fix(container): update image golang to v1.23.4 #1369
Annotations
4 warnings and 9 notices
Build Docker Image
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Scan Image Vulnerability
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Scan Image Vulnerability
Dockerfile not provided. Skipping sarif scan result.
|
Deploy staging
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Scan Image Vulnerability
CVE-2010-4756 - LOW severity - glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions vulnerability in libc6
|
Scan Image Vulnerability
CVE-2018-20796 - LOW severity - glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c vulnerability in libc6
|
Scan Image Vulnerability
CVE-2019-1010022 - LOW severity - glibc: stack guard protection bypass vulnerability in libc6
|
Scan Image Vulnerability
CVE-2019-1010023 - LOW severity - glibc: running ldd on malicious ELF leads to code execution because of wrong size computation vulnerability in libc6
|
Scan Image Vulnerability
CVE-2019-1010024 - LOW severity - glibc: ASLR bypass using cache of thread stack and heap vulnerability in libc6
|
Scan Image Vulnerability
CVE-2019-1010025 - LOW severity - glibc: information disclosure of heap addresses of pthread_created thread vulnerability in libc6
|
Scan Image Vulnerability
CVE-2019-9192 - LOW severity - glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c vulnerability in libc6
|
Scan Image Vulnerability
CVE-2023-36308 - LOW severity - disintegration Imaging 1.6.2 allows attackers to cause a panic (becaus ... vulnerability in github.com/disintegration/imaging
|
Scan Image Vulnerability
CVE-2024-51744 - LOW severity - golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt vulnerability in github.com/golang-jwt/jwt/v4
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
traPtitech~traQ~L2TMM1.dockerbuild
|
78 KB |
|