ci #1384
ci.yml
on: schedule
Matrix: annotations
Matrix: image
Matrix: threshold
Annotations
6 errors, 29 warnings, and 2 notices
threshold (alpine:3.10)
Container image is unhealthy. Following your desired severity threshold (HIGH), the job has been marked as failed.
|
threshold (alpine:3.9)
Container image is unhealthy. Following your desired severity threshold (HIGH), the job has been marked as failed.
|
annotations (alpine:3.9)
CVE-2021-23840 - HIGH severity - openssl: integer overflow in CipherUpdate vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2021-3450 - HIGH severity - openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2021-23840 - HIGH severity - openssl: integer overflow in CipherUpdate vulnerability in libssl1.1
|
annotations (alpine:3.9)
CVE-2021-3450 - HIGH severity - openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT vulnerability in libssl1.1
|
threshold (alpine:3.10)
Dockerfile not provided. Skipping sarif scan result.
|
image (alpine:3.9)
Dockerfile not provided. Skipping sarif scan result.
|
threshold (alpine:latest)
Dockerfile not provided. Skipping sarif scan result.
|
image (moby/buildkit:master)
Dockerfile not provided. Skipping sarif scan result.
|
threshold (alpine:3.9)
Dockerfile not provided. Skipping sarif scan result.
|
threshold (moby/buildkit:master)
Dockerfile not provided. Skipping sarif scan result.
|
annotations (alpine:3.9)
Dockerfile not provided. Skipping sarif scan result.
|
annotations (alpine:3.9)
CVE-2020-1971 - MEDIUM severity - openssl: EDIPARTYNAME NULL pointer de-reference vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2021-23841 - MEDIUM severity - openssl: NULL pointer dereference in X509_issuer_and_serial_hash() vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2021-3449 - MEDIUM severity - openssl: NULL pointer dereference in signature_algorithms processing vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2020-1971 - MEDIUM severity - openssl: EDIPARTYNAME NULL pointer de-reference vulnerability in libssl1.1
|
annotations (alpine:3.9)
CVE-2021-23841 - MEDIUM severity - openssl: NULL pointer dereference in X509_issuer_and_serial_hash() vulnerability in libssl1.1
|
annotations (alpine:3.9)
CVE-2021-3449 - MEDIUM severity - openssl: NULL pointer dereference in signature_algorithms processing vulnerability in libssl1.1
|
annotations (alpine:3.9)
CVE-2020-28928 - MEDIUM severity - In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ... vulnerability in musl
|
annotations (alpine:3.9)
CVE-2020-28928 - MEDIUM severity - In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ... vulnerability in musl-utils
|
annotations (alpine:latest)
Dockerfile not provided. Skipping sarif scan result.
|
annotations (alpine:latest)
CVE-2024-5535 - MEDIUM severity - openssl: SSL_select_next_proto buffer overread vulnerability in libcrypto3
|
annotations (alpine:latest)
CVE-2024-5535 - MEDIUM severity - openssl: SSL_select_next_proto buffer overread vulnerability in libssl3
|
annotations (moby/buildkit:master)
Dockerfile not provided. Skipping sarif scan result.
|
annotations (moby/buildkit:master)
CVE-2024-5535 - MEDIUM severity - openssl: SSL_select_next_proto buffer overread vulnerability in libcrypto3
|
annotations (moby/buildkit:master)
CVE-2024-5535 - MEDIUM severity - openssl: SSL_select_next_proto buffer overread vulnerability in libssl3
|
annotations (moby/buildkit:master)
CVE-2024-24791 - MEDIUM severity - net/http: Denial of service due to improper 100-continue handling in net/http vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-24791 - MEDIUM severity - net/http: Denial of service due to improper 100-continue handling in net/http vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-24791 - MEDIUM severity - net/http: Denial of service due to improper 100-continue handling in net/http vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-24791 - MEDIUM severity - net/http: Denial of service due to improper 100-continue handling in net/http vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-24786 - MEDIUM severity - golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON vulnerability in google.golang.org/protobuf
|
annotations (moby/buildkit:master)
CVE-2024-35255 - MEDIUM severity - azure-identity: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/Azure/azure-sdk-for-go/sdk/azidentity vulnerability in github.com/Azure/azure-sdk-for-go/sdk/azidentity
|
image (alpine:latest)
Dockerfile not provided. Skipping sarif scan result.
|
tarball
Dockerfile not provided. Skipping sarif scan result.
|
annotations (alpine:3.9)
CVE-2021-23839 - LOW severity - openssl: incorrect SSLv2 rollback protection vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2021-23839 - LOW severity - openssl: incorrect SSLv2 rollback protection vulnerability in libssl1.1
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
crazy-max~ghaction-container-scan~1PSBGA.dockerbuild
Expired
|
14.4 KB |
|
crazy-max~ghaction-container-scan~NKVPMT.dockerbuild
Expired
|
14.1 KB |
|
crazy-max~ghaction-container-scan~NPPZ8T.dockerbuild
Expired
|
7.03 KB |
|
crazy-max~ghaction-container-scan~V81BQ4.dockerbuild
Expired
|
14.5 KB |
|