[ { "Target": "testdata/fixtures/images/fluentd-multiple-lockfiles.tar.gz (debian 10.2)", "Class": "os-pkgs", "Type": "debian", "Vulnerabilities": [ { "VulnerabilityID": "CVE-2019-5188", "PkgName": "e2fsprogs", "InstalledVersion": "1.44.5-1+deb10u2", "FixedVersion": "1.44.5-1+deb10u3", "Layer": { "DiffID": "sha256:831c5620387fb9efec59fc82a42b948546c6be601e3ab34a87108ecf852aa15f" }, "SeveritySource": "nvd", "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-5188", "Title": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c", "Description": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "Severity": "MEDIUM", "CweIDs": [ "CWE-787" ], "CVSS": { "nvd": { "V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "V2Score": 4.6 }, "redhat": { "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "V3Score": 7.5 } }, "References": [ "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html", "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/", "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973", "https://usn.ubuntu.com/4249-1/", "https://usn.ubuntu.com/usn/usn-4249-1" ], "PublishedDate": "2020-01-08T16:15:00Z", "LastModifiedDate": "2020-01-28T06:15:00Z" }, { "VulnerabilityID": "CVE-2019-5188", "PkgName": "libcom-err2", "InstalledVersion": "1.44.5-1+deb10u2", "FixedVersion": "1.44.5-1+deb10u3", "Layer": { "DiffID": "sha256:831c5620387fb9efec59fc82a42b948546c6be601e3ab34a87108ecf852aa15f" }, "SeveritySource": "nvd", "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-5188", "Title": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c", "Description": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "Severity": "MEDIUM", "CweIDs": [ "CWE-787" ], "CVSS": { "nvd": { "V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "V2Score": 4.6 }, "redhat": { "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "V3Score": 7.5 } }, "References": [ "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html", "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/", "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973", "https://usn.ubuntu.com/4249-1/", "https://usn.ubuntu.com/usn/usn-4249-1" ], "PublishedDate": "2020-01-08T16:15:00Z", "LastModifiedDate": "2020-01-28T06:15:00Z" }, { "VulnerabilityID": "CVE-2019-5188", "PkgName": "libext2fs2", "InstalledVersion": "1.44.5-1+deb10u2", "FixedVersion": "1.44.5-1+deb10u3", "Layer": { "DiffID": "sha256:831c5620387fb9efec59fc82a42b948546c6be601e3ab34a87108ecf852aa15f" }, "SeveritySource": "nvd", "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-5188", "Title": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c", "Description": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "Severity": "MEDIUM", "CweIDs": [ "CWE-787" ], "CVSS": { "nvd": { "V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "V2Score": 4.6 }, "redhat": { "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "V3Score": 7.5 } }, "References": [ "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html", "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/", "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973", "https://usn.ubuntu.com/4249-1/", "https://usn.ubuntu.com/usn/usn-4249-1" ], "PublishedDate": "2020-01-08T16:15:00Z", "LastModifiedDate": "2020-01-28T06:15:00Z" }, { "VulnerabilityID": "CVE-2019-18224", "PkgName": "libidn2-0", "InstalledVersion": "2.0.5-1", "FixedVersion": "2.0.5-1+deb10u1", "Layer": { "DiffID": "sha256:831c5620387fb9efec59fc82a42b948546c6be601e3ab34a87108ecf852aa15f" }, "SeveritySource": "nvd", "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-18224", "Title": "libidn2: heap-based buffer overflow in idn2_to_ascii_4i in lib/lookup.c", "Description": "idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.", "Severity": "HIGH", "CweIDs": [ "CWE-787" ], "CVSS": { "nvd": { "V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "V2Score": 7.5 }, "redhat": { "V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "V3Score": 5.6 } }, "References": [ "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12420", "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18224", "https://github.com/libidn/libidn2/commit/e4d1558aa2c1c04a05066ee8600f37603890ba8c", "https://github.com/libidn/libidn2/compare/libidn2-2.1.0...libidn2-2.1.1", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDQVQ2XPV5BTZUFINT7AFJSKNNBVURNJ/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MINU5RKDFE6TKAFY5DRFN3WSFDS4DYVS/", "https://usn.ubuntu.com/4168-1/", "https://usn.ubuntu.com/usn/usn-4168-1" ], "PublishedDate": "2019-10-21T17:15:00Z", "LastModifiedDate": "2019-10-29T19:15:00Z" }, { "VulnerabilityID": "CVE-2019-5188", "PkgName": "libss2", "InstalledVersion": "1.44.5-1+deb10u2", "FixedVersion": "1.44.5-1+deb10u3", "Layer": { "DiffID": "sha256:831c5620387fb9efec59fc82a42b948546c6be601e3ab34a87108ecf852aa15f" }, "SeveritySource": "nvd", "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-5188", "Title": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c", "Description": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "Severity": "MEDIUM", "CweIDs": [ "CWE-787" ], "CVSS": { "nvd": { "V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "V2Score": 4.6 }, "redhat": { "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "V3Score": 7.5 } }, "References": [ "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html", "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/", "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973", "https://usn.ubuntu.com/4249-1/", "https://usn.ubuntu.com/usn/usn-4249-1" ], "PublishedDate": "2020-01-08T16:15:00Z", "LastModifiedDate": "2020-01-28T06:15:00Z" } ] } ]