sksat/kuso-subdomain-adder

Security Alert

github-actions opened this issue · 2 comments

2022-01-30T15:03:05.688Z �[33mWARN�[0m The root command will be removed. Please migrate to 'trivy image' command. See https://github.com/aquasecurity/trivy/discussions/1515

ghcr.io/sksat/kuso-subdomain-adder:master (debian 11.2) - Trivy Report - 2022-01-30T15:03:09.257453021Z

debian
Package Vulnerability ID Severity Installed Version Fixed Version Links
libc6 CVE-2021-33574 CRITICAL 2.31-13+deb11u2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574 https://linux.oracle.com/cve/CVE-2021-33574.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
libc6 CVE-2022-23218 CRITICAL 2.31-13+deb11u2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768
libc6 CVE-2022-23219 CRITICAL 2.31-13+deb11u2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542
libc6 CVE-2021-3999 HIGH 2.31-13+deb11u2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://www.openwall.com/lists/oss-security/2022/01/24/4
sksat commented

生やしたけど別にだからといってどうしようもないな

sksat commented

前めちゃくちゃあったけどRenovate自動更新によって激減してんな