-
-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
deps(deps): update ansible/ansible-lint action to v24.9.2 #88
Conversation
OutdatedRecommended fixes for image
|
Name | 8.3.11-alpine3.20 |
Digest | sha256:fbd89ae244b08e08eece68310e23f0eb7865496203892ce649781d5d716e544f |
Vulnerabilities | |
Pushed | 1 week ago |
Size | 37 MB |
Packages | 50 |
Flavor | alpine |
OS | 3.20 |
Runtime | 8.3.11 |
The base image is also available under the supported tag(s):8-alpine3.20
,8-cli-alpine
,8-cli-alpine3.20
,8.3-alpine
,8.3-alpine3.20
,8.3-cli-alpine
,8.3-cli-alpine3.20
,8.3.11-alpine
,8.3.11-alpine3.20
,8.3.11-cli-alpine
,8.3.11-cli-alpine3.20
,alpine
,alpine3.20
,cli-alpine
,cli-alpine3.20
Refresh base image
Rebuild the image using a newer base image version. Updating this may result in breaking changes.✅ This image version is up to date.
Change base image
✅ There are no tag recommendations at this time.
Outdated🔍 Vulnerabilities of
|
digest | sha256:53ee394162ce9171e7bb50fa9ff273f6788d92da2c46387d0ddc5d77e7cab934 |
vulnerabilities | |
size | 67 MB |
packages | 100 |
📦 Base Image php:8.1-fpm-alpine
also known as |
|
digest | sha256:c2a4daca3f96f06a5b3fa60bf58d933e147e43b607b87dffdd31f0e430843848 |
vulnerabilities |
Outdated🔍 Vulnerabilities of
|
digest | sha256:efcce747f51548114f988c354fad7961a44c7940defaf62170fa8ec1da41ca2c |
vulnerabilities | |
size | 71 MB |
packages | 99 |
📦 Base Image php:8.1-alpine
also known as |
|
digest | sha256:4001f8453a837283a053931e0d085366d36f77fd5a2a18c31950c4121cd4a5ec |
vulnerabilities |
OutdatedRecommended fixes for image
|
Name | 8.1.29-alpine3.20 |
Digest | sha256:4001f8453a837283a053931e0d085366d36f77fd5a2a18c31950c4121cd4a5ec |
Vulnerabilities | |
Pushed | 1 week ago |
Size | 35 MB |
Packages | 50 |
Flavor | alpine |
OS | 3.20 |
Runtime | 8.1.29 |
The base image is also available under the supported tag(s):8.1-alpine3.20
,8.1-cli-alpine
,8.1-cli-alpine3.20
,8.1.29-alpine
,8.1.29-alpine3.20
,8.1.29-cli-alpine
,8.1.29-cli-alpine3.20
Refresh base image
Rebuild the image using a newer base image version. Updating this may result in breaking changes.✅ This image version is up to date.
Change base image
Tag | Details | Pushed | Vulnerabilities |
---|---|---|---|
8.3-alpine Minor runtime version update Also known as:
|
Benefits:
|
1 week ago | |
8.2-alpine Minor runtime version update Also known as:
|
Benefits:
|
1 week ago | |
OutdatedRecommended fixes for image
|
Name | 8.1.29-fpm-alpine3.20 |
Digest | sha256:c2a4daca3f96f06a5b3fa60bf58d933e147e43b607b87dffdd31f0e430843848 |
Vulnerabilities | |
Pushed | 1 week ago |
Size | 31 MB |
Packages | 51 |
Flavor | alpine |
OS | 3.20 |
Runtime | 8.1.29 |
The base image is also available under the supported tag(s):8.1-fpm-alpine3.20
,8.1.29-fpm-alpine
,8.1.29-fpm-alpine3.20
Refresh base image
Rebuild the image using a newer base image version. Updating this may result in breaking changes.✅ This image version is up to date.
Change base image
Tag | Details | Pushed | Vulnerabilities |
---|---|---|---|
8.2-fpm-alpine Minor runtime version update Also known as:
|
Benefits:
|
1 week ago | |
8.3-fpm-alpine Image has same number of vulnerabilities Also known as:
|
Benefits:
|
1 week ago | |
Outdated🔍 Vulnerabilities of
|
digest | sha256:8b72974e1f26cb2b7e376c1ecd6782c630bff38847ae55053e3b36879071bd5f |
vulnerabilities | |
size | 90 MB |
packages | 120 |
📦 Base Image php:8.2-alpine
also known as |
|
digest | sha256:664c504580bbf49e465ef58c3a501ea48c21fbfbef991f34bee822a670fbad49 |
vulnerabilities |
OutdatedRecommended fixes for image
|
Name | 8.2.23-alpine3.20 |
Digest | sha256:664c504580bbf49e465ef58c3a501ea48c21fbfbef991f34bee822a670fbad49 |
Vulnerabilities | |
Pushed | 1 week ago |
Size | 36 MB |
Packages | 50 |
Flavor | alpine |
OS | 3.20 |
Runtime | 8.2.23 |
The base image is also available under the supported tag(s):8.2-alpine3.20
,8.2-cli-alpine
,8.2-cli-alpine3.20
,8.2.23-alpine
,8.2.23-alpine3.20
,8.2.23-cli-alpine
,8.2.23-cli-alpine3.20
Refresh base image
Rebuild the image using a newer base image version. Updating this may result in breaking changes.✅ This image version is up to date.
Change base image
Tag | Details | Pushed | Vulnerabilities |
---|---|---|---|
8.3-alpine Minor runtime version update Also known as:
|
Benefits:
|
1 week ago | |
Outdated🔍 Vulnerabilities of
|
digest | sha256:2a89c2764aad4d5ea6fe114f91a79e157f5e410251f6c54214a1d5d337bd7d75 |
vulnerabilities | |
size | 102 MB |
packages | 243 |
📦 Base Image alpine:3
also known as |
|
digest | sha256:33735bd63cf84d7e388d9f6d297d348c523c044410f553bd878c6d7829612735 |
vulnerabilities |
stdlib
|
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
Affected range | >=1.22.0-0 |
Fixed version | 1.22.5 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.
An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.19% |
EPSS Percentile | 56th percentile |
Description
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
OutdatedRecommended fixes for image
|
Name | 3.20.3 |
Digest | sha256:33735bd63cf84d7e388d9f6d297d348c523c044410f553bd878c6d7829612735 |
Vulnerabilities | |
Pushed | 1 week ago |
Size | 3.6 MB |
Packages | 17 |
OS | 3.20.3 |
The base image is also available under the supported tag(s):3.20
,3.20.3
,latest
Refresh base image
Rebuild the image using a newer base image version. Updating this may result in breaking changes.✅ This image version is up to date.
Change base image
✅ There are no tag recommendations at this time.
Outdated🔍 Vulnerabilities of
|
digest | sha256:38c0db6105abe4a900dee3877e494e5e835e22ac166e22806691eb1e36c1eb80 |
vulnerabilities | |
size | 90 MB |
packages | 120 |
📦 Base Image php:8.1-alpine
also known as |
|
digest | sha256:4001f8453a837283a053931e0d085366d36f77fd5a2a18c31950c4121cd4a5ec |
vulnerabilities |
Outdated🔍 Vulnerabilities of
|
digest | sha256:2a89c2764aad4d5ea6fe114f91a79e157f5e410251f6c54214a1d5d337bd7d75 |
vulnerabilities | |
size | 102 MB |
packages | 243 |
📦 Base Image alpine:3
also known as |
|
digest | sha256:33735bd63cf84d7e388d9f6d297d348c523c044410f553bd878c6d7829612735 |
vulnerabilities |
stdlib
|
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
Affected range | >=1.22.0-0 |
Fixed version | 1.22.5 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.
An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.19% |
EPSS Percentile | 56th percentile |
Description
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
OutdatedRecommended fixes for image
|
Name | 8.1.29-alpine3.20 |
Digest | sha256:4001f8453a837283a053931e0d085366d36f77fd5a2a18c31950c4121cd4a5ec |
Vulnerabilities | |
Pushed | 1 week ago |
Size | 35 MB |
Packages | 50 |
Flavor | alpine |
OS | 3.20 |
Runtime | 8.1.29 |
The base image is also available under the supported tag(s):8.1-alpine3.20
,8.1-cli-alpine
,8.1-cli-alpine3.20
,8.1.29-alpine
,8.1.29-alpine3.20
,8.1.29-cli-alpine
,8.1.29-cli-alpine3.20
Refresh base image
Rebuild the image using a newer base image version. Updating this may result in breaking changes.✅ This image version is up to date.
Change base image
Tag | Details | Pushed | Vulnerabilities |
---|---|---|---|
8.3-alpine Minor runtime version update Also known as:
|
Benefits:
|
1 week ago | |
8.2-alpine Minor runtime version update Also known as:
|
Benefits:
|
1 week ago | |
OutdatedRecommended fixes for image
|
Name | 3.20.3 |
Digest | sha256:33735bd63cf84d7e388d9f6d297d348c523c044410f553bd878c6d7829612735 |
Vulnerabilities | |
Pushed | 1 week ago |
Size | 3.6 MB |
Packages | 17 |
OS | 3.20.3 |
The base image is also available under the supported tag(s):3.20
,3.20.3
,latest
Refresh base image
Rebuild the image using a newer base image version. Updating this may result in breaking changes.✅ This image version is up to date.
Change base image
✅ There are no tag recommendations at this time.
Outdated🔍 Vulnerabilities of
|
digest | sha256:2a89c2764aad4d5ea6fe114f91a79e157f5e410251f6c54214a1d5d337bd7d75 |
vulnerabilities | |
size | 102 MB |
packages | 243 |
📦 Base Image alpine:3
also known as |
|
digest | sha256:33735bd63cf84d7e388d9f6d297d348c523c044410f553bd878c6d7829612735 |
vulnerabilities |
stdlib
|
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
Affected range | >=1.22.0-0 |
Fixed version | 1.22.5 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.
An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.19% |
EPSS Percentile | 56th percentile |
Description
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
OutdatedRecommended fixes for image
|
Name | 3.20.3 |
Digest | sha256:33735bd63cf84d7e388d9f6d297d348c523c044410f553bd878c6d7829612735 |
Vulnerabilities | |
Pushed | 1 week ago |
Size | 3.6 MB |
Packages | 17 |
OS | 3.20.3 |
The base image is also available under the supported tag(s):3.20
,3.20.3
,latest
Refresh base image
Rebuild the image using a newer base image version. Updating this may result in breaking changes.✅ This image version is up to date.
Change base image
✅ There are no tag recommendations at this time.
🔍 Vulnerabilities of
|
digest | sha256:2a89c2764aad4d5ea6fe114f91a79e157f5e410251f6c54214a1d5d337bd7d75 |
vulnerabilities | |
size | 102 MB |
packages | 243 |
📦 Base Image alpine:3
also known as |
|
digest | sha256:33735bd63cf84d7e388d9f6d297d348c523c044410f553bd878c6d7829612735 |
vulnerabilities |
stdlib
|
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
Affected range | >=1.22.0-0 |
Fixed version | 1.22.5 |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.
An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
Affected range | <1.22.7 |
Fixed version | 1.22.7 |
EPSS Score | 0.19% |
EPSS Percentile | 56th percentile |
Description
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
Recommended fixes for image
|
Name | 3.20.3 |
Digest | sha256:33735bd63cf84d7e388d9f6d297d348c523c044410f553bd878c6d7829612735 |
Vulnerabilities | |
Pushed | 1 week ago |
Size | 3.6 MB |
Packages | 17 |
OS | 3.20.3 |
The base image is also available under the supported tag(s):3.20
,3.20.3
,latest
Refresh base image
Rebuild the image using a newer base image version. Updating this may result in breaking changes.✅ This image version is up to date.
Change base image
✅ There are no tag recommendations at this time.
This PR contains the following updates:
v24.9.0
->v24.9.2
Release Notes
ansible/ansible-lint (ansible/ansible-lint)
v24.9.2
Compare Source
Bugfixes
v24.9.1
Compare Source
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.