mirror of
https://github.com/aquasecurity/trivy.git
synced 2025-12-12 07:40:48 -08:00
200 lines
9.4 KiB
Plaintext
200 lines
9.4 KiB
Plaintext
[
|
|
{
|
|
"Target": "testdata/fixtures/images/fluentd-multiple-lockfiles.tar.gz (debian 10.2)",
|
|
"Class": "os-pkgs",
|
|
"Type": "debian",
|
|
"Vulnerabilities": [
|
|
{
|
|
"VulnerabilityID": "CVE-2019-5188",
|
|
"PkgName": "e2fsprogs",
|
|
"InstalledVersion": "1.44.5-1+deb10u2",
|
|
"FixedVersion": "1.44.5-1+deb10u3",
|
|
"Layer": {
|
|
"DiffID": "sha256:831c5620387fb9efec59fc82a42b948546c6be601e3ab34a87108ecf852aa15f"
|
|
},
|
|
"SeveritySource": "nvd",
|
|
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-5188",
|
|
"Title": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c",
|
|
"Description": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
|
|
"Severity": "MEDIUM",
|
|
"CweIDs": [
|
|
"CWE-787"
|
|
],
|
|
"CVSS": {
|
|
"nvd": {
|
|
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"V2Score": 4.6
|
|
},
|
|
"redhat": {
|
|
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
|
"V3Score": 7.5
|
|
}
|
|
},
|
|
"References": [
|
|
"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html",
|
|
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188",
|
|
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/",
|
|
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/",
|
|
"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973",
|
|
"https://usn.ubuntu.com/4249-1/",
|
|
"https://usn.ubuntu.com/usn/usn-4249-1"
|
|
],
|
|
"PublishedDate": "2020-01-08T16:15:00Z",
|
|
"LastModifiedDate": "2020-01-28T06:15:00Z"
|
|
},
|
|
{
|
|
"VulnerabilityID": "CVE-2019-5188",
|
|
"PkgName": "libcom-err2",
|
|
"InstalledVersion": "1.44.5-1+deb10u2",
|
|
"FixedVersion": "1.44.5-1+deb10u3",
|
|
"Layer": {
|
|
"DiffID": "sha256:831c5620387fb9efec59fc82a42b948546c6be601e3ab34a87108ecf852aa15f"
|
|
},
|
|
"SeveritySource": "nvd",
|
|
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-5188",
|
|
"Title": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c",
|
|
"Description": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
|
|
"Severity": "MEDIUM",
|
|
"CweIDs": [
|
|
"CWE-787"
|
|
],
|
|
"CVSS": {
|
|
"nvd": {
|
|
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"V2Score": 4.6
|
|
},
|
|
"redhat": {
|
|
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
|
"V3Score": 7.5
|
|
}
|
|
},
|
|
"References": [
|
|
"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html",
|
|
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188",
|
|
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/",
|
|
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/",
|
|
"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973",
|
|
"https://usn.ubuntu.com/4249-1/",
|
|
"https://usn.ubuntu.com/usn/usn-4249-1"
|
|
],
|
|
"PublishedDate": "2020-01-08T16:15:00Z",
|
|
"LastModifiedDate": "2020-01-28T06:15:00Z"
|
|
},
|
|
{
|
|
"VulnerabilityID": "CVE-2019-5188",
|
|
"PkgName": "libext2fs2",
|
|
"InstalledVersion": "1.44.5-1+deb10u2",
|
|
"FixedVersion": "1.44.5-1+deb10u3",
|
|
"Layer": {
|
|
"DiffID": "sha256:831c5620387fb9efec59fc82a42b948546c6be601e3ab34a87108ecf852aa15f"
|
|
},
|
|
"SeveritySource": "nvd",
|
|
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-5188",
|
|
"Title": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c",
|
|
"Description": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
|
|
"Severity": "MEDIUM",
|
|
"CweIDs": [
|
|
"CWE-787"
|
|
],
|
|
"CVSS": {
|
|
"nvd": {
|
|
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"V2Score": 4.6
|
|
},
|
|
"redhat": {
|
|
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
|
"V3Score": 7.5
|
|
}
|
|
},
|
|
"References": [
|
|
"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html",
|
|
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188",
|
|
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/",
|
|
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/",
|
|
"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973",
|
|
"https://usn.ubuntu.com/4249-1/",
|
|
"https://usn.ubuntu.com/usn/usn-4249-1"
|
|
],
|
|
"PublishedDate": "2020-01-08T16:15:00Z",
|
|
"LastModifiedDate": "2020-01-28T06:15:00Z"
|
|
},
|
|
{
|
|
"VulnerabilityID": "CVE-2019-18224",
|
|
"PkgName": "libidn2-0",
|
|
"InstalledVersion": "2.0.5-1",
|
|
"FixedVersion": "2.0.5-1+deb10u1",
|
|
"Layer": {
|
|
"DiffID": "sha256:831c5620387fb9efec59fc82a42b948546c6be601e3ab34a87108ecf852aa15f"
|
|
},
|
|
"SeveritySource": "nvd",
|
|
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-18224",
|
|
"Title": "libidn2: heap-based buffer overflow in idn2_to_ascii_4i in lib/lookup.c",
|
|
"Description": "idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.",
|
|
"Severity": "HIGH",
|
|
"CweIDs": [
|
|
"CWE-787"
|
|
],
|
|
"CVSS": {
|
|
"nvd": {
|
|
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"V2Score": 7.5
|
|
},
|
|
"redhat": {
|
|
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"V3Score": 5.6
|
|
}
|
|
},
|
|
"References": [
|
|
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12420",
|
|
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18224",
|
|
"https://github.com/libidn/libidn2/commit/e4d1558aa2c1c04a05066ee8600f37603890ba8c",
|
|
"https://github.com/libidn/libidn2/compare/libidn2-2.1.0...libidn2-2.1.1",
|
|
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDQVQ2XPV5BTZUFINT7AFJSKNNBVURNJ/",
|
|
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MINU5RKDFE6TKAFY5DRFN3WSFDS4DYVS/",
|
|
"https://usn.ubuntu.com/4168-1/",
|
|
"https://usn.ubuntu.com/usn/usn-4168-1"
|
|
],
|
|
"PublishedDate": "2019-10-21T17:15:00Z",
|
|
"LastModifiedDate": "2019-10-29T19:15:00Z"
|
|
},
|
|
{
|
|
"VulnerabilityID": "CVE-2019-5188",
|
|
"PkgName": "libss2",
|
|
"InstalledVersion": "1.44.5-1+deb10u2",
|
|
"FixedVersion": "1.44.5-1+deb10u3",
|
|
"Layer": {
|
|
"DiffID": "sha256:831c5620387fb9efec59fc82a42b948546c6be601e3ab34a87108ecf852aa15f"
|
|
},
|
|
"SeveritySource": "nvd",
|
|
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-5188",
|
|
"Title": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c",
|
|
"Description": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
|
|
"Severity": "MEDIUM",
|
|
"CweIDs": [
|
|
"CWE-787"
|
|
],
|
|
"CVSS": {
|
|
"nvd": {
|
|
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"V2Score": 4.6
|
|
},
|
|
"redhat": {
|
|
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
|
"V3Score": 7.5
|
|
}
|
|
},
|
|
"References": [
|
|
"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html",
|
|
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188",
|
|
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/",
|
|
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/",
|
|
"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973",
|
|
"https://usn.ubuntu.com/4249-1/",
|
|
"https://usn.ubuntu.com/usn/usn-4249-1"
|
|
],
|
|
"PublishedDate": "2020-01-08T16:15:00Z",
|
|
"LastModifiedDate": "2020-01-28T06:15:00Z"
|
|
}
|
|
]
|
|
}
|
|
] |