ghcr.io/k8snetworkplumbingwg/multus-cni:snapshot linux/amd64

ghcr.io/k8snetworkplumbingwg/multus-cni:snapshot - Trivy安全扫描结果 扫描时间: 2024-11-11 17:13
全部漏洞信息
低危漏洞:7 中危漏洞:24 高危漏洞:11 严重漏洞:0

系统OS: debian 11.10 扫描引擎: Trivy 扫描时间: 2024-11-11 17:13

ghcr.io/k8snetworkplumbingwg/multus-cni:snapshot (debian 11.10) (debian)
低危漏洞:7 中危漏洞:2 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libc6 CVE-2023-4806 中危 2.31-13+deb11u10 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:8451c71f8c1e6674db22f6f55f1360dab6bf5afb43a76e95813fad65566a33fc

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

libc6 CVE-2023-4813 中危 2.31-13+deb11u10 glibc: potential use-after-free in gaih_inet()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813

镜像层: sha256:8451c71f8c1e6674db22f6f55f1360dab6bf5afb43a76e95813fad65566a33fc

发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15

libc6 CVE-2010-4756 低危 2.31-13+deb11u10 glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions

漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756

镜像层: sha256:8451c71f8c1e6674db22f6f55f1360dab6bf5afb43a76e95813fad65566a33fc

发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15

libc6 CVE-2018-20796 低危 2.31-13+deb11u10 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796

镜像层: sha256:8451c71f8c1e6674db22f6f55f1360dab6bf5afb43a76e95813fad65566a33fc

发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56

libc6 CVE-2019-1010022 低危 2.31-13+deb11u10 glibc: stack guard protection bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022

镜像层: sha256:8451c71f8c1e6674db22f6f55f1360dab6bf5afb43a76e95813fad65566a33fc

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc6 CVE-2019-1010023 低危 2.31-13+deb11u10 glibc: running ldd on malicious ELF leads to code execution because of wrong size computation

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023

镜像层: sha256:8451c71f8c1e6674db22f6f55f1360dab6bf5afb43a76e95813fad65566a33fc

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc6 CVE-2019-1010024 低危 2.31-13+deb11u10 glibc: ASLR bypass using cache of thread stack and heap

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024

镜像层: sha256:8451c71f8c1e6674db22f6f55f1360dab6bf5afb43a76e95813fad65566a33fc

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc6 CVE-2019-1010025 低危 2.31-13+deb11u10 glibc: information disclosure of heap addresses of pthread_created thread

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025

镜像层: sha256:8451c71f8c1e6674db22f6f55f1360dab6bf5afb43a76e95813fad65566a33fc

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc6 CVE-2019-9192 低危 2.31-13+deb11u10 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192

镜像层: sha256:8451c71f8c1e6674db22f6f55f1360dab6bf5afb43a76e95813fad65566a33fc

发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15

libssl1.1 DLA-3942-2 未知 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl - regression update

漏洞详情:

镜像层: sha256:24aacbf97031b87ad5f19cca54239e982f5f02277dabbfca5c6aafda47257801

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

openssl DLA-3942-2 未知 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl - regression update

漏洞详情:

镜像层: sha256:6835249f577a022181beee33e1f411f8368788ab8805b4c43aed61fbd7efcc9d

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

cert-approver (gobinary)
低危漏洞:0 中危漏洞:2 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:635dacae314b87db296bd62928810962fc087fa8207f6c4accf141614e49f0f0

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:635dacae314b87db296bd62928810962fc087fa8207f6c4accf141614e49f0f0

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:635dacae314b87db296bd62928810962fc087fa8207f6c4accf141614e49f0f0

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

install_multus (gobinary)
低危漏洞:0 中危漏洞:2 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:1a4749516368d7502c06de156310e5a77b47fb4586af39d07c4cf4801a0dd7e7

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:1a4749516368d7502c06de156310e5a77b47fb4586af39d07c4cf4801a0dd7e7

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:1a4749516368d7502c06de156310e5a77b47fb4586af39d07c4cf4801a0dd7e7

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

kubeconfig_generator (gobinary)
低危漏洞:0 中危漏洞:2 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:1e3f92266fe26bf52d3bdc786ec4139eae02a6b85ab241970d777af4bdca717f

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:1e3f92266fe26bf52d3bdc786ec4139eae02a6b85ab241970d777af4bdca717f

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:1e3f92266fe26bf52d3bdc786ec4139eae02a6b85ab241970d777af4bdca717f

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

thin_entrypoint (gobinary)
低危漏洞:0 中危漏洞:2 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:0e5d264a172b01ad8aed64434417261d74ff106eec73e03b8d8297f52d36a2a7

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:0e5d264a172b01ad8aed64434417261d74ff106eec73e03b8d8297f52d36a2a7

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:0e5d264a172b01ad8aed64434417261d74ff106eec73e03b8d8297f52d36a2a7

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

usr/src/multus-cni/bin/cert-approver (gobinary)
低危漏洞:0 中危漏洞:2 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

usr/src/multus-cni/bin/install_multus (gobinary)
低危漏洞:0 中危漏洞:2 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

usr/src/multus-cni/bin/kubeconfig_generator (gobinary)
低危漏洞:0 中危漏洞:2 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

usr/src/multus-cni/bin/multus (gobinary)
低危漏洞:0 中危漏洞:2 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

usr/src/multus-cni/bin/multus-daemon (gobinary)
低危漏洞:0 中危漏洞:2 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

usr/src/multus-cni/bin/multus-shim (gobinary)
低危漏洞:0 中危漏洞:2 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

usr/src/multus-cni/bin/thin_entrypoint (gobinary)
低危漏洞:0 中危漏洞:2 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-34156 高危 1.21.13 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

stdlib CVE-2024-34155 中危 1.21.13 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.21.13 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:c302d951902c4044b7b6c3abcb5b217e7a1261b0eed7283b54b1a08ccaabca08

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35