docker.io/minio/operator:v6.0.4 linux/amd64

docker.io/minio/operator:v6.0.4 - Trivy安全扫描结果 扫描时间: 2024-12-31 14:49
全部漏洞信息
低危漏洞:10 中危漏洞:0 高危漏洞:1 严重漏洞:1

系统OS: redhat 9.4 扫描引擎: Trivy 扫描时间: 2024-12-31 14:49

docker.io/minio/operator:v6.0.4 (redhat 9.4) (redhat)
低危漏洞:9 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libgcc CVE-2022-27943 低危 11.4.1-3.el9 binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943

镜像层: sha256:9917ecb8e223ecc410a27cecdf3769bbb34e35e84ba045839c375d16a7fc1476

发布日期: 2022-03-26 13:15 修改: 2023-11-07 03:45

ncurses-base CVE-2022-29458 低危 6.2-10.20210508.el9 ncurses: segfaulting OOB read

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458

镜像层: sha256:9917ecb8e223ecc410a27cecdf3769bbb34e35e84ba045839c375d16a7fc1476

发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46

ncurses-base CVE-2023-45918 低危 6.2-10.20210508.el9 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:9917ecb8e223ecc410a27cecdf3769bbb34e35e84ba045839c375d16a7fc1476

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

ncurses-base CVE-2023-50495 低危 6.2-10.20210508.el9 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:9917ecb8e223ecc410a27cecdf3769bbb34e35e84ba045839c375d16a7fc1476

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

ncurses-libs CVE-2022-29458 低危 6.2-10.20210508.el9 ncurses: segfaulting OOB read

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458

镜像层: sha256:9917ecb8e223ecc410a27cecdf3769bbb34e35e84ba045839c375d16a7fc1476

发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46

ncurses-libs CVE-2023-45918 低危 6.2-10.20210508.el9 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:9917ecb8e223ecc410a27cecdf3769bbb34e35e84ba045839c375d16a7fc1476

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

ncurses-libs CVE-2023-50495 低危 6.2-10.20210508.el9 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:9917ecb8e223ecc410a27cecdf3769bbb34e35e84ba045839c375d16a7fc1476

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

pcre2 CVE-2022-41409 低危 10.40-5.el9 pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409

镜像层: sha256:9917ecb8e223ecc410a27cecdf3769bbb34e35e84ba045839c375d16a7fc1476

发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46

pcre2-syntax CVE-2022-41409 低危 10.40-5.el9 pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409

镜像层: sha256:9917ecb8e223ecc410a27cecdf3769bbb34e35e84ba045839c375d16a7fc1476

发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46

minio-operator (gobinary)
低危漏洞:1 中危漏洞:0 高危漏洞:1 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
golang.org/x/crypto CVE-2024-45337 严重 v0.27.0 0.31.0 golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45337

镜像层: sha256:b9a521a4ecdcc4b2141323584d0972044546a422d9005ee03a6010a24ac52539

发布日期: 2024-12-12 02:02 修改: 2024-12-12 21:15

golang.org/x/net CVE-2024-45338 高危 v0.29.0 0.33.0 golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45338

镜像层: sha256:b9a521a4ecdcc4b2141323584d0972044546a422d9005ee03a6010a24ac52539

发布日期: 2024-12-18 21:15 修改: 2024-12-18 21:15

github.com/golang-jwt/jwt/v4 CVE-2024-51744 低危 v4.5.0 4.5.1 golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-51744

镜像层: sha256:b9a521a4ecdcc4b2141323584d0972044546a422d9005ee03a6010a24ac52539

发布日期: 2024-11-04 22:15 修改: 2024-11-05 16:04