Skip to content

Merge pull request #47 from pascaliske/renovate/alpine-3.x #132

Merge pull request #47 from pascaliske/renovate/alpine-3.x

Merge pull request #47 from pascaliske/renovate/alpine-3.x #132

Triggered via push December 6, 2024 05:36
Status Success
Total duration 1m 12s
Artifacts 1

image.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

10 errors, 15 warnings, and 8 notices
Scan
CVE-2022-3094 - HIGH severity - bind: flooding with UPDATE requests may lead to DoS vulnerability in bind-libs
Scan
CVE-2022-3736 - HIGH severity - bind: sending specific queries to the resolver may cause a DoS vulnerability in bind-libs
Scan
CVE-2022-3924 - HIGH severity - bind: sending specific queries to the resolver may cause a DoS vulnerability in bind-libs
Scan
CVE-2023-3341 - HIGH severity - bind: stack exhaustion in control channel code may lead to DoS vulnerability in bind-libs
Scan
CVE-2023-4236 - HIGH severity - bind: an assertion failure may lead to DoS vulnerability in bind-libs
Scan
CVE-2023-4408 - HIGH severity - bind9: Parsing large DNS messages may cause excessive CPU load vulnerability in bind-libs
Scan
CVE-2023-50387 - HIGH severity - bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator vulnerability in bind-libs
Scan
CVE-2023-50868 - HIGH severity - bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources vulnerability in bind-libs
Scan
CVE-2023-5517 - HIGH severity - bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled vulnerability in bind-libs
Scan
CVE-2023-5679 - HIGH severity - bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution vulnerability in bind-libs
Scan
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Scan
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
Scan
CVE-2023-5680 - MEDIUM severity - bind9: Cleaning an ECS-enabled cache may cause excessive CPU load vulnerability in bind-libs
Scan
CVE-2023-5680 - MEDIUM severity - bind9: Cleaning an ECS-enabled cache may cause excessive CPU load vulnerability in bind-tools
Scan
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in busybox
Scan
CVE-2023-42364 - MEDIUM severity - busybox: use-after-free vulnerability in busybox
Scan
CVE-2023-42365 - MEDIUM severity - busybox: use-after-free vulnerability in busybox
Scan
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in busybox
Scan
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in busybox-binsh
Scan
CVE-2023-42364 - MEDIUM severity - busybox: use-after-free vulnerability in busybox-binsh
Scan
CVE-2023-42365 - MEDIUM severity - busybox: use-after-free vulnerability in busybox-binsh
Scan
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in busybox-binsh
Build
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Build
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
The 'as' keyword should match the case of the 'from' keyword: Dockerfile#L2
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
Scan
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libcrypto3
Scan
CVE-2024-9143 - LOW severity - openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access vulnerability in libcrypto3
Scan
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libssl3
Scan
CVE-2024-9143 - LOW severity - openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access vulnerability in libssl3
Scan
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in openssl
Scan
CVE-2024-9143 - LOW severity - openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access vulnerability in openssl
Scan
CVE-2024-33655 - LOW severity - unbound: DNSBomb vulnerability vulnerability in unbound
Scan
CVE-2024-33655 - LOW severity - unbound: DNSBomb vulnerability vulnerability in unbound-libs

Artifacts

Produced during runtime
Name Size
pascaliske~docker-unbound~KJYO6T.dockerbuild
109 KB