{"payload":{"header_redesign_enabled":false,"results":[{"author_name":"rocketeerbkw","author_avatar_url":"https://avatars.githubusercontent.com/u/92499?s=48&v=4","id":"2267228465","issue":{"issue":{"pull_request_id":null}},"repo":{"repository":{"id":285724350,"name":"lagoon-images","owner_id":70366086,"owner_login":"uselagoon","updated_at":"2024-05-21T00:09:40.757Z","has_issues":true}},"labels":[],"num_comments":2,"number":984,"state":"open","hl_title":"CVE-2024-2961","hl_text":"...  assigned CVE-2024-2961.\n\nThe Lagoon PHP images are based on alpine linux, which uses musl, not glibc. At this time we believe our images are not\nvulnerable to the exploit.\n\nWe will update this issues as more information comes out.\n","created":"2024-04-28T07:03:15.000+08:00","reviewable_state":null,"merged":null},{"author_name":"stefanman125","author_avatar_url":"https://avatars.githubusercontent.com/u/38778523?s=48&v=4","id":"2257673561","issue":{"issue":{"pull_request_id":null}},"repo":{"repository":{"id":41589337,"name":"BookStack","owner_id":20912696,"owner_login":"BookStackApp","updated_at":"2024-05-23T18:15:44.441Z","has_issues":true}},"labels":["šŸ› Bug"],"num_comments":1,"number":4971,"state":"open","hl_title":"CVE-2024-2961","hl_text":null,"created":"2024-04-23T01:17:34.000+01:00","reviewable_state":null,"merged":null},{"author_name":"PrivacyOsint2","author_avatar_url":"https://avatars.githubusercontent.com/u/93969855?s=48&v=4","id":"2259397905","issue":{"issue":{"pull_request_id":null}},"repo":{"repository":{"id":8411581,"name":"morss","owner_id":1742692,"owner_login":"pictuga","updated_at":"2024-04-27T23:53:25.150Z","has_issues":true}},"labels":[],"num_comments":0,"number":126,"state":"open","hl_title":"glibc-vulnerability cve-2024-2961 [BUG]","hl_text":null,"created":"2024-04-23T17:28:23.000Z","reviewable_state":null,"merged":null},{"author_name":"Avarei","author_avatar_url":"https://avatars.githubusercontent.com/u/32556895?s=48&v=4","id":"2285668621","issue":{"issue":{"pull_request_id":null}},"repo":{"repository":{"id":707518922,"name":"function-go-templating","owner_id":65389701,"owner_login":"crossplane-contrib","updated_at":"2024-05-16T01:14:25.773Z","has_issues":true}},"labels":["bug"],"num_comments":0,"number":94,"state":"open","hl_title":"CVE-2024-2961 in all container images","hl_text":"...  image used in the Dockerfile was shipped with libc6, is vulnerable to CVE-2024-2961. The\ndistroless image has already been updated and does no longer contain a vulnerable version. By rebuilding the ...","created":"2024-05-08T15:55:13.000+02:00","reviewable_state":null,"merged":null},{"author_name":"PrivacyOsint2","author_avatar_url":"https://avatars.githubusercontent.com/u/93969855?s=48&v=4","id":"2259401483","issue":{"issue":{"pull_request_id":null}},"repo":{"repository":{"id":11935508,"name":"rss-bridge","owner_id":20958263,"owner_login":"RSS-Bridge","updated_at":"2024-05-23T08:01:44.797Z","has_issues":true}},"labels":["Bug-Report"],"num_comments":0,"number":4088,"state":"open","hl_title":"glibc-vulnerability cve-2024-2961 [BUG]","hl_text":null,"created":"2024-04-23T17:30:33.000Z","reviewable_state":null,"merged":null},{"author_name":"aramase","author_avatar_url":"https://avatars.githubusercontent.com/u/10608509?s=48&v=4","id":"2272566947","issue":{"issue":{"pull_request_id":null}},"repo":{"repository":{"id":54596517,"name":"release","owner_id":13629408,"owner_login":"kubernetes","updated_at":"2024-05-23T18:47:03.360Z","has_issues":true}},"labels":["area/release-eng","kind/bug","needs-priority","sig/release"],"num_comments":4,"number":3593,"state":"open","hl_title":"CVE-2024-2961 in `registry.k8s.io/build-image/distroless-iptables:v0.5.3`","hl_text":"...                           ā”‚\nā”œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¤\nā”‚ libc6   ā”‚ CVE-2024-2961 ā”‚ HIGH     ā”‚ fixed  ā”‚ 2.36-9+deb12u4    ā”‚ 2.36-9+deb12u6 ā”‚ glibc: Out of bounds write in iconv may lead to remote ...","created":"2024-04-30T15:12:09.000-07:00","reviewable_state":null,"merged":null},{"author_name":"oerdnj","author_avatar_url":"https://avatars.githubusercontent.com/u/130731?s=48&v=4","id":"2258278379","issue":{"issue":{"pull_request_id":null}},"repo":{"repository":{"id":21391781,"name":"deb.sury.org","owner_id":130731,"owner_login":"oerdnj","updated_at":"2024-04-21T11:26:34.131Z","has_issues":true}},"labels":[],"num_comments":3,"number":2121,"state":"open","hl_title":"GLIBC-SA-2024-0004/CVE-2024-2961: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence","hl_text":"Just a quick summary:\n\n  - There s nothing I can do on the PHP side, it needs to be fixed in libc\n  - Ubuntu libc packages are already fixed\n  - Debian unstable and stable is fixed, old stable is not\n ...","created":"2024-04-23T10:32:58.000+02:00","reviewable_state":null,"merged":null},{"author_name":"github-actions[bot]","author_avatar_url":"https://avatars.githubusercontent.com/in/15368?s=48&v=4","id":"2249855743","issue":{"issue":{"pull_request_id":null}},"repo":{"repository":{"id":177158447,"name":"TruBudget","owner_id":45228888,"owner_login":"openkfw","updated_at":"2024-05-23T13:23:23.707Z","has_issues":true}},"labels":["api","blockchain","security"],"num_comments":0,"number":1780,"state":"open","hl_title":"Security Report: Image Vulnerabilities","hl_text":null,"created":"2024-04-18T06:26:37.000Z","reviewable_state":null,"merged":null},{"author_name":"tuteng","author_avatar_url":"https://avatars.githubusercontent.com/u/1907867?s=48&v=4","id":"2291564027","issue":{"issue":{"pull_request_id":null}},"repo":{"repository":{"id":22478116,"name":"golang","owner_id":7739233,"owner_login":"docker-library","updated_at":"2024-05-22T19:02:13.773Z","has_issues":true}},"labels":[],"num_comments":1,"number":517,"state":"closed","hl_title":"CVE-2024-2961 for glibc","hl_text":null,"created":"2024-05-13T08:07:28.000+08:00","reviewable_state":null,"merged":null},{"author_name":"tuteng","author_avatar_url":"https://avatars.githubusercontent.com/u/1907867?s=48&v=4","id":"2291572658","issue":{"issue":{"pull_request_id":null}},"repo":{"repository":{"id":173972535,"name":"docker-alpine","owner_id":7600810,"owner_login":"alpinelinux","updated_at":"2024-05-22T10:58:46.123Z","has_issues":true}},"labels":[],"num_comments":5,"number":393,"state":"closed","hl_title":"CVE-2024-2961 for glibc","hl_text":null,"created":"2024-05-13T08:23:13.000+08:00","reviewable_state":null,"merged":null}],"type":"issues","page":1,"page_count":6,"elapsed_millis":67,"errors":[],"result_count":55,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Ftype%3DIssues%26q%3D%2522CVE-2024-2961%2522","metadata":null},"title":"Issue search results"}