Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WIP sign images after build #191

Open
wants to merge 1 commit into
base: trunk
Choose a base branch
from

Conversation

baksetercx
Copy link
Member

No description provided.

Copy link
Contributor

github-actions bot commented Jan 8, 2025

⚠️ Vulnerabilities detected in ghcr.io/3lvia/core/vulnerable-service:latest-cache ⚠️

Found in: ghcr.io/3lvia/core/vulnerable-service:latest-cache (debian 10.13)

glibc: stack-based buffer overflow in netgroup cache – HIGH

ID: CVE-2024-33599

Package Name: libc-bin

Installed Version: 2.28-10+deb10u3

nscd: Stack-based buffer overflow in netgroup cache

If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.

References:

glibc: stack-based buffer overflow in netgroup cache – HIGH

ID: CVE-2024-33599

Package Name: libc6

Installed Version: 2.28-10+deb10u3

nscd: Stack-based buffer overflow in netgroup cache

If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.

References:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

1 participant