Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

changes to create demo on python-anywhere.com #16

Closed
wants to merge 3 commits into from

Conversation

jaihind213
Copy link
Owner

No description provided.

Copy link

github-actions bot commented Feb 27, 2024

🔍 Vulnerabilities of jaihind213/radio-duck:0.1.3-0.9.0-0.3

📦 Image Reference jaihind213/radio-duck:0.1.3-0.9.0-0.3
digestsha256:539e0129e8d6a245513874b9830cd5367bb3713723c5f420a49ecc52ecb7cf25
vulnerabilitiescritical: 2 high: 4 medium: 0 low: 0
platformlinux/amd64
size2.6 GB
packages555
📦 Base Image ubuntu:22.04
also known as
  • jammy
  • jammy-20240111
  • latest
digestsha256:cb2af41f42b9c9bc9bcdc7cf1735e3c4b3d95b2137be86fd940373471a34c8b0
vulnerabilitiescritical: 0 high: 0 medium: 3 low: 16
critical: 1 high: 0 medium: 0 low: 0 duckdb 0.9.0 (pypi)

pkg:pypi/duckdb@0.9.0

critical 9.8: CVE--2024--22682

Affected range<0.9.3.dev6
Fixed version0.9.3.dev6
CVSS Score9.8
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Description

DuckDB <=0.9.2 and DuckDB extension-template <=0.9.2 are vulnerable to malicious extension injection via the custom extension feature.

critical: 1 high: 0 medium: 0 low: 0 duckdb 0.9.1.dev0+g0d84ccf.d20240127 (pypi)

pkg:pypi/duckdb@0.9.1.dev0+g0d84ccf.d20240127

critical 9.8: CVE--2024--22682

Affected range<0.9.3.dev6
Fixed version0.9.3.dev6
CVSS Score9.8
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Description

DuckDB <=0.9.2 and DuckDB extension-template <=0.9.2 are vulnerable to malicious extension injection via the custom extension feature.

critical: 0 high: 3 medium: 0 low: 0 linux 5.15.0-92.102 (deb)

pkg:deb/ubuntu/linux@5.15.0-92.102?os_distro=jammy&os_name=ubuntu&os_version=22.04

high 7.8: CVE--2024--0646

Affected range<5.15.0-97.107
Fixed version5.15.0-97.107
CVSS Score7.8
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.

high 7.0: CVE--2023--51781

Affected range<5.15.0-97.107
Fixed version5.15.0-97.107
CVSS Score7
CVSS VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.

high 4.7: CVE--2023--6176

Affected range<5.15.0-94.104
Fixed version5.15.0-94.104
CVSS Score4.7
CVSS VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Description

A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.

critical: 0 high: 1 medium: 0 low: 0 cryptography 42.0.1 (pypi)

pkg:pypi/cryptography@42.0.1

high 7.5: CVE--2024--26130 NULL Pointer Dereference

Affected range>=38.0.0
<42.0.4
Fixed version42.0.4
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

If pkcs12.serialize_key_and_certificates is called with both:

  1. A certificate whose public key did not match the provided private key
  2. An encryption_algorithm with hmac_hash set (via PrivateFormat.PKCS12.encryption_builder().hmac_hash(...)

Then a NULL pointer dereference would occur, crashing the Python process.

This has been resolved, and now a ValueError is properly raised.

Patched in pyca/cryptography#10423

pkg:pypi/fastapi@0.101.0

✗ HIGH CVE-2024-24762 [Uncontrolled Resource Consumption]

https://scout.docker.com/v/CVE-2024-24762?s=github&n=fastapi&t=pypi&vr=%!C(MISSING)%!D(MISSING)0.109.0

Affected range : <=0.109.0

Fixed version : 0.109.1

CVSS Score : 7.5

CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

pkg:pypi/starlette@0.27.0
@jaihind213 jaihind213 closed this Mar 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant