Skip to content

chore(deps): update docker/build-push-action action to v6 #127

chore(deps): update docker/build-push-action action to v6

chore(deps): update docker/build-push-action action to v6 #127

Triggered via pull request June 17, 2024 10:03
Status Success
Total duration 49s
Artifacts 1

image.yml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

10 errors, 12 warnings, and 5 notices
Scan
CVE-2022-3094 - HIGH severity - bind: flooding with UPDATE requests may lead to DoS vulnerability in bind-libs
Scan
CVE-2022-3736 - HIGH severity - bind: sending specific queries to the resolver may cause a DoS vulnerability in bind-libs
Scan
CVE-2022-3924 - HIGH severity - bind: sending specific queries to the resolver may cause a DoS vulnerability in bind-libs
Scan
CVE-2023-3341 - HIGH severity - bind: stack exhaustion in control channel code may lead to DoS vulnerability in bind-libs
Scan
CVE-2023-4236 - HIGH severity - bind: an assertion failure may lead to DoS vulnerability in bind-libs
Scan
CVE-2023-4408 - HIGH severity - bind9: Parsing large DNS messages may cause excessive CPU load vulnerability in bind-libs
Scan
CVE-2023-50387 - HIGH severity - bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator vulnerability in bind-libs
Scan
CVE-2023-50868 - HIGH severity - bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources vulnerability in bind-libs
Scan
CVE-2023-5517 - HIGH severity - bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled vulnerability in bind-libs
Scan
CVE-2023-5679 - HIGH severity - bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution vulnerability in bind-libs
Scan
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
Scan
CVE-2023-5680 - MEDIUM severity - bind9: Cleaning an ECS-enabled cache may cause excessive CPU load vulnerability in bind-libs
Scan
CVE-2023-5680 - MEDIUM severity - bind9: Cleaning an ECS-enabled cache may cause excessive CPU load vulnerability in bind-tools
Scan
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in busybox
Scan
CVE-2023-42364 - MEDIUM severity - busybox: use-after-free vulnerability in busybox
Scan
CVE-2023-42365 - MEDIUM severity - busybox: use-after-free vulnerability in busybox
Scan
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in busybox
Scan
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in busybox-binsh
Scan
CVE-2023-42364 - MEDIUM severity - busybox: use-after-free vulnerability in busybox-binsh
Scan
CVE-2023-42365 - MEDIUM severity - busybox: use-after-free vulnerability in busybox-binsh
Scan
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in busybox-binsh
Build
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
Scan
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libcrypto3
Scan
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libssl3
Scan
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in openssl
Scan
CVE-2024-33655 - LOW severity - unbound: DNSBomb vulnerability vulnerability in unbound
Scan
CVE-2024-33655 - LOW severity - unbound: DNSBomb vulnerability vulnerability in unbound-libs

Artifacts

Produced during runtime
Name Size
pascaliske~docker-unbound~HCT21V.dockerbuild Expired
33.8 KB