docker.io/flashcatcloud/categraf:v0.3.82 linux/arm64

docker.io/flashcatcloud/categraf:v0.3.82 - Trivy安全扫描结果 扫描时间: 2024-11-12 19:25 温馨提示: 这是一个 linux/arm64 系统架构镜像
全部漏洞信息
低危漏洞:3 中危漏洞:12 高危漏洞:1 严重漏洞:1

系统OS: ubuntu 23.04 扫描引擎: Trivy 扫描时间: 2024-11-12 19:25

docker.io/flashcatcloud/categraf:v0.3.82 (ubuntu 23.04) (ubuntu)
低危漏洞:2 中危漏洞:9 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libc-bin CVE-2023-5156 中危 2.37-0ubuntu2.1 2.37-0ubuntu2.2 glibc: DoS due to memory leak in getaddrinfo.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5156

镜像层: sha256:19fa6aa6d9f79cd02bbb4994b9ccc81e6f0832c9652defd05f7d608ea5a3f5e1

发布日期: 2023-09-25 16:15 修改: 2024-09-14 03:15

libc6 CVE-2023-5156 中危 2.37-0ubuntu2.1 2.37-0ubuntu2.2 glibc: DoS due to memory leak in getaddrinfo.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5156

镜像层: sha256:19fa6aa6d9f79cd02bbb4994b9ccc81e6f0832c9652defd05f7d608ea5a3f5e1

发布日期: 2023-09-25 16:15 修改: 2024-09-14 03:15

libgnutls30 CVE-2024-0553 中危 3.7.8-5ubuntu1.1 3.7.8-5ubuntu1.2 gnutls: incomplete fix for CVE-2023-5981

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553

镜像层: sha256:19fa6aa6d9f79cd02bbb4994b9ccc81e6f0832c9652defd05f7d608ea5a3f5e1

发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15

libgnutls30 CVE-2024-0567 中危 3.7.8-5ubuntu1.1 3.7.8-5ubuntu1.2 gnutls: rejects certificate chain with distributed trust

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0567

镜像层: sha256:19fa6aa6d9f79cd02bbb4994b9ccc81e6f0832c9652defd05f7d608ea5a3f5e1

发布日期: 2024-01-16 14:15 修改: 2024-09-16 13:15

libpam-modules CVE-2024-22365 中危 1.5.2-5ubuntu1 1.5.2-5ubuntu1.1 pam: allowing unprivileged user to block another user namespace

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365

镜像层: sha256:19fa6aa6d9f79cd02bbb4994b9ccc81e6f0832c9652defd05f7d608ea5a3f5e1

发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27

libpam-modules-bin CVE-2024-22365 中危 1.5.2-5ubuntu1 1.5.2-5ubuntu1.1 pam: allowing unprivileged user to block another user namespace

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365

镜像层: sha256:19fa6aa6d9f79cd02bbb4994b9ccc81e6f0832c9652defd05f7d608ea5a3f5e1

发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27

libpam-runtime CVE-2024-22365 中危 1.5.2-5ubuntu1 1.5.2-5ubuntu1.1 pam: allowing unprivileged user to block another user namespace

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365

镜像层: sha256:19fa6aa6d9f79cd02bbb4994b9ccc81e6f0832c9652defd05f7d608ea5a3f5e1

发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27

libpam0g CVE-2024-22365 中危 1.5.2-5ubuntu1 1.5.2-5ubuntu1.1 pam: allowing unprivileged user to block another user namespace

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365

镜像层: sha256:19fa6aa6d9f79cd02bbb4994b9ccc81e6f0832c9652defd05f7d608ea5a3f5e1

发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27

tar CVE-2023-39804 中危 1.34+dfsg-1.2ubuntu0.1 1.34+dfsg-1.2ubuntu0.2 tar: Incorrectly handled extension attributes in PAX archives can lead to a crash

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39804

镜像层: sha256:19fa6aa6d9f79cd02bbb4994b9ccc81e6f0832c9652defd05f7d608ea5a3f5e1

发布日期: 2024-03-27 04:15 修改: 2024-03-27 12:29

libc6 CVE-2023-4806 低危 2.37-0ubuntu2.1 2.37-0ubuntu2.2 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:19fa6aa6d9f79cd02bbb4994b9ccc81e6f0832c9652defd05f7d608ea5a3f5e1

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

libc-bin CVE-2023-4806 低危 2.37-0ubuntu2.1 2.37-0ubuntu2.2 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:19fa6aa6d9f79cd02bbb4994b9ccc81e6f0832c9652defd05f7d608ea5a3f5e1

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

usr/bin/categraf (gobinary)
低危漏洞:1 中危漏洞:3 高危漏洞:1 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
github.com/docker/docker CVE-2024-41110 严重 v24.0.9+incompatible 23.0.15, 26.1.5, 27.1.1, 25.0.6 moby: Authz zero length regression

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41110

镜像层: sha256:a56908f28adf7fe3c10399567c6d4f2fcb0f147fff0b868ce106364e37c994ab

发布日期: 2024-07-24 17:15 修改: 2024-07-30 20:15

stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:a56908f28adf7fe3c10399567c6d4f2fcb0f147fff0b868ce106364e37c994ab

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

github.com/prometheus/alertmanager CVE-2023-40577 中危 v0.24.0 0.25.1 prometheus-alertmanager: UI is vulnerable to stored XSS via the /api/v1/alerts endpoint

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40577

镜像层: sha256:a56908f28adf7fe3c10399567c6d4f2fcb0f147fff0b868ce106364e37c994ab

发布日期: 2023-08-25 01:15 修改: 2023-10-24 17:49

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:a56908f28adf7fe3c10399567c6d4f2fcb0f147fff0b868ce106364e37c994ab

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:a56908f28adf7fe3c10399567c6d4f2fcb0f147fff0b868ce106364e37c994ab

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

github.com/golang-jwt/jwt/v4 CVE-2024-51744 低危 v4.2.0 4.5.1 golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-51744

镜像层: sha256:a56908f28adf7fe3c10399567c6d4f2fcb0f147fff0b868ce106364e37c994ab

发布日期: 2024-11-04 22:15 修改: 2024-11-05 16:04