docker.io/lycheeverse/lychee:latest (debian 12.8)¶ Trivy Image Scan Image: docker.io/lycheeverse/lychee:latest (debian 12.8) Scan date: 2024-12-04 docker.io/lycheeverse/lychee:latest (debian 12.8) (debian)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links apt CVE-2011-3374 LOW 2.6.1 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 bash TEMP-0841856-B18BAF LOW 5.2.15-2+b7 no fix available bsdutils CVE-2022-0563 LOW 1:2.38.1-5+deb12u2 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 coreutils CVE-2016-2781 LOW 9.1-1 no fix available http://seclists.org/oss-sec/2016/q1/452 http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://access.redhat.com/security/cve/CVE-2016-2781 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E https://lore.kernel.org/patchwork/patch/793178/ https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.28/v2.28-ReleaseNotes https://nvd.nist.gov/vuln/detail/CVE-2016-2781 https://www.cve.org/CVERecord?id=CVE-2016-2781 coreutils CVE-2017-18018 LOW 9.1-1 no fix available http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html https://access.redhat.com/security/cve/CVE-2017-18018 https://nvd.nist.gov/vuln/detail/CVE-2017-18018 https://www.cve.org/CVERecord?id=CVE-2017-18018 gcc-12-base CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 gcc-12-base CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 gpgv CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 libapt-pkg6.0 CVE-2011-3374 LOW 2.6.1 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 libblkid1 CVE-2022-0563 LOW 2.38.1-5+deb12u2 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libc-bin CVE-2010-4756 LOW 2.36-9+deb12u9 no fix available http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://access.redhat.com/security/cve/CVE-2010-4756 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756 https://nvd.nist.gov/vuln/detail/CVE-2010-4756 https://www.cve.org/CVERecord?id=CVE-2010-4756 libc-bin CVE-2018-20796 LOW 2.36-9+deb12u9 no fix available http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2018-20796 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://nvd.nist.gov/vuln/detail/CVE-2018-20796 https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2018-20796 libc-bin CVE-2019-1010022 LOW 2.36-9+deb12u9 no fix available https://access.redhat.com/security/cve/CVE-2019-1010022 https://nvd.nist.gov/vuln/detail/CVE-2019-1010022 https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022 https://www.cve.org/CVERecord?id=CVE-2019-1010022 libc-bin CVE-2019-1010023 LOW 2.36-9+deb12u9 no fix available http://www.securityfocus.com/bid/109167 https://access.redhat.com/security/cve/CVE-2019-1010023 https://nvd.nist.gov/vuln/detail/CVE-2019-1010023 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023 https://www.cve.org/CVERecord?id=CVE-2019-1010023 libc-bin CVE-2019-1010024 LOW 2.36-9+deb12u9 no fix available http://www.securityfocus.com/bid/109162 https://access.redhat.com/security/cve/CVE-2019-1010024 https://nvd.nist.gov/vuln/detail/CVE-2019-1010024 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024 https://www.cve.org/CVERecord?id=CVE-2019-1010024 libc-bin CVE-2019-1010025 LOW 2.36-9+deb12u9 no fix available https://access.redhat.com/security/cve/CVE-2019-1010025 https://nvd.nist.gov/vuln/detail/CVE-2019-1010025 https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025 https://www.cve.org/CVERecord?id=CVE-2019-1010025 libc-bin CVE-2019-9192 LOW 2.36-9+deb12u9 no fix available https://access.redhat.com/security/cve/CVE-2019-9192 https://nvd.nist.gov/vuln/detail/CVE-2019-9192 https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2019-9192 libc6 CVE-2010-4756 LOW 2.36-9+deb12u9 no fix available http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://access.redhat.com/security/cve/CVE-2010-4756 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756 https://nvd.nist.gov/vuln/detail/CVE-2010-4756 https://www.cve.org/CVERecord?id=CVE-2010-4756 libc6 CVE-2018-20796 LOW 2.36-9+deb12u9 no fix available http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2018-20796 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://nvd.nist.gov/vuln/detail/CVE-2018-20796 https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2018-20796 libc6 CVE-2019-1010022 LOW 2.36-9+deb12u9 no fix available https://access.redhat.com/security/cve/CVE-2019-1010022 https://nvd.nist.gov/vuln/detail/CVE-2019-1010022 https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022 https://www.cve.org/CVERecord?id=CVE-2019-1010022 libc6 CVE-2019-1010023 LOW 2.36-9+deb12u9 no fix available http://www.securityfocus.com/bid/109167 https://access.redhat.com/security/cve/CVE-2019-1010023 https://nvd.nist.gov/vuln/detail/CVE-2019-1010023 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023 https://www.cve.org/CVERecord?id=CVE-2019-1010023 libc6 CVE-2019-1010024 LOW 2.36-9+deb12u9 no fix available http://www.securityfocus.com/bid/109162 https://access.redhat.com/security/cve/CVE-2019-1010024 https://nvd.nist.gov/vuln/detail/CVE-2019-1010024 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024 https://www.cve.org/CVERecord?id=CVE-2019-1010024 libc6 CVE-2019-1010025 LOW 2.36-9+deb12u9 no fix available https://access.redhat.com/security/cve/CVE-2019-1010025 https://nvd.nist.gov/vuln/detail/CVE-2019-1010025 https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025 https://www.cve.org/CVERecord?id=CVE-2019-1010025 libc6 CVE-2019-9192 LOW 2.36-9+deb12u9 no fix available https://access.redhat.com/security/cve/CVE-2019-9192 https://nvd.nist.gov/vuln/detail/CVE-2019-9192 https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2019-9192 libgcc-s1 CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 libgcc-s1 CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 libgcrypt20 CVE-2024-2236 MEDIUM 1.10.1-3 no fix available https://access.redhat.com/errata/RHSA-2024:9404 https://access.redhat.com/security/cve/CVE-2024-2236 https://bugzilla.redhat.com/2245218 https://bugzilla.redhat.com/show_bug.cgi?id=2245218 https://dev.gnupg.org/T7136 https://errata.almalinux.org/9/ALSA-2024-9404.html https://github.com/tomato42/marvin-toolkit/tree/master/example/libgcrypt https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/merge_requests/17 https://linux.oracle.com/cve/CVE-2024-2236.html https://linux.oracle.com/errata/ELSA-2024-9404.html https://lists.gnupg.org/pipermail/gcrypt-devel/2024-March/005607.html https://nvd.nist.gov/vuln/detail/CVE-2024-2236 https://www.cve.org/CVERecord?id=CVE-2024-2236 libgcrypt20 CVE-2018-6829 LOW 1.10.1-3 no fix available https://access.redhat.com/security/cve/CVE-2018-6829 https://github.com/weikengchen/attack-on-libgcrypt-elgamal https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html https://nvd.nist.gov/vuln/detail/CVE-2018-6829 https://www.cve.org/CVERecord?id=CVE-2018-6829 https://www.oracle.com/security-alerts/cpujan2020.html libgnutls30 CVE-2011-3389 LOW 3.7.9-2+deb12u3 no fix available http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/ http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/ http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx http://curl.haxx.se/docs/adv_20120124B.html http://downloads.asterisk.org/pub/security/AST-2016-001.html http://ekoparty.org/2011/juliano-rizzo.php http://eprint.iacr.org/2004/111 http://eprint.iacr.org/2006/136 http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html http://isc.sans.edu/diary/SSL+TLS+part+3+/11635 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html http://lists.apple.com/archives/security-announce/2012/May/msg00001.html http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://marc.info/?l=bugtraq&m=132750579901589&w=2 http://marc.info/?l=bugtraq&m=132872385320240&w=2 http://marc.info/?l=bugtraq&m=133365109612558&w=2 http://marc.info/?l=bugtraq&m=133728004526190&w=2 http://marc.info/?l=bugtraq&m=134254866602253&w=2 http://marc.info/?l=bugtraq&m=134254957702612&w=2 http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue http://osvdb.org/74829 http://rhn.redhat.com/errata/RHSA-2012-0508.html http://rhn.redhat.com/errata/RHSA-2013-1455.html http://secunia.com/advisories/45791 http://secunia.com/advisories/47998 http://secunia.com/advisories/48256 http://secunia.com/advisories/48692 http://secunia.com/advisories/48915 http://secunia.com/advisories/48948 http://secunia.com/advisories/49198 http://secunia.com/advisories/55322 http://secunia.com/advisories/55350 http://secunia.com/advisories/55351 http://security.gentoo.org/glsa/glsa-201203-02.xml http://security.gentoo.org/glsa/glsa-201406-32.xml http://support.apple.com/kb/HT4999 http://support.apple.com/kb/HT5001 http://support.apple.com/kb/HT5130 http://support.apple.com/kb/HT5281 http://support.apple.com/kb/HT5501 http://support.apple.com/kb/HT6150 http://technet.microsoft.com/security/advisory/2588513 http://vnhacker.blogspot.com/2011/09/beast.html http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf http://www.debian.org/security/2012/dsa-2398 http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html http://www.ibm.com/developerworks/java/jdk/alerts/ http://www.imperialviolet.org/2011/09/23/chromeandbeast.html http://www.insecure.cl/Beast-SSL.rar http://www.kb.cert.org/vuls/id/864643 http://www.mandriva.com/security/advisories?name=MDVSA-2012:058 http://www.opera.com/docs/changelogs/mac/1151/ http://www.opera.com/docs/changelogs/mac/1160/ http://www.opera.com/docs/changelogs/unix/1151/ http://www.opera.com/docs/changelogs/unix/1160/ http://www.opera.com/docs/changelogs/windows/1151/ http://www.opera.com/docs/changelogs/windows/1160/ http://www.opera.com/support/kb/view/1004/ http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html http://www.redhat.com/support/errata/RHSA-2011-1384.html http://www.redhat.com/support/errata/RHSA-2012-0006.html http://www.securityfocus.com/bid/49388 http://www.securityfocus.com/bid/49778 http://www.securitytracker.com/id/1029190 http://www.securitytracker.com/id?1025997 http://www.securitytracker.com/id?1026103 http://www.securitytracker.com/id?1026704 http://www.ubuntu.com/usn/USN-1263-1 http://www.us-cert.gov/cas/techalerts/TA12-010A.html https://access.redhat.com/security/cve/CVE-2011-3389 https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail https://bugzilla.novell.com/show_bug.cgi?id=719047 https://bugzilla.redhat.com/show_bug.cgi?id=737506 https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862 https://hermes.opensuse.org/messages/13154861 https://hermes.opensuse.org/messages/13155432 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://linux.oracle.com/cve/CVE-2011-3389.html https://linux.oracle.com/errata/ELSA-2011-1380.html https://nvd.nist.gov/vuln/detail/CVE-2011-3389 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752 https://ubuntu.com/security/notices/USN-1263-1 https://www.cve.org/CVERecord?id=CVE-2011-3389 libmount1 CVE-2022-0563 LOW 2.38.1-5+deb12u2 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libpam-modules CVE-2024-10963 HIGH 1.5.2-6+deb12u1 no fix available https://access.redhat.com/errata/RHSA-2024:10244 https://access.redhat.com/security/cve/CVE-2024-10963 https://bugzilla.redhat.com/2324291 https://bugzilla.redhat.com/show_bug.cgi?id=2324291 https://errata.almalinux.org/9/ALSA-2024-10244.html https://linux.oracle.com/cve/CVE-2024-10963.html https://linux.oracle.com/errata/ELSA-2024-10379.html https://nvd.nist.gov/vuln/detail/CVE-2024-10963 https://www.cve.org/CVERecord?id=CVE-2024-10963 libpam-modules CVE-2024-10041 MEDIUM 1.5.2-6+deb12u1 no fix available https://access.redhat.com/errata/RHSA-2024:10379 https://access.redhat.com/errata/RHSA-2024:9941 https://access.redhat.com/security/cve/CVE-2024-10041 https://bugzilla.redhat.com/2319212 https://bugzilla.redhat.com/2324291 https://bugzilla.redhat.com/show_bug.cgi?id=2319212 https://errata.almalinux.org/8/ALSA-2024-10379.html https://linux.oracle.com/cve/CVE-2024-10041.html https://linux.oracle.com/errata/ELSA-2024-10379.html https://nvd.nist.gov/vuln/detail/CVE-2024-10041 https://www.cve.org/CVERecord?id=CVE-2024-10041 libpam-modules CVE-2024-22365 MEDIUM 1.5.2-6+deb12u1 no fix available http://www.openwall.com/lists/oss-security/2024/01/18/3 https://access.redhat.com/errata/RHSA-2024:2438 https://access.redhat.com/security/cve/CVE-2024-22365 https://bugzilla.redhat.com/2257722 https://bugzilla.redhat.com/show_bug.cgi?id=2257722 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365 https://errata.almalinux.org/9/ALSA-2024-2438.html https://errata.rockylinux.org/RLSA-2024:3163 https://github.com/linux-pam/linux-pam https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0 https://linux.oracle.com/cve/CVE-2024-22365.html https://linux.oracle.com/errata/ELSA-2024-3163.html https://nvd.nist.gov/vuln/detail/CVE-2024-22365 https://ubuntu.com/security/notices/USN-6588-1 https://ubuntu.com/security/notices/USN-6588-2 https://www.cve.org/CVERecord?id=CVE-2024-22365 https://www.openwall.com/lists/oss-security/2024/01/18/3 libpam-modules-bin CVE-2024-10963 HIGH 1.5.2-6+deb12u1 no fix available https://access.redhat.com/errata/RHSA-2024:10244 https://access.redhat.com/security/cve/CVE-2024-10963 https://bugzilla.redhat.com/2324291 https://bugzilla.redhat.com/show_bug.cgi?id=2324291 https://errata.almalinux.org/9/ALSA-2024-10244.html https://linux.oracle.com/cve/CVE-2024-10963.html https://linux.oracle.com/errata/ELSA-2024-10379.html https://nvd.nist.gov/vuln/detail/CVE-2024-10963 https://www.cve.org/CVERecord?id=CVE-2024-10963 libpam-modules-bin CVE-2024-10041 MEDIUM 1.5.2-6+deb12u1 no fix available https://access.redhat.com/errata/RHSA-2024:10379 https://access.redhat.com/errata/RHSA-2024:9941 https://access.redhat.com/security/cve/CVE-2024-10041 https://bugzilla.redhat.com/2319212 https://bugzilla.redhat.com/2324291 https://bugzilla.redhat.com/show_bug.cgi?id=2319212 https://errata.almalinux.org/8/ALSA-2024-10379.html https://linux.oracle.com/cve/CVE-2024-10041.html https://linux.oracle.com/errata/ELSA-2024-10379.html https://nvd.nist.gov/vuln/detail/CVE-2024-10041 https://www.cve.org/CVERecord?id=CVE-2024-10041 libpam-modules-bin CVE-2024-22365 MEDIUM 1.5.2-6+deb12u1 no fix available http://www.openwall.com/lists/oss-security/2024/01/18/3 https://access.redhat.com/errata/RHSA-2024:2438 https://access.redhat.com/security/cve/CVE-2024-22365 https://bugzilla.redhat.com/2257722 https://bugzilla.redhat.com/show_bug.cgi?id=2257722 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365 https://errata.almalinux.org/9/ALSA-2024-2438.html https://errata.rockylinux.org/RLSA-2024:3163 https://github.com/linux-pam/linux-pam https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0 https://linux.oracle.com/cve/CVE-2024-22365.html https://linux.oracle.com/errata/ELSA-2024-3163.html https://nvd.nist.gov/vuln/detail/CVE-2024-22365 https://ubuntu.com/security/notices/USN-6588-1 https://ubuntu.com/security/notices/USN-6588-2 https://www.cve.org/CVERecord?id=CVE-2024-22365 https://www.openwall.com/lists/oss-security/2024/01/18/3 libpam-runtime CVE-2024-10963 HIGH 1.5.2-6+deb12u1 no fix available https://access.redhat.com/errata/RHSA-2024:10244 https://access.redhat.com/security/cve/CVE-2024-10963 https://bugzilla.redhat.com/2324291 https://bugzilla.redhat.com/show_bug.cgi?id=2324291 https://errata.almalinux.org/9/ALSA-2024-10244.html https://linux.oracle.com/cve/CVE-2024-10963.html https://linux.oracle.com/errata/ELSA-2024-10379.html https://nvd.nist.gov/vuln/detail/CVE-2024-10963 https://www.cve.org/CVERecord?id=CVE-2024-10963 libpam-runtime CVE-2024-10041 MEDIUM 1.5.2-6+deb12u1 no fix available https://access.redhat.com/errata/RHSA-2024:10379 https://access.redhat.com/errata/RHSA-2024:9941 https://access.redhat.com/security/cve/CVE-2024-10041 https://bugzilla.redhat.com/2319212 https://bugzilla.redhat.com/2324291 https://bugzilla.redhat.com/show_bug.cgi?id=2319212 https://errata.almalinux.org/8/ALSA-2024-10379.html https://linux.oracle.com/cve/CVE-2024-10041.html https://linux.oracle.com/errata/ELSA-2024-10379.html https://nvd.nist.gov/vuln/detail/CVE-2024-10041 https://www.cve.org/CVERecord?id=CVE-2024-10041 libpam-runtime CVE-2024-22365 MEDIUM 1.5.2-6+deb12u1 no fix available http://www.openwall.com/lists/oss-security/2024/01/18/3 https://access.redhat.com/errata/RHSA-2024:2438 https://access.redhat.com/security/cve/CVE-2024-22365 https://bugzilla.redhat.com/2257722 https://bugzilla.redhat.com/show_bug.cgi?id=2257722 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365 https://errata.almalinux.org/9/ALSA-2024-2438.html https://errata.rockylinux.org/RLSA-2024:3163 https://github.com/linux-pam/linux-pam https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0 https://linux.oracle.com/cve/CVE-2024-22365.html https://linux.oracle.com/errata/ELSA-2024-3163.html https://nvd.nist.gov/vuln/detail/CVE-2024-22365 https://ubuntu.com/security/notices/USN-6588-1 https://ubuntu.com/security/notices/USN-6588-2 https://www.cve.org/CVERecord?id=CVE-2024-22365 https://www.openwall.com/lists/oss-security/2024/01/18/3 libpam0g CVE-2024-10963 HIGH 1.5.2-6+deb12u1 no fix available https://access.redhat.com/errata/RHSA-2024:10244 https://access.redhat.com/security/cve/CVE-2024-10963 https://bugzilla.redhat.com/2324291 https://bugzilla.redhat.com/show_bug.cgi?id=2324291 https://errata.almalinux.org/9/ALSA-2024-10244.html https://linux.oracle.com/cve/CVE-2024-10963.html https://linux.oracle.com/errata/ELSA-2024-10379.html https://nvd.nist.gov/vuln/detail/CVE-2024-10963 https://www.cve.org/CVERecord?id=CVE-2024-10963 libpam0g CVE-2024-10041 MEDIUM 1.5.2-6+deb12u1 no fix available https://access.redhat.com/errata/RHSA-2024:10379 https://access.redhat.com/errata/RHSA-2024:9941 https://access.redhat.com/security/cve/CVE-2024-10041 https://bugzilla.redhat.com/2319212 https://bugzilla.redhat.com/2324291 https://bugzilla.redhat.com/show_bug.cgi?id=2319212 https://errata.almalinux.org/8/ALSA-2024-10379.html https://linux.oracle.com/cve/CVE-2024-10041.html https://linux.oracle.com/errata/ELSA-2024-10379.html https://nvd.nist.gov/vuln/detail/CVE-2024-10041 https://www.cve.org/CVERecord?id=CVE-2024-10041 libpam0g CVE-2024-22365 MEDIUM 1.5.2-6+deb12u1 no fix available http://www.openwall.com/lists/oss-security/2024/01/18/3 https://access.redhat.com/errata/RHSA-2024:2438 https://access.redhat.com/security/cve/CVE-2024-22365 https://bugzilla.redhat.com/2257722 https://bugzilla.redhat.com/show_bug.cgi?id=2257722 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365 https://errata.almalinux.org/9/ALSA-2024-2438.html https://errata.rockylinux.org/RLSA-2024:3163 https://github.com/linux-pam/linux-pam https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0 https://linux.oracle.com/cve/CVE-2024-22365.html https://linux.oracle.com/errata/ELSA-2024-3163.html https://nvd.nist.gov/vuln/detail/CVE-2024-22365 https://ubuntu.com/security/notices/USN-6588-1 https://ubuntu.com/security/notices/USN-6588-2 https://www.cve.org/CVERecord?id=CVE-2024-22365 https://www.openwall.com/lists/oss-security/2024/01/18/3 libsmartcols1 CVE-2022-0563 LOW 2.38.1-5+deb12u2 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libstdc++6 CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 libstdc++6 CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 libsystemd0 CVE-2013-4392 LOW 252.31-1~deb12u1 no fix available http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 http://www.openwall.com/lists/oss-security/2013/10/01/9 https://access.redhat.com/security/cve/CVE-2013-4392 https://bugzilla.redhat.com/show_bug.cgi?id=859060 https://nvd.nist.gov/vuln/detail/CVE-2013-4392 https://www.cve.org/CVERecord?id=CVE-2013-4392 libsystemd0 CVE-2023-31437 LOW 252.31-1~deb12u1 no fix available https://github.com/kastel-security/Journald https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf https://github.com/systemd/systemd/releases libsystemd0 CVE-2023-31438 LOW 252.31-1~deb12u1 no fix available https://github.com/kastel-security/Journald https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf https://github.com/systemd/systemd/pull/28886 https://github.com/systemd/systemd/releases libsystemd0 CVE-2023-31439 LOW 252.31-1~deb12u1 no fix available https://github.com/kastel-security/Journald https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf https://github.com/systemd/systemd/pull/28885 https://github.com/systemd/systemd/releases libtinfo6 CVE-2023-50495 MEDIUM 6.4-4 no fix available https://access.redhat.com/security/cve/CVE-2023-50495 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/ https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html https://nvd.nist.gov/vuln/detail/CVE-2023-50495 https://security.netapp.com/advisory/ntap-20240119-0008/ https://ubuntu.com/security/notices/USN-6684-1 https://www.cve.org/CVERecord?id=CVE-2023-50495 25 other vulnerabilities found... No Misconfigurations found