Skip to content

fix(container): update image ghcr.io/k1low/tbls to v1.78.1 #1331

fix(container): update image ghcr.io/k1low/tbls to v1.78.1

fix(container): update image ghcr.io/k1low/tbls to v1.78.1 #1331

Triggered via push October 18, 2024 20:19
Status Success
Total duration 3m 46s
Artifacts 1

master.yml

on: push
Build Docker Image
3m 21s
Build Docker Image
Scan Image Vulnerability
13s
Scan Image Vulnerability
Deploy staging
12s
Deploy staging
Fit to window
Zoom out
Zoom in

Annotations

2 warnings and 9 notices
Scan Image Vulnerability
Dockerfile not provided. Skipping sarif scan result.
Scan Image Vulnerability
CVE-2024-5535 - MEDIUM severity - openssl: SSL_select_next_proto buffer overread vulnerability in libssl3
Scan Image Vulnerability
CVE-2010-4756 - LOW severity - glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions vulnerability in libc6
Scan Image Vulnerability
CVE-2018-20796 - LOW severity - glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c vulnerability in libc6
Scan Image Vulnerability
CVE-2019-1010022 - LOW severity - glibc: stack guard protection bypass vulnerability in libc6
Scan Image Vulnerability
CVE-2019-1010023 - LOW severity - glibc: running ldd on malicious ELF leads to code execution because of wrong size computation vulnerability in libc6
Scan Image Vulnerability
CVE-2019-1010024 - LOW severity - glibc: ASLR bypass using cache of thread stack and heap vulnerability in libc6
Scan Image Vulnerability
CVE-2019-1010025 - LOW severity - glibc: information disclosure of heap addresses of pthread_created thread vulnerability in libc6
Scan Image Vulnerability
CVE-2019-9192 - LOW severity - glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c vulnerability in libc6
Scan Image Vulnerability
CVE-2024-9143 - LOW severity - openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access vulnerability in libssl3
Scan Image Vulnerability
CVE-2023-36308 - LOW severity - disintegration Imaging 1.6.2 allows attackers to cause a panic (becaus ... vulnerability in github.com/disintegration/imaging

Artifacts

Produced during runtime
Name Size
traPtitech~traQ~7CBXL0.dockerbuild
77.5 KB