-
Notifications
You must be signed in to change notification settings - Fork 41
v2.10.0 Security vulnerability report images
System bot edited this page Aug 31, 2024
·
71 revisions
SUBSCRIPTIONID | RESOURCEGROUP | VULNID | IDENTIFICATIONDATE | CATEGORY | CVE | CVSS | SEVERITY | DISPLAYNAME | RESOURCEID | RESOURCEID_SINGLE | AKTIV | HOST | OSDETAILS |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
- | - | CVE-2024-2398 | 2024-03-27T08:15:41.283Z | docker image audit | CVE-2024-2398 | HIGH | curl: HTTP/2 push headers memory-leak | frontend-v2.10.0 | frontend-v2.10.0 | Yes | package: curl, status: fixed, fixedVersion: 8.7.1-r0 | ||
- | - | CVE-2024-2398 | 2024-03-27T08:15:41.283Z | docker image audit | CVE-2024-2398 | HIGH | curl: HTTP/2 push headers memory-leak | blockchain-v2.10.0 | blockchain-v2.10.0 | Yes | package: curl, status: fixed, fixedVersion: 8.7.1-r0 | ||
- | - | CVE-2024-2398 | 2024-03-27T08:15:41.283Z | docker image audit | CVE-2024-2398 | HIGH | curl: HTTP/2 push headers memory-leak | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: curl, status: fixed, fixedVersion: 8.7.1-r0 | ||
- | - | CVE-2024-6197 | 2024-07-24T08:15:03.34Z | docker image audit | CVE-2024-6197 | HIGH | curl: freeing stack buffer in utf8asn1str | frontend-v2.10.0 | frontend-v2.10.0 | Yes | package: curl, status: fixed, fixedVersion: 8.9.0-r0 | ||
- | - | CVE-2024-37371 | 2024-06-28T23:15:11.603Z | docker image audit | CVE-2024-37371 | CRITICAL | krb5: GSS message token handling | api-v2.10.0 | api-v2.10.0 | Yes | package: krb5-locales, status: fixed, fixedVersion: 1.20.1-2+deb12u2 | ||
- | - | CVE-2024-37371 | 2024-06-28T23:15:11.603Z | docker image audit | CVE-2024-37371 | CRITICAL | krb5: GSS message token handling | blockchain-v2.10.0 | blockchain-v2.10.0 | Yes | package: krb5-locales, status: fixed, fixedVersion: 1.20.1-2+deb12u2 | ||
- | - | CVE-2024-37371 | 2024-06-28T23:15:11.603Z | docker image audit | CVE-2024-37371 | CRITICAL | krb5: GSS message token handling | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: krb5-locales, status: fixed, fixedVersion: 1.20.1-2+deb12u2 | ||
- | - | CVE-2024-37370 | 2024-06-28T22:15:02.293Z | docker image audit | CVE-2024-37370 | HIGH | krb5: GSS message token handling | api-v2.10.0 | api-v2.10.0 | Yes | package: krb5-locales, status: fixed, fixedVersion: 1.20.1-2+deb12u2 | ||
- | - | CVE-2024-37370 | 2024-06-28T22:15:02.293Z | docker image audit | CVE-2024-37370 | HIGH | krb5: GSS message token handling | blockchain-v2.10.0 | blockchain-v2.10.0 | Yes | package: krb5-locales, status: fixed, fixedVersion: 1.20.1-2+deb12u2 | ||
- | - | CVE-2024-37370 | 2024-06-28T22:15:02.293Z | docker image audit | CVE-2024-37370 | HIGH | krb5: GSS message token handling | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: krb5-locales, status: fixed, fixedVersion: 1.20.1-2+deb12u2 | ||
- | - | CVE-2024-5171 | 2024-06-05T20:15:13.8Z | docker image audit | CVE-2024-5171 | CRITICAL | libaom: Integer overflow in internal function img_alloc_helper | api-v2.10.0 | api-v2.10.0 | Yes | package: libaom3, status: fixed, fixedVersion: 3.6.0-1+deb12u1 | ||
- | - | CVE-2024-33599 | 2024-05-06T20:15:11.437Z | docker image audit | CVE-2024-33599 | HIGH | glibc: stack-based buffer overflow in netgroup cache | api-v2.10.0 | api-v2.10.0 | Yes | package: libc-bin, status: fixed, fixedVersion: 2.36-9+deb12u7 | ||
- | - | CVE-2024-33599 | 2024-05-06T20:15:11.437Z | docker image audit | CVE-2024-33599 | HIGH | glibc: stack-based buffer overflow in netgroup cache | blockchain-v2.10.0 | blockchain-v2.10.0 | Yes | package: libc-bin, status: fixed, fixedVersion: 2.36-9+deb12u7 | ||
- | - | CVE-2024-33599 | 2024-05-06T20:15:11.437Z | docker image audit | CVE-2024-33599 | HIGH | glibc: stack-based buffer overflow in netgroup cache | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: libc-bin, status: fixed, fixedVersion: 2.36-9+deb12u7 | ||
- | - | CVE-2023-50387 | 2024-02-14T16:15:45.3Z | docker image audit | CVE-2023-50387 | HIGH | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator | api-v2.10.0 | api-v2.10.0 | Yes | package: libsystemd0, status: fixed, fixedVersion: 252.23-1~deb12u1 | ||
- | - | CVE-2023-50387 | 2024-02-14T16:15:45.3Z | docker image audit | CVE-2023-50387 | HIGH | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator | blockchain-v2.10.0 | blockchain-v2.10.0 | Yes | package: libsystemd0, status: fixed, fixedVersion: 252.23-1~deb12u1 | ||
- | - | CVE-2023-50868 | 2024-02-14T16:15:45.377Z | docker image audit | CVE-2023-50868 | HIGH | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources | api-v2.10.0 | api-v2.10.0 | Yes | package: libsystemd0, status: fixed, fixedVersion: 252.23-1~deb12u1 | ||
- | - | CVE-2023-50868 | 2024-02-14T16:15:45.377Z | docker image audit | CVE-2023-50868 | HIGH | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources | blockchain-v2.10.0 | blockchain-v2.10.0 | Yes | package: libsystemd0, status: fixed, fixedVersion: 252.23-1~deb12u1 | ||
- | - | CVE-2023-52760 | 2024-05-21T16:15:15.41Z | docker image audit | CVE-2023-52760 | HIGH | kernel: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-26923 | 2024-04-25T06:15:57.16Z | docker image audit | CVE-2024-26923 | HIGH | kernel: af_unix: Fix garbage collector racing against connect() | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.90-1 | ||
- | - | CVE-2024-26925 | 2024-04-25T06:15:57.59Z | docker image audit | CVE-2024-26925 | HIGH | kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.90-1 | ||
- | - | CVE-2024-27018 | 2024-05-01T06:15:20.6Z | docker image audit | CVE-2024-27018 | HIGH | kernel: netfilter: br_netfilter: skip conntrack input hook for promisc packets | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.90-1 | ||
- | - | CVE-2024-27020 | 2024-05-01T06:15:20.84Z | docker image audit | CVE-2024-27020 | HIGH | kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.90-1 | ||
- | - | CVE-2024-27022 | 2024-05-01T06:15:21.11Z | docker image audit | CVE-2024-27022 | HIGH | kernel: fork: defer linking file vma until vma is fully initialized | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.90-1 | ||
- | - | CVE-2024-27397 | 2024-05-14T15:12:28.24Z | docker image audit | CVE-2024-27397 | HIGH | kernel: netfilter: nf_tables: use timestamp to check for set element timeout | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-36883 | 2024-05-30T16:15:11.9Z | docker image audit | CVE-2024-36883 | HIGH | kernel: net: fix out-of-bounds access in ops_init | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-36886 | 2024-05-30T16:15:12.15Z | docker image audit | CVE-2024-36886 | HIGH | kernel: TIPC message reassembly use-after-free remote code execution vulnerability | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-36904 | 2024-05-30T16:15:13.947Z | docker image audit | CVE-2024-36904 | HIGH | kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-36946 | 2024-05-30T16:15:17.57Z | docker image audit | CVE-2024-36946 | HIGH | kernel: phonet: fix rtm_phonet_notify() skb allocation | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-36960 | 2024-06-03T08:15:09.557Z | docker image audit | CVE-2024-36960 | HIGH | kernel: drm/vmwgfx: Fix invalid reads in fence signaled events | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-36971 | 2024-06-10T09:15:09.127Z | docker image audit | CVE-2024-36971 | HIGH | kernel: net: kernel: UAF in network route management | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-36978 | 2024-06-19T07:15:46.437Z | docker image audit | CVE-2024-36978 | HIGH | kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-36979 | 2024-06-19T14:15:13.62Z | docker image audit | CVE-2024-36979 | HIGH | kernel: net: bridge: mst: fix vlan use-after-free | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-38538 | 2024-06-19T14:15:14.107Z | docker image audit | CVE-2024-38538 | HIGH | kernel: net: bridge: xmit: make sure we have at least eth header len bytes | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-38545 | 2024-06-19T14:15:14.787Z | docker image audit | CVE-2024-38545 | HIGH | kernel: RDMA/hns: Fix UAF for cq async event | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-38552 | 2024-06-19T14:15:15.45Z | docker image audit | CVE-2024-38552 | HIGH | kernel: drm/amd/display: Fix potential index out of bounds in color transformation function | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-38555 | 2024-06-19T14:15:15.72Z | docker image audit | CVE-2024-38555 | HIGH | kernel: net/mlx5: Discard command completions in internal error | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-38561 | 2024-06-19T14:15:16.313Z | docker image audit | CVE-2024-38561 | HIGH | kernel: kunit: Fix kthread reference | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-38577 | 2024-06-19T14:15:17.787Z | docker image audit | CVE-2024-38577 | HIGH | kernel: rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-38581 | 2024-06-19T14:15:18.15Z | docker image audit | CVE-2024-38581 | HIGH | kernel: drm/amdgpu/mes: fix use-after-free issue | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-38583 | 2024-06-19T14:15:18.397Z | docker image audit | CVE-2024-38583 | HIGH | kernel: nilfs2: fix use-after-free of timer for log writer thread | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-38667 | 2024-06-24T14:15:12.79Z | docker image audit | CVE-2024-38667 | HIGH | kernel: riscv: prevent pt_regs corruption for secondary idle threads | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-39277 | 2024-06-21T12:15:11.33Z | docker image audit | CVE-2024-39277 | HIGH | kernel: dma-mapping: benchmark: handle NUMA_NO_NODE correctly | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-39463 | 2024-06-25T15:15:14.76Z | docker image audit | CVE-2024-39463 | HIGH | kernel: 9p: add missing locking around taking dentry fid list | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-39480 | 2024-07-05T07:15:10.59Z | docker image audit | CVE-2024-39480 | HIGH | kernel: kdb: Fix buffer overflow during tab-complete | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.94-1 | ||
- | - | CVE-2024-39487 | 2024-07-09T10:15:04.597Z | docker image audit | CVE-2024-39487 | HIGH | kernel: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-39494 | 2024-07-12T13:15:12.113Z | docker image audit | CVE-2024-39494 | HIGH | kernel: ima: Fix use-after-free on a dentry's dname.name | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-39495 | 2024-07-12T13:15:12.183Z | docker image audit | CVE-2024-39495 | HIGH | kernel: greybus: Fix use-after-free bug in gb_interface_release due to race condition | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-39496 | 2024-07-12T13:15:12.253Z | docker image audit | CVE-2024-39496 | HIGH | kernel: btrfs: zoned: fix use-after-free due to race with dev replace | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-39510 | 2024-07-12T13:15:13.283Z | docker image audit | CVE-2024-39510 | HIGH | kernel: cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-40899 | 2024-07-12T13:15:13.357Z | docker image audit | CVE-2024-40899 | HIGH | kernel: cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-40902 | 2024-07-12T13:15:13.583Z | docker image audit | CVE-2024-40902 | HIGH | kernel: jfs: xattr: fix buffer overflow for invalid xattr | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-40903 | 2024-07-12T13:15:13.66Z | docker image audit | CVE-2024-40903 | HIGH | kernel: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-40906 | 2024-07-12T13:15:13.92Z | docker image audit | CVE-2024-40906 | HIGH | kernel: net/mlx5: Always stop health timer during driver removal | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-40954 | 2024-07-12T13:15:17.627Z | docker image audit | CVE-2024-40954 | HIGH | kernel: net: do not leave a dangling sk pointer, when socket creation fails | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-40956 | 2024-07-12T13:15:17.76Z | docker image audit | CVE-2024-40956 | HIGH | kernel: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-40958 | 2024-07-12T13:15:17.883Z | docker image audit | CVE-2024-40958 | HIGH | kernel: netns: Make get_net_ns() handle zero refcount net | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-40994 | 2024-07-12T13:15:20.62Z | docker image audit | CVE-2024-40994 | HIGH | kernel: ptp: fix integer overflow in max_vclocks_store | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-40996 | 2024-07-12T13:15:20.74Z | docker image audit | CVE-2024-40996 | HIGH | kernel: bpf: Avoid splat in pskb_pull_reason | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-41000 | 2024-07-12T13:15:20.987Z | docker image audit | CVE-2024-41000 | HIGH | kernel: block/ioctl: prefer different overflow check | api-v2.10.0 | api-v2.10.0 | Yes | package: linux-libc-dev, status: fixed, fixedVersion: 6.1.99-1 | ||
- | - | CVE-2024-2961 | 2024-04-17T18:15:15.833Z | docker image audit | CVE-2024-2961 | HIGH | glibc: Out of bounds write in iconv may lead to remote code execution | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: libc-bin, status: fixed, fixedVersion: 2.31-13+deb11u9 | ||
- | - | CVE-2022-48622 | 2024-01-26T09:15:07.57Z | docker image audit | CVE-2022-48622 | HIGH | gnome: heap memory corruption on gdk-pixbuf | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: libgdk-pixbuf-2.0-0, status: fixed, fixedVersion: 2.42.2+dfsg-1+deb11u2 | ||
- | - | CVE-2024-0553 | 2024-01-16T12:15:45.557Z | docker image audit | CVE-2024-0553 | HIGH | gnutls: incomplete fix for CVE-2023-5981 | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: libgnutls30, status: fixed, fixedVersion: 3.7.1-5+deb11u5 | ||
- | - | CVE-2024-0567 | 2024-01-16T14:15:48.527Z | docker image audit | CVE-2024-0567 | HIGH | gnutls: rejects certificate chain with distributed trust | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: libgnutls30, status: fixed, fixedVersion: 3.7.1-5+deb11u5 | ||
- | - | CVE-2020-22218 | 2023-08-22T19:16:19.12Z | docker image audit | CVE-2020-22218 | HIGH | libssh2: use-of-uninitialized-value in _libssh2_transport_read | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: libssh2-1, status: fixed, fixedVersion: 1.9.0-2+deb11u1 | ||
- | - | CVE-2024-31080 | 2024-04-04T14:15:10.33Z | docker image audit | CVE-2024-31080 | HIGH | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: xserver-common, status: fixed, fixedVersion: 2:1.20.11-1+deb11u13 | ||
- | - | CVE-2024-31081 | 2024-04-04T14:15:10.593Z | docker image audit | CVE-2024-31081 | HIGH | xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: xserver-common, status: fixed, fixedVersion: 2:1.20.11-1+deb11u13 | ||
- | - | CVE-2024-31083 | 2024-04-05T12:15:37.577Z | docker image audit | CVE-2024-31083 | HIGH | xorg-x11-server: Use-after-free in ProcRenderAddGlyphs | e2e-test-v2.10.0 | e2e-test-v2.10.0 | Yes | package: xserver-common, status: fixed, fixedVersion: 2:1.20.11-1+deb11u13 |
Last scan date: 2024-8-31 6:28:58