You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The following severity: CRITICAL vulnerability is being reported:
---
createTime: '2022-08-19T16:55:12.125386Z'
kind: VULNERABILITY
name: projects/gkeconfluence-gcr/locations/us/occurrences/f342fbbd-429a-47f6-90f1-b3d4ac510114
noteName: projects/goog-vulnz/notes/CVE-2005-2541
resourceUri: docker.io/library/python:3.8.13-slim-bullseye
updateTime: '2022-08-19T16:55:12.125386Z'
vulnerability:
cvssScore: 10.0
effectiveSeverity: LOW
longDescription: Tar 1.15.1 does not properly warn the user when extracting setuid
or setgid files, which may allow local users or remote attackers to gain privileges.
packageIssue:
- affectedCpeUri: cpe:/o:debian:debian_linux:11
affectedPackage: tar
affectedVersion:
fullName: 1.34+dfsg-1
kind: NORMAL
name: 1.34+dfsg
revision: '1'
effectiveSeverity: LOW
fixedCpeUri: cpe:/o:debian:debian_linux:11
fixedPackage: tar
fixedVersion:
kind: MAXIMUM
relatedUrls:
- label: More Info
url: https://security-tracker.debian.org/tracker/CVE-2005-2541
- label: More Info
url: https://nvd.nist.gov/vuln/detail/CVE-2005-2541
- label: More Info
url: https://access.redhat.com/security/cve/CVE-2005-2541
severity: CRITICAL
shortDescription: CVE-2005-2541
The text was updated successfully, but these errors were encountered:
A CVE doesn't imply having an actual vulnerability, and often is even a false positive (given how most distributions handle versioning/security updates in stable releases). If there are actionable items we can resolve, we're happy to do so (and do so actively). We update all Debian based images to include any updates in apt packages at least monthly (we regenerate the base images and then rebuild all dependent images).
Hey folks,
When running:
The following
severity: CRITICAL
vulnerability is being reported:The text was updated successfully, but these errors were encountered: