ci #1541
ci.yml
on: schedule
Matrix: annotations
Matrix: image
Matrix: threshold
Annotations
12 errors, 25 warnings, and 7 notices
threshold (alpine:3.10)
2024-11-09T10:01:57Z INFO [vulndb] Need to update DB
2024-11-09T10:01:57Z INFO [vulndb] Downloading vulnerability DB...
2024-11-09T10:01:57Z INFO [vulndb] Downloading artifact... repo="ghcr.io/aquasecurity/trivy-db:2"
2024-11-09T10:01:57Z ERROR [vulndb] Failed to download artifact repo="ghcr.io/aquasecurity/trivy-db:2" err="oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:93278866a42dad8e58825611408864f09d2b2858cd9f3fe57ca07c3bf0be61ba: TOOMANYREQUESTS: retry-after: 30.368µs, allowed: 44000/minute"
2024-11-09T10:01:57Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: OCI artifact error: failed to download vulnerability DB: failed to download artifact from any source: 1 error occurred:
* oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:93278866a42dad8e58825611408864f09d2b2858cd9f3fe57ca07c3bf0be61ba: TOOMANYREQUESTS: retry-after: 30.368µs, allowed: 44000/minute
|
threshold (alpine:3.9)
Container image is unhealthy. Following your desired severity threshold (HIGH), the job has been marked as failed.
|
annotations (alpine:3.9)
CVE-2021-23840 - HIGH severity - openssl: integer overflow in CipherUpdate vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2021-3450 - HIGH severity - openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2021-23840 - HIGH severity - openssl: integer overflow in CipherUpdate vulnerability in libssl1.1
|
annotations (alpine:3.9)
CVE-2021-3450 - HIGH severity - openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT vulnerability in libssl1.1
|
threshold (moby/buildkit:master)
2024-11-09T10:02:05Z INFO [vulndb] Need to update DB
2024-11-09T10:02:05Z INFO [vulndb] Downloading vulnerability DB...
2024-11-09T10:02:05Z INFO [vulndb] Downloading artifact... repo="ghcr.io/aquasecurity/trivy-db:2"
2024-11-09T10:02:05Z ERROR [vulndb] Failed to download artifact repo="ghcr.io/aquasecurity/trivy-db:2" err="oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:93278866a42dad8e58825611408864f09d2b2858cd9f3fe57ca07c3bf0be61ba: TOOMANYREQUESTS: retry-after: 482.618µs, allowed: 44000/minute"
2024-11-09T10:02:05Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: OCI artifact error: failed to download vulnerability DB: failed to download artifact from any source: 1 error occurred:
* oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:93278866a42dad8e58825611408864f09d2b2858cd9f3fe57ca07c3bf0be61ba: TOOMANYREQUESTS: retry-after: 482.618µs, allowed: 44000/minute
|
annotations (moby/buildkit:master)
CVE-2024-34156 - HIGH severity - encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-34156 - HIGH severity - encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-34156 - HIGH severity - encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-34156 - HIGH severity - encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion vulnerability in stdlib
|
tarball
2024-11-09T10:02:01Z INFO [vulndb] Need to update DB
2024-11-09T10:02:01Z INFO [vulndb] Downloading vulnerability DB...
2024-11-09T10:02:01Z INFO [vulndb] Downloading artifact... repo="ghcr.io/aquasecurity/trivy-db:2"
2024-11-09T10:02:01Z ERROR [vulndb] Failed to download artifact repo="ghcr.io/aquasecurity/trivy-db:2" err="oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:93278866a42dad8e58825611408864f09d2b2858cd9f3fe57ca07c3bf0be61ba: TOOMANYREQUESTS: retry-after: 3.01µs, allowed: 44000/minute"
2024-11-09T10:02:01Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: OCI artifact error: failed to download vulnerability DB: failed to download artifact from any source: 1 error occurred:
* oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:93278866a42dad8e58825611408864f09d2b2858cd9f3fe57ca07c3bf0be61ba: TOOMANYREQUESTS: retry-after: 3.01µs, allowed: 44000/minute
|
annotations (alpine:latest)
Dockerfile not provided. Skipping sarif scan result.
|
threshold (alpine:3.9)
Dockerfile not provided. Skipping sarif scan result.
|
annotations (alpine:3.9)
Dockerfile not provided. Skipping sarif scan result.
|
annotations (alpine:3.9)
CVE-2020-1971 - MEDIUM severity - openssl: EDIPARTYNAME NULL pointer de-reference vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2021-23841 - MEDIUM severity - openssl: NULL pointer dereference in X509_issuer_and_serial_hash() vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2021-3449 - MEDIUM severity - openssl: NULL pointer dereference in signature_algorithms processing vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2020-1971 - MEDIUM severity - openssl: EDIPARTYNAME NULL pointer de-reference vulnerability in libssl1.1
|
annotations (alpine:3.9)
CVE-2021-23841 - MEDIUM severity - openssl: NULL pointer dereference in X509_issuer_and_serial_hash() vulnerability in libssl1.1
|
annotations (alpine:3.9)
CVE-2021-3449 - MEDIUM severity - openssl: NULL pointer dereference in signature_algorithms processing vulnerability in libssl1.1
|
annotations (alpine:3.9)
CVE-2020-28928 - MEDIUM severity - In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ... vulnerability in musl
|
annotations (alpine:3.9)
CVE-2020-28928 - MEDIUM severity - In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ... vulnerability in musl-utils
|
image (alpine:latest)
Dockerfile not provided. Skipping sarif scan result.
|
image (alpine:3.9)
Dockerfile not provided. Skipping sarif scan result.
|
annotations (moby/buildkit:master)
Dockerfile not provided. Skipping sarif scan result.
|
annotations (moby/buildkit:master)
CVE-2024-24791 - MEDIUM severity - net/http: Denial of service due to improper 100-continue handling in net/http vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-34155 - MEDIUM severity - go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-34158 - MEDIUM severity - go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-24791 - MEDIUM severity - net/http: Denial of service due to improper 100-continue handling in net/http vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-34155 - MEDIUM severity - go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-34158 - MEDIUM severity - go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-24791 - MEDIUM severity - net/http: Denial of service due to improper 100-continue handling in net/http vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-34155 - MEDIUM severity - go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion vulnerability in stdlib
|
annotations (moby/buildkit:master)
CVE-2024-34158 - MEDIUM severity - go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion vulnerability in stdlib
|
image (moby/buildkit:master)
Dockerfile not provided. Skipping sarif scan result.
|
threshold (alpine:latest)
Dockerfile not provided. Skipping sarif scan result.
|
annotations (alpine:latest)
CVE-2024-9143 - LOW severity - openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access vulnerability in libcrypto3
|
annotations (alpine:latest)
CVE-2024-9143 - LOW severity - openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access vulnerability in libssl3
|
annotations (alpine:3.9)
CVE-2021-23839 - LOW severity - openssl: incorrect SSLv2 rollback protection vulnerability in libcrypto1.1
|
annotations (alpine:3.9)
CVE-2021-23839 - LOW severity - openssl: incorrect SSLv2 rollback protection vulnerability in libssl1.1
|
annotations (moby/buildkit:master)
CVE-2024-9143 - LOW severity - openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access vulnerability in libcrypto3
|
annotations (moby/buildkit:master)
CVE-2024-9143 - LOW severity - openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access vulnerability in libssl3
|
annotations (moby/buildkit:master)
CVE-2024-51744 - LOW severity - golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt vulnerability in github.com/golang-jwt/jwt/v4
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
crazy-max~ghaction-container-scan~GTD7MG.dockerbuild
|
15.5 KB |
|
crazy-max~ghaction-container-scan~TLG9KI.dockerbuild
|
15.1 KB |
|
crazy-max~ghaction-container-scan~V5CAPM.dockerbuild
|
15.1 KB |
|
crazy-max~ghaction-container-scan~VB3WAU.dockerbuild
|
30.1 KB |
|