE-2021-29921 CRITICAL 3.9.2-1 https://bugs.python.org/issue36384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921 https://docs.python.org/3/library/ipaddress.html https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst python/cpython#12577 python/cpython#25099 https://github.com/sickcodes https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html https://security.netapp.com/advisory/ntap-20210622-0003/ https://sick.codes/sick-2021-014 https://ubuntu.com/security/notices/USN-4973-1 https://ubuntu.com/security/notices/USN-4973-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuoct2021.html
python3.9-minimal CVE-2021-29921 CRITICAL 3.9.2-1 https://bugs.python.org/issue36384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921 https://docs.python.org/3/library/ipaddress.html https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst python/cpython#12577 python/cpython#25099 https://github.com/sickcodes https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html https://security.netapp.com/advisory/ntap-20210622-0003/ https://sick.codes/sick-2021-014 https://ubuntu.com/security/notices/USN-4973-1 https://ubuntu.com/security/notices/USN-4973-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuoct2021.html
jar
No Vulnerabilities found
@pisineen
Copy link
Owner

test

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant