Files
trivy/integration/testdata/ubuntu-1604.json.golden
Teppei Fukuda aca31dffb3 detector: Add LayerID to detect vulns (#419)
* detector/alpine: Add LayerID to detect vulns

Signed-off-by: Simarpreet Singh <simar@linux.com>

* amazon: Add LayerID to DetectedVulns

Signed-off-by: Simarpreet Singh <simar@linux.com>

* debian: Add LayerID to DetectVulns + tests

Signed-off-by: Simarpreet Singh <simar@linux.com>

* oracle: Add LayerID to DetectVulns + tests

Signed-off-by: Simarpreet Singh <simar@linux.com>

* photon: Add LayerID to DetectVulns + tests

Signed-off-by: Simarpreet Singh <simar@linux.com>

* redhat: Add LayerID to DetectVulns + tests

Signed-off-by: Simarpreet Singh <simar@linux.com>

* suse: Add LayerID to DetectVulns + tests

Signed-off-by: Simarpreet Singh <simar@linux.com>

* ubuntu: Add LayerID to DetectVulns + tests

Signed-off-by: Simarpreet Singh <simar@linux.com>

* integration: Fix integration tests to include LayerID

Signed-off-by: Simarpreet Singh <simar@linux.com>

* fix(rpc): add layer_id

* fix(rpc): insert layer_id to the struct

* fix(extractor): add cleanup function

* fix(library): add layer ID to detected vulnerabilities

* test: update mocks

* chore(mod): point to the feature branch of fanal

* mod: Point to fanal/master

Signed-off-by: Simarpreet Singh <simar@linux.com>

* scan_test: Include LayerID as part of the assertion

Signed-off-by: Simarpreet Singh <simar@linux.com>

* docker_engine_test.go: Update an error message to conform with fanal/master.

Signed-off-by: Simarpreet Singh <simar@linux.com>

Co-authored-by: Teppei Fukuda <knqyf263@gmail.com>
2020-03-04 19:55:16 +02:00

2563 lines
155 KiB
Plaintext

[
{
"Target": "testdata/fixtures/ubuntu-1604.tar.gz (ubuntu 16.04)",
"Vulnerabilities": [
{
"VulnerabilityID": "CVE-2016-2779",
"PkgName": "bsdutils",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: runuser tty hijack via TIOCSTI ioctl",
"Description": "runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
"Severity": "HIGH",
"References": [
"http://www.openwall.com/lists/oss-security/2016/02/27/1",
"http://www.openwall.com/lists/oss-security/2016/02/27/2",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779"
]
},
{
"VulnerabilityID": "CVE-2016-5011",
"PkgName": "bsdutils",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: Extended partition loop in MBR partition table leads to DOS",
"Description": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"Severity": "MEDIUM",
"References": [
"http://rhn.redhat.com/errata/RHSA-2016-2605.html",
"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543",
"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801",
"http://www.openwall.com/lists/oss-security/2016/07/11/2",
"http://www.securityfocus.com/bid/91683",
"http://www.securitytracker.com/id/1036272",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011",
"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"
]
},
{
"VulnerabilityID": "CVE-2016-2781",
"PkgName": "coreutils",
"InstalledVersion": "8.25-2ubuntu3~16.04",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "coreutils: Non-privileged session can escape to the parent session in chroot",
"Description": "chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
"Severity": "LOW",
"References": [
"http://www.openwall.com/lists/oss-security/2016/02/28/2",
"http://www.openwall.com/lists/oss-security/2016/02/28/3"
]
},
{
"VulnerabilityID": "CVE-2017-8283",
"PkgName": "dpkg",
"InstalledVersion": "1.18.4ubuntu1.5",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Description": "dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.",
"Severity": "HIGH",
"References": [
"http://www.openwall.com/lists/oss-security/2017/04/20/2",
"http://www.securityfocus.com/bid/98064",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8283"
]
},
{
"VulnerabilityID": "CVE-2019-5094",
"PkgName": "e2fslibs",
"InstalledVersion": "1.42.13-1ubuntu1",
"FixedVersion": "1.42.13-1ubuntu1.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Description": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html",
"https://seclists.org/bugtraq/2019/Sep/58",
"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887",
"https://usn.ubuntu.com/4142-2/",
"https://www.debian.org/security/2019/dsa-4535"
]
},
{
"VulnerabilityID": "CVE-2019-5094",
"PkgName": "e2fsprogs",
"InstalledVersion": "1.42.13-1ubuntu1",
"FixedVersion": "1.42.13-1ubuntu1.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Description": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html",
"https://seclists.org/bugtraq/2019/Sep/58",
"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887",
"https://usn.ubuntu.com/4142-2/",
"https://www.debian.org/security/2019/dsa-4535"
]
},
{
"VulnerabilityID": "CVE-2019-13050",
"PkgName": "gnupg",
"InstalledVersion": "1.4.20-1ubuntu3.3",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS",
"Description": "Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.",
"Severity": "MEDIUM",
"References": [
"https://access.redhat.com/articles/4264021",
"https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f",
"https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html",
"https://twitter.com/lambdafu/status/1147162583969009664"
]
},
{
"VulnerabilityID": "CVE-2019-13050",
"PkgName": "gpgv",
"InstalledVersion": "1.4.20-1ubuntu3.3",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS",
"Description": "Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.",
"Severity": "MEDIUM",
"References": [
"https://access.redhat.com/articles/4264021",
"https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f",
"https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html",
"https://twitter.com/lambdafu/status/1147162583969009664"
]
},
{
"VulnerabilityID": "CVE-2016-1585",
"PkgName": "libapparmor1",
"InstalledVersion": "2.10.95-0ubuntu2.11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Description": "In all versions of AppArmor mount rules are accidentally widened when compiled.",
"Severity": "HIGH",
"References": [
"https://bugs.launchpad.net/apparmor/+bug/1597017"
]
},
{
"VulnerabilityID": "CVE-2016-2779",
"PkgName": "libblkid1",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: runuser tty hijack via TIOCSTI ioctl",
"Description": "runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
"Severity": "HIGH",
"References": [
"http://www.openwall.com/lists/oss-security/2016/02/27/1",
"http://www.openwall.com/lists/oss-security/2016/02/27/2",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779"
]
},
{
"VulnerabilityID": "CVE-2016-5011",
"PkgName": "libblkid1",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: Extended partition loop in MBR partition table leads to DOS",
"Description": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"Severity": "MEDIUM",
"References": [
"http://rhn.redhat.com/errata/RHSA-2016-2605.html",
"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543",
"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801",
"http://www.openwall.com/lists/oss-security/2016/07/11/2",
"http://www.securityfocus.com/bid/91683",
"http://www.securitytracker.com/id/1036272",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011",
"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"
]
},
{
"VulnerabilityID": "CVE-2017-18269",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: memory corruption in memcpy-sse2-unaligned.S",
"Description": "An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.",
"Severity": "HIGH",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269",
"https://github.com/fingolfin/memmove-bug",
"https://security.netapp.com/advisory/ntap-20190329-0001/",
"https://security.netapp.com/advisory/ntap-20190401-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22644",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=cd66c0e584c6d692bc8347b5e72723d02b8a8ada"
]
},
{
"VulnerabilityID": "CVE-2018-11236",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow",
"Description": "stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.",
"Severity": "HIGH",
"References": [
"http://www.securityfocus.com/bid/104255",
"https://access.redhat.com/errata/RHBA-2019:0327",
"https://access.redhat.com/errata/RHSA-2018:3092",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236",
"https://security.netapp.com/advisory/ntap-20190329-0001/",
"https://security.netapp.com/advisory/ntap-20190401-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22786",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
]
},
{
"VulnerabilityID": "CVE-2018-6485",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Integer overflow in posix_memalign in memalign functions",
"Description": "An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.",
"Severity": "HIGH",
"References": [
"http://bugs.debian.org/878159",
"http://www.securityfocus.com/bid/102912",
"https://access.redhat.com/errata/RHBA-2019:0327",
"https://access.redhat.com/errata/RHSA-2018:3092",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485",
"https://security.netapp.com/advisory/ntap-20190404-0003/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22343",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
]
},
{
"VulnerabilityID": "CVE-2019-9169",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over-read",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.",
"Severity": "HIGH",
"References": [
"http://www.securityfocus.com/bid/107160",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142",
"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10278",
"https://security.netapp.com/advisory/ntap-20190315-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24114",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9",
"https://support.f5.com/csp/article/K54823184"
]
},
{
"VulnerabilityID": "CVE-2009-5155",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result",
"Description": "In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.",
"Severity": "MEDIUM",
"References": [
"http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238",
"https://security.netapp.com/advisory/ntap-20190315-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=11053",
"https://sourceware.org/bugzilla/show_bug.cgi?id=18986",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672",
"https://support.f5.com/csp/article/K64119434"
]
},
{
"VulnerabilityID": "CVE-2015-5180",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: DNS resolver NULL pointer dereference with crafted record type",
"Description": "res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/99324",
"http://www.ubuntu.com/usn/USN-3239-1",
"http://www.ubuntu.com/usn/USN-3239-2",
"https://access.redhat.com/errata/RHSA-2018:0805",
"https://bugzilla.redhat.com/show_bug.cgi?id=1249603",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180",
"https://security.gentoo.org/glsa/201706-19",
"https://sourceware.org/bugzilla/attachment.cgi?id=8492",
"https://sourceware.org/bugzilla/show_bug.cgi?id=18784",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=fc82b0a2dfe7dbd35671c10510a8da1043d746a5",
"https://sourceware.org/ml/libc-alpha/2017-02/msg00079.html"
]
},
{
"VulnerabilityID": "CVE-2015-8985",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: potential denial of service in pop_fail_stack()",
"Description": "The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.",
"Severity": "MEDIUM",
"References": [
"http://www.openwall.com/lists/oss-security/2017/02/14/9",
"http://www.securityfocus.com/bid/76916",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985",
"https://security.gentoo.org/glsa/201908-06"
]
},
{
"VulnerabilityID": "CVE-2016-10228",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: iconv program can hang when invoked with the -c option",
"Description": "The iconv program in the GNU C Library (aka glibc or libc6) 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.",
"Severity": "MEDIUM",
"References": [
"http://openwall.com/lists/oss-security/2017/03/01/10",
"http://www.securityfocus.com/bid/96525",
"https://sourceware.org/bugzilla/show_bug.cgi?id=19519"
]
},
{
"VulnerabilityID": "CVE-2016-10739",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: getaddrinfo should reject IP addresses with trailing characters",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.",
"Severity": "MEDIUM",
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html",
"http://www.securityfocus.com/bid/106672",
"https://access.redhat.com/errata/RHSA-2019:2118",
"https://bugzilla.redhat.com/show_bug.cgi?id=1347549",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739",
"https://sourceware.org/bugzilla/show_bug.cgi?id=20018"
]
},
{
"VulnerabilityID": "CVE-2017-12132",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Fragmentation attacks possible when EDNS0 is enabled",
"Description": "The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/100598",
"https://access.redhat.com/errata/RHSA-2018:0805",
"https://arxiv.org/pdf/1205.4011.pdf",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132",
"https://sourceware.org/bugzilla/show_bug.cgi?id=21361"
]
},
{
"VulnerabilityID": "CVE-2017-12133",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Use-after-free read access in clntudp_call in sunrpc",
"Description": "Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYZL6PAKI73XYRJYL5VLDGA4FFGWMB7A/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=21115",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d42eed4a044e5e10dfb885cf9891c2518a72a491",
"https://www.securityfocus.com/bid/100679"
]
},
{
"VulnerabilityID": "CVE-2018-11237",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Buffer overflow in __mempcpy_avx512_no_vzeroupper",
"Description": "An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/104256",
"https://access.redhat.com/errata/RHBA-2019:0327",
"https://access.redhat.com/errata/RHSA-2018:3092",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237",
"https://security.netapp.com/advisory/ntap-20190329-0001/",
"https://security.netapp.com/advisory/ntap-20190401-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23196",
"https://www.exploit-db.com/exploits/44750/",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
]
},
{
"VulnerabilityID": "CVE-2018-20796",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/107160",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
"https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
"https://security.netapp.com/advisory/ntap-20190315-0002/"
]
},
{
"VulnerabilityID": "CVE-2019-9192",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "** DISPUTED ** In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern.",
"Severity": "MEDIUM",
"References": [
"https://sourceware.org/bugzilla/show_bug.cgi?id=24269"
]
},
{
"VulnerabilityID": "CVE-2019-7309",
"PkgName": "libc-bin",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: memcmp function incorrectly returns zero",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.",
"Severity": "LOW",
"References": [
"http://www.securityfocus.com/bid/106835",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24155",
"https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html"
]
},
{
"VulnerabilityID": "CVE-2017-18269",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: memory corruption in memcpy-sse2-unaligned.S",
"Description": "An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.",
"Severity": "HIGH",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269",
"https://github.com/fingolfin/memmove-bug",
"https://security.netapp.com/advisory/ntap-20190329-0001/",
"https://security.netapp.com/advisory/ntap-20190401-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22644",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=cd66c0e584c6d692bc8347b5e72723d02b8a8ada"
]
},
{
"VulnerabilityID": "CVE-2018-11236",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow",
"Description": "stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.",
"Severity": "HIGH",
"References": [
"http://www.securityfocus.com/bid/104255",
"https://access.redhat.com/errata/RHBA-2019:0327",
"https://access.redhat.com/errata/RHSA-2018:3092",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236",
"https://security.netapp.com/advisory/ntap-20190329-0001/",
"https://security.netapp.com/advisory/ntap-20190401-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22786",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
]
},
{
"VulnerabilityID": "CVE-2018-6485",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Integer overflow in posix_memalign in memalign functions",
"Description": "An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.",
"Severity": "HIGH",
"References": [
"http://bugs.debian.org/878159",
"http://www.securityfocus.com/bid/102912",
"https://access.redhat.com/errata/RHBA-2019:0327",
"https://access.redhat.com/errata/RHSA-2018:3092",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485",
"https://security.netapp.com/advisory/ntap-20190404-0003/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22343",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
]
},
{
"VulnerabilityID": "CVE-2019-9169",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over-read",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.",
"Severity": "HIGH",
"References": [
"http://www.securityfocus.com/bid/107160",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142",
"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10278",
"https://security.netapp.com/advisory/ntap-20190315-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24114",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9",
"https://support.f5.com/csp/article/K54823184"
]
},
{
"VulnerabilityID": "CVE-2009-5155",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result",
"Description": "In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.",
"Severity": "MEDIUM",
"References": [
"http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238",
"https://security.netapp.com/advisory/ntap-20190315-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=11053",
"https://sourceware.org/bugzilla/show_bug.cgi?id=18986",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672",
"https://support.f5.com/csp/article/K64119434"
]
},
{
"VulnerabilityID": "CVE-2015-5180",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: DNS resolver NULL pointer dereference with crafted record type",
"Description": "res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/99324",
"http://www.ubuntu.com/usn/USN-3239-1",
"http://www.ubuntu.com/usn/USN-3239-2",
"https://access.redhat.com/errata/RHSA-2018:0805",
"https://bugzilla.redhat.com/show_bug.cgi?id=1249603",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180",
"https://security.gentoo.org/glsa/201706-19",
"https://sourceware.org/bugzilla/attachment.cgi?id=8492",
"https://sourceware.org/bugzilla/show_bug.cgi?id=18784",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=fc82b0a2dfe7dbd35671c10510a8da1043d746a5",
"https://sourceware.org/ml/libc-alpha/2017-02/msg00079.html"
]
},
{
"VulnerabilityID": "CVE-2015-8985",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: potential denial of service in pop_fail_stack()",
"Description": "The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.",
"Severity": "MEDIUM",
"References": [
"http://www.openwall.com/lists/oss-security/2017/02/14/9",
"http://www.securityfocus.com/bid/76916",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985",
"https://security.gentoo.org/glsa/201908-06"
]
},
{
"VulnerabilityID": "CVE-2016-10228",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: iconv program can hang when invoked with the -c option",
"Description": "The iconv program in the GNU C Library (aka glibc or libc6) 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.",
"Severity": "MEDIUM",
"References": [
"http://openwall.com/lists/oss-security/2017/03/01/10",
"http://www.securityfocus.com/bid/96525",
"https://sourceware.org/bugzilla/show_bug.cgi?id=19519"
]
},
{
"VulnerabilityID": "CVE-2016-10739",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: getaddrinfo should reject IP addresses with trailing characters",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.",
"Severity": "MEDIUM",
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html",
"http://www.securityfocus.com/bid/106672",
"https://access.redhat.com/errata/RHSA-2019:2118",
"https://bugzilla.redhat.com/show_bug.cgi?id=1347549",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739",
"https://sourceware.org/bugzilla/show_bug.cgi?id=20018"
]
},
{
"VulnerabilityID": "CVE-2017-12132",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Fragmentation attacks possible when EDNS0 is enabled",
"Description": "The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/100598",
"https://access.redhat.com/errata/RHSA-2018:0805",
"https://arxiv.org/pdf/1205.4011.pdf",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132",
"https://sourceware.org/bugzilla/show_bug.cgi?id=21361"
]
},
{
"VulnerabilityID": "CVE-2017-12133",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Use-after-free read access in clntudp_call in sunrpc",
"Description": "Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYZL6PAKI73XYRJYL5VLDGA4FFGWMB7A/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=21115",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d42eed4a044e5e10dfb885cf9891c2518a72a491",
"https://www.securityfocus.com/bid/100679"
]
},
{
"VulnerabilityID": "CVE-2018-11237",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Buffer overflow in __mempcpy_avx512_no_vzeroupper",
"Description": "An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/104256",
"https://access.redhat.com/errata/RHBA-2019:0327",
"https://access.redhat.com/errata/RHSA-2018:3092",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237",
"https://security.netapp.com/advisory/ntap-20190329-0001/",
"https://security.netapp.com/advisory/ntap-20190401-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23196",
"https://www.exploit-db.com/exploits/44750/",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
]
},
{
"VulnerabilityID": "CVE-2018-20796",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/107160",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
"https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
"https://security.netapp.com/advisory/ntap-20190315-0002/"
]
},
{
"VulnerabilityID": "CVE-2019-9192",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "** DISPUTED ** In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern.",
"Severity": "MEDIUM",
"References": [
"https://sourceware.org/bugzilla/show_bug.cgi?id=24269"
]
},
{
"VulnerabilityID": "CVE-2019-7309",
"PkgName": "libc6",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: memcmp function incorrectly returns zero",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.",
"Severity": "LOW",
"References": [
"http://www.securityfocus.com/bid/106835",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24155",
"https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html"
]
},
{
"VulnerabilityID": "CVE-2019-5094",
"PkgName": "libcomerr2",
"InstalledVersion": "1.42.13-1ubuntu1",
"FixedVersion": "1.42.13-1ubuntu1.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Description": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html",
"https://seclists.org/bugtraq/2019/Sep/58",
"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887",
"https://usn.ubuntu.com/4142-2/",
"https://www.debian.org/security/2019/dsa-4535"
]
},
{
"VulnerabilityID": "CVE-2016-4484",
"PkgName": "libcryptsetup4",
"InstalledVersion": "2:1.6.6-5ubuntu2.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "dracut: Brute force attack on LUKS password decryption via initramfs",
"Description": "The Debian initrd script for the cryptsetup package 2:1.7.3-2 and earlier allows physically proximate attackers to gain shell access via many log in attempts with an invalid password.",
"Severity": "HIGH",
"References": [
"http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html",
"http://www.openwall.com/lists/oss-security/2016/11/14/13",
"http://www.openwall.com/lists/oss-security/2016/11/15/1",
"http://www.openwall.com/lists/oss-security/2016/11/15/4",
"http://www.openwall.com/lists/oss-security/2016/11/16/6",
"http://www.securityfocus.com/bid/94315",
"https://access.redhat.com/articles/2786581",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4484",
"https://gitlab.com/cryptsetup/cryptsetup/commit/ef8a7d82d8d3716ae9b58179590f7908981fa0cb"
]
},
{
"VulnerabilityID": "CVE-2016-2779",
"PkgName": "libfdisk1",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: runuser tty hijack via TIOCSTI ioctl",
"Description": "runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
"Severity": "HIGH",
"References": [
"http://www.openwall.com/lists/oss-security/2016/02/27/1",
"http://www.openwall.com/lists/oss-security/2016/02/27/2",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779"
]
},
{
"VulnerabilityID": "CVE-2016-5011",
"PkgName": "libfdisk1",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: Extended partition loop in MBR partition table leads to DOS",
"Description": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"Severity": "MEDIUM",
"References": [
"http://rhn.redhat.com/errata/RHSA-2016-2605.html",
"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543",
"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801",
"http://www.openwall.com/lists/oss-security/2016/07/11/2",
"http://www.securityfocus.com/bid/91683",
"http://www.securitytracker.com/id/1036272",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011",
"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"
]
},
{
"VulnerabilityID": "CVE-2019-13627",
"PkgName": "libgcrypt20",
"InstalledVersion": "1.6.5-2ubuntu0.5",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Description": "It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.",
"Severity": "MEDIUM",
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html",
"http://www.openwall.com/lists/oss-security/2019/10/02/2",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627",
"https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html",
"https://minerva.crocs.fi.muni.cz/",
"https://security-tracker.debian.org/tracker/CVE-2019-13627"
]
},
{
"VulnerabilityID": "CVE-2016-2779",
"PkgName": "libmount1",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: runuser tty hijack via TIOCSTI ioctl",
"Description": "runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
"Severity": "HIGH",
"References": [
"http://www.openwall.com/lists/oss-security/2016/02/27/1",
"http://www.openwall.com/lists/oss-security/2016/02/27/2",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779"
]
},
{
"VulnerabilityID": "CVE-2016-5011",
"PkgName": "libmount1",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: Extended partition loop in MBR partition table leads to DOS",
"Description": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"Severity": "MEDIUM",
"References": [
"http://rhn.redhat.com/errata/RHSA-2016-2605.html",
"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543",
"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801",
"http://www.openwall.com/lists/oss-security/2016/07/11/2",
"http://www.securityfocus.com/bid/91683",
"http://www.securitytracker.com/id/1036272",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011",
"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"
]
},
{
"VulnerabilityID": "CVE-2017-10684",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c",
"Description": "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"Severity": "HIGH",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464687",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-10685",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function",
"Description": "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"Severity": "HIGH",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464692",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-11112",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in append_acs function",
"Description": "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464686",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-11113",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Null pointer dereference vulnerability in _nc_parse_entry function",
"Description": "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464691",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13728",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Infinite loop in the next_char function",
"Description": "There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484274",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13729",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the _nc_save_str function",
"Description": "There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484276",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13730",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function _nc_read_entry_source()",
"Description": "There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484284",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13731",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function postprocess_termcap()",
"Description": "There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484285",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13732",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function dump_uses()",
"Description": "There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484287",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13733",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function fmt_entry",
"Description": "There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484290",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13734",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function _nc_safe_strcat",
"Description": "There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484291",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-16879",
"PkgName": "libncurses5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow in the _nc_write_entry function",
"Description": "Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.",
"Severity": "MEDIUM",
"References": [
"http://invisible-island.net/ncurses/NEWS.html#t20171125",
"http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879",
"https://security.gentoo.org/glsa/201804-13",
"https://tools.cisco.com/security/center/viewAlert.x?alertId=57695"
]
},
{
"VulnerabilityID": "CVE-2017-10684",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c",
"Description": "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"Severity": "HIGH",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464687",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-10685",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function",
"Description": "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"Severity": "HIGH",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464692",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-11112",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in append_acs function",
"Description": "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464686",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-11113",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Null pointer dereference vulnerability in _nc_parse_entry function",
"Description": "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464691",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13728",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Infinite loop in the next_char function",
"Description": "There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484274",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13729",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the _nc_save_str function",
"Description": "There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484276",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13730",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function _nc_read_entry_source()",
"Description": "There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484284",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13731",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function postprocess_termcap()",
"Description": "There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484285",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13732",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function dump_uses()",
"Description": "There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484287",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13733",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function fmt_entry",
"Description": "There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484290",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13734",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function _nc_safe_strcat",
"Description": "There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484291",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-16879",
"PkgName": "libncursesw5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow in the _nc_write_entry function",
"Description": "Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.",
"Severity": "MEDIUM",
"References": [
"http://invisible-island.net/ncurses/NEWS.html#t20171125",
"http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879",
"https://security.gentoo.org/glsa/201804-13",
"https://tools.cisco.com/security/center/viewAlert.x?alertId=57695"
]
},
{
"VulnerabilityID": "CVE-2017-11164",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.38-3.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "pcre: OP_KETRMAX feature in the match function in pcre_exec.c",
"Description": "In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.",
"Severity": "HIGH",
"References": [
"http://openwall.com/lists/oss-security/2017/07/11/3",
"http://www.securityfocus.com/bid/99575"
]
},
{
"VulnerabilityID": "CVE-2017-6004",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.38-3.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3)",
"Description": "The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/96295",
"http://www.securitytracker.com/id/1037850",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://bugs.exim.org/show_bug.cgi?id=2035",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004",
"https://security.gentoo.org/glsa/201706-11",
"https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676\u0026r2=1680\u0026view=patch"
]
},
{
"VulnerabilityID": "CVE-2017-7186",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.38-3.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "pcre: Invalid Unicode property lookup (8.41/7, 10.24/2)",
"Description": "libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/97030",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/",
"https://bugs.exim.org/show_bug.cgi?id=2052",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186",
"https://security.gentoo.org/glsa/201710-09",
"https://security.gentoo.org/glsa/201710-25",
"https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649\u0026r2=1688\u0026sortby=date",
"https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490\u0026r2=1688\u0026sortby=date",
"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600\u0026r2=670\u0026sortby=date",
"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316\u0026r2=670\u0026sortby=date"
]
},
{
"VulnerabilityID": "CVE-2017-7244",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.38-3.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c)",
"Description": "The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244",
"https://security.gentoo.org/glsa/201710-25"
]
},
{
"VulnerabilityID": "CVE-2017-7245",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.38-3.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
]
},
{
"VulnerabilityID": "CVE-2017-7246",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.38-3.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
]
},
{
"VulnerabilityID": "CVE-2016-2779",
"PkgName": "libsmartcols1",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: runuser tty hijack via TIOCSTI ioctl",
"Description": "runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
"Severity": "HIGH",
"References": [
"http://www.openwall.com/lists/oss-security/2016/02/27/1",
"http://www.openwall.com/lists/oss-security/2016/02/27/2",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779"
]
},
{
"VulnerabilityID": "CVE-2016-5011",
"PkgName": "libsmartcols1",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: Extended partition loop in MBR partition table leads to DOS",
"Description": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"Severity": "MEDIUM",
"References": [
"http://rhn.redhat.com/errata/RHSA-2016-2605.html",
"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543",
"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801",
"http://www.openwall.com/lists/oss-security/2016/07/11/2",
"http://www.securityfocus.com/bid/91683",
"http://www.securitytracker.com/id/1036272",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011",
"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"
]
},
{
"VulnerabilityID": "CVE-2019-5094",
"PkgName": "libss2",
"InstalledVersion": "1.42.13-1ubuntu1",
"FixedVersion": "1.42.13-1ubuntu1.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Description": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html",
"https://seclists.org/bugtraq/2019/Sep/58",
"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887",
"https://usn.ubuntu.com/4142-2/",
"https://www.debian.org/security/2019/dsa-4535"
]
},
{
"VulnerabilityID": "CVE-2018-20839",
"PkgName": "libsystemd0",
"InstalledVersion": "229-4ubuntu21.22",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "systemd: mishandling of the current keyboard mode check leading to passwords being disclosed in cleartext to attacker",
"Description": "systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/108389",
"https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1803993",
"https://github.com/systemd/systemd/commit/9725f1a10f80f5e0ae7d9b60547458622aeb322f",
"https://github.com/systemd/systemd/pull/12378",
"https://security.netapp.com/advisory/ntap-20190530-0002/"
]
},
{
"VulnerabilityID": "CVE-2018-16888",
"PkgName": "libsystemd0",
"InstalledVersion": "229-4ubuntu21.22",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "systemd: kills privileged process if unprivileged PIDFile was tampered",
"Description": "It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.",
"Severity": "LOW",
"References": [
"https://access.redhat.com/errata/RHSA-2019:2091",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888",
"https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20190307-0007/"
]
},
{
"VulnerabilityID": "CVE-2017-10684",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c",
"Description": "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"Severity": "HIGH",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464687",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-10685",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function",
"Description": "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"Severity": "HIGH",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464692",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-11112",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in append_acs function",
"Description": "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464686",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-11113",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Null pointer dereference vulnerability in _nc_parse_entry function",
"Description": "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464691",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13728",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Infinite loop in the next_char function",
"Description": "There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484274",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13729",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the _nc_save_str function",
"Description": "There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484276",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13730",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function _nc_read_entry_source()",
"Description": "There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484284",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13731",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function postprocess_termcap()",
"Description": "There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484285",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13732",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function dump_uses()",
"Description": "There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484287",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13733",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function fmt_entry",
"Description": "There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484290",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13734",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function _nc_safe_strcat",
"Description": "There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484291",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-16879",
"PkgName": "libtinfo5",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow in the _nc_write_entry function",
"Description": "Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.",
"Severity": "MEDIUM",
"References": [
"http://invisible-island.net/ncurses/NEWS.html#t20171125",
"http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879",
"https://security.gentoo.org/glsa/201804-13",
"https://tools.cisco.com/security/center/viewAlert.x?alertId=57695"
]
},
{
"VulnerabilityID": "CVE-2018-20839",
"PkgName": "libudev1",
"InstalledVersion": "229-4ubuntu21.22",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "systemd: mishandling of the current keyboard mode check leading to passwords being disclosed in cleartext to attacker",
"Description": "systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/108389",
"https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1803993",
"https://github.com/systemd/systemd/commit/9725f1a10f80f5e0ae7d9b60547458622aeb322f",
"https://github.com/systemd/systemd/pull/12378",
"https://security.netapp.com/advisory/ntap-20190530-0002/"
]
},
{
"VulnerabilityID": "CVE-2018-16888",
"PkgName": "libudev1",
"InstalledVersion": "229-4ubuntu21.22",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "systemd: kills privileged process if unprivileged PIDFile was tampered",
"Description": "It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.",
"Severity": "LOW",
"References": [
"https://access.redhat.com/errata/RHSA-2019:2091",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888",
"https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20190307-0007/"
]
},
{
"VulnerabilityID": "CVE-2016-2779",
"PkgName": "libuuid1",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: runuser tty hijack via TIOCSTI ioctl",
"Description": "runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
"Severity": "HIGH",
"References": [
"http://www.openwall.com/lists/oss-security/2016/02/27/1",
"http://www.openwall.com/lists/oss-security/2016/02/27/2",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779"
]
},
{
"VulnerabilityID": "CVE-2016-5011",
"PkgName": "libuuid1",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: Extended partition loop in MBR partition table leads to DOS",
"Description": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"Severity": "MEDIUM",
"References": [
"http://rhn.redhat.com/errata/RHSA-2016-2605.html",
"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543",
"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801",
"http://www.openwall.com/lists/oss-security/2016/07/11/2",
"http://www.securityfocus.com/bid/91683",
"http://www.securitytracker.com/id/1036272",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011",
"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"
]
},
{
"VulnerabilityID": "CVE-2017-12424",
"PkgName": "login",
"InstalledVersion": "1:4.2-3.1ubuntu5.4",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "shadow-utils: Buffer overflow via newusers tool",
"Description": "In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Control Panel allows an unprivileged user account to create subaccounts.",
"Severity": "HIGH",
"References": [
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630",
"https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12424",
"https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952",
"https://security.gentoo.org/glsa/201710-16"
]
},
{
"VulnerabilityID": "CVE-2018-7169",
"PkgName": "login",
"InstalledVersion": "1:4.2-3.1ubuntu5.4",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation",
"Description": "An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used \"group blacklisting\" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.",
"Severity": "MEDIUM",
"References": [
"https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357",
"https://security.gentoo.org/glsa/201805-09"
]
},
{
"VulnerabilityID": "CVE-2013-4235",
"PkgName": "login",
"InstalledVersion": "1:4.2-3.1ubuntu5.4",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "shadow-utils: TOCTOU race conditions by copying and removing directory trees",
"Description": "A TOCTOU race condition was discovered in shadow-utils. A local attacker with write privileges in a directory removed or copied by usermod/userdel could potentially exploit this flaw, when the administrator invokes usermod/userdel, to delete or modify other files on the system.",
"Severity": "LOW"
},
{
"VulnerabilityID": "CVE-2016-2779",
"PkgName": "mount",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: runuser tty hijack via TIOCSTI ioctl",
"Description": "runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
"Severity": "HIGH",
"References": [
"http://www.openwall.com/lists/oss-security/2016/02/27/1",
"http://www.openwall.com/lists/oss-security/2016/02/27/2",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779"
]
},
{
"VulnerabilityID": "CVE-2016-5011",
"PkgName": "mount",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: Extended partition loop in MBR partition table leads to DOS",
"Description": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"Severity": "MEDIUM",
"References": [
"http://rhn.redhat.com/errata/RHSA-2016-2605.html",
"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543",
"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801",
"http://www.openwall.com/lists/oss-security/2016/07/11/2",
"http://www.securityfocus.com/bid/91683",
"http://www.securitytracker.com/id/1036272",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011",
"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"
]
},
{
"VulnerabilityID": "CVE-2017-18269",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: memory corruption in memcpy-sse2-unaligned.S",
"Description": "An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.",
"Severity": "HIGH",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269",
"https://github.com/fingolfin/memmove-bug",
"https://security.netapp.com/advisory/ntap-20190329-0001/",
"https://security.netapp.com/advisory/ntap-20190401-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22644",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=cd66c0e584c6d692bc8347b5e72723d02b8a8ada"
]
},
{
"VulnerabilityID": "CVE-2018-11236",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow",
"Description": "stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.",
"Severity": "HIGH",
"References": [
"http://www.securityfocus.com/bid/104255",
"https://access.redhat.com/errata/RHBA-2019:0327",
"https://access.redhat.com/errata/RHSA-2018:3092",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236",
"https://security.netapp.com/advisory/ntap-20190329-0001/",
"https://security.netapp.com/advisory/ntap-20190401-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22786",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
]
},
{
"VulnerabilityID": "CVE-2018-6485",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Integer overflow in posix_memalign in memalign functions",
"Description": "An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.",
"Severity": "HIGH",
"References": [
"http://bugs.debian.org/878159",
"http://www.securityfocus.com/bid/102912",
"https://access.redhat.com/errata/RHBA-2019:0327",
"https://access.redhat.com/errata/RHSA-2018:3092",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485",
"https://security.netapp.com/advisory/ntap-20190404-0003/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22343",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
]
},
{
"VulnerabilityID": "CVE-2019-9169",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over-read",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.",
"Severity": "HIGH",
"References": [
"http://www.securityfocus.com/bid/107160",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142",
"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10278",
"https://security.netapp.com/advisory/ntap-20190315-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24114",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9",
"https://support.f5.com/csp/article/K54823184"
]
},
{
"VulnerabilityID": "CVE-2009-5155",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result",
"Description": "In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.",
"Severity": "MEDIUM",
"References": [
"http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238",
"https://security.netapp.com/advisory/ntap-20190315-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=11053",
"https://sourceware.org/bugzilla/show_bug.cgi?id=18986",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672",
"https://support.f5.com/csp/article/K64119434"
]
},
{
"VulnerabilityID": "CVE-2015-5180",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: DNS resolver NULL pointer dereference with crafted record type",
"Description": "res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/99324",
"http://www.ubuntu.com/usn/USN-3239-1",
"http://www.ubuntu.com/usn/USN-3239-2",
"https://access.redhat.com/errata/RHSA-2018:0805",
"https://bugzilla.redhat.com/show_bug.cgi?id=1249603",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180",
"https://security.gentoo.org/glsa/201706-19",
"https://sourceware.org/bugzilla/attachment.cgi?id=8492",
"https://sourceware.org/bugzilla/show_bug.cgi?id=18784",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=fc82b0a2dfe7dbd35671c10510a8da1043d746a5",
"https://sourceware.org/ml/libc-alpha/2017-02/msg00079.html"
]
},
{
"VulnerabilityID": "CVE-2015-8985",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: potential denial of service in pop_fail_stack()",
"Description": "The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.",
"Severity": "MEDIUM",
"References": [
"http://www.openwall.com/lists/oss-security/2017/02/14/9",
"http://www.securityfocus.com/bid/76916",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985",
"https://security.gentoo.org/glsa/201908-06"
]
},
{
"VulnerabilityID": "CVE-2016-10228",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: iconv program can hang when invoked with the -c option",
"Description": "The iconv program in the GNU C Library (aka glibc or libc6) 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.",
"Severity": "MEDIUM",
"References": [
"http://openwall.com/lists/oss-security/2017/03/01/10",
"http://www.securityfocus.com/bid/96525",
"https://sourceware.org/bugzilla/show_bug.cgi?id=19519"
]
},
{
"VulnerabilityID": "CVE-2016-10739",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: getaddrinfo should reject IP addresses with trailing characters",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.",
"Severity": "MEDIUM",
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html",
"http://www.securityfocus.com/bid/106672",
"https://access.redhat.com/errata/RHSA-2019:2118",
"https://bugzilla.redhat.com/show_bug.cgi?id=1347549",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739",
"https://sourceware.org/bugzilla/show_bug.cgi?id=20018"
]
},
{
"VulnerabilityID": "CVE-2017-12132",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Fragmentation attacks possible when EDNS0 is enabled",
"Description": "The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/100598",
"https://access.redhat.com/errata/RHSA-2018:0805",
"https://arxiv.org/pdf/1205.4011.pdf",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132",
"https://sourceware.org/bugzilla/show_bug.cgi?id=21361"
]
},
{
"VulnerabilityID": "CVE-2017-12133",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Use-after-free read access in clntudp_call in sunrpc",
"Description": "Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYZL6PAKI73XYRJYL5VLDGA4FFGWMB7A/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=21115",
"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d42eed4a044e5e10dfb885cf9891c2518a72a491",
"https://www.securityfocus.com/bid/100679"
]
},
{
"VulnerabilityID": "CVE-2018-11237",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: Buffer overflow in __mempcpy_avx512_no_vzeroupper",
"Description": "An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/104256",
"https://access.redhat.com/errata/RHBA-2019:0327",
"https://access.redhat.com/errata/RHSA-2018:3092",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237",
"https://security.netapp.com/advisory/ntap-20190329-0001/",
"https://security.netapp.com/advisory/ntap-20190401-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23196",
"https://www.exploit-db.com/exploits/44750/",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
]
},
{
"VulnerabilityID": "CVE-2018-20796",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/107160",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
"https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
"https://security.netapp.com/advisory/ntap-20190315-0002/"
]
},
{
"VulnerabilityID": "CVE-2019-9192",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "** DISPUTED ** In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern.",
"Severity": "MEDIUM",
"References": [
"https://sourceware.org/bugzilla/show_bug.cgi?id=24269"
]
},
{
"VulnerabilityID": "CVE-2019-7309",
"PkgName": "multiarch-support",
"InstalledVersion": "2.23-0ubuntu11",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "glibc: memcmp function incorrectly returns zero",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.",
"Severity": "LOW",
"References": [
"http://www.securityfocus.com/bid/106835",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24155",
"https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html"
]
},
{
"VulnerabilityID": "CVE-2017-10684",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c",
"Description": "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"Severity": "HIGH",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464687",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-10685",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function",
"Description": "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"Severity": "HIGH",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464692",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-11112",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in append_acs function",
"Description": "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464686",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-11113",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Null pointer dereference vulnerability in _nc_parse_entry function",
"Description": "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464691",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13728",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Infinite loop in the next_char function",
"Description": "There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484274",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13729",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the _nc_save_str function",
"Description": "There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484276",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13730",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function _nc_read_entry_source()",
"Description": "There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484284",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13731",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function postprocess_termcap()",
"Description": "There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484285",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13732",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function dump_uses()",
"Description": "There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484287",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13733",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function fmt_entry",
"Description": "There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484290",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13734",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function _nc_safe_strcat",
"Description": "There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484291",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-16879",
"PkgName": "ncurses-base",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow in the _nc_write_entry function",
"Description": "Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.",
"Severity": "MEDIUM",
"References": [
"http://invisible-island.net/ncurses/NEWS.html#t20171125",
"http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879",
"https://security.gentoo.org/glsa/201804-13",
"https://tools.cisco.com/security/center/viewAlert.x?alertId=57695"
]
},
{
"VulnerabilityID": "CVE-2017-10684",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c",
"Description": "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"Severity": "HIGH",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464687",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-10685",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function",
"Description": "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"Severity": "HIGH",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464692",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-11112",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in append_acs function",
"Description": "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464686",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-11113",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Null pointer dereference vulnerability in _nc_parse_entry function",
"Description": "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1464691",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13728",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Infinite loop in the next_char function",
"Description": "There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484274",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13729",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the _nc_save_str function",
"Description": "There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484276",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13730",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function _nc_read_entry_source()",
"Description": "There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484284",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13731",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function postprocess_termcap()",
"Description": "There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484285",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13732",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function dump_uses()",
"Description": "There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484287",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13733",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function fmt_entry",
"Description": "There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484290",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-13734",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Illegal address access in the function _nc_safe_strcat",
"Description": "There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack.",
"Severity": "MEDIUM",
"References": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1484291",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734",
"https://security.gentoo.org/glsa/201804-13"
]
},
{
"VulnerabilityID": "CVE-2017-16879",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.0+20160213-1ubuntu1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "ncurses: Stack-based buffer overflow in the _nc_write_entry function",
"Description": "Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.",
"Severity": "MEDIUM",
"References": [
"http://invisible-island.net/ncurses/NEWS.html#t20171125",
"http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879",
"https://security.gentoo.org/glsa/201804-13",
"https://tools.cisco.com/security/center/viewAlert.x?alertId=57695"
]
},
{
"VulnerabilityID": "CVE-2017-12424",
"PkgName": "passwd",
"InstalledVersion": "1:4.2-3.1ubuntu5.4",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "shadow-utils: Buffer overflow via newusers tool",
"Description": "In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Control Panel allows an unprivileged user account to create subaccounts.",
"Severity": "HIGH",
"References": [
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630",
"https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12424",
"https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952",
"https://security.gentoo.org/glsa/201710-16"
]
},
{
"VulnerabilityID": "CVE-2018-7169",
"PkgName": "passwd",
"InstalledVersion": "1:4.2-3.1ubuntu5.4",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation",
"Description": "An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used \"group blacklisting\" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.",
"Severity": "MEDIUM",
"References": [
"https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357",
"https://security.gentoo.org/glsa/201805-09"
]
},
{
"VulnerabilityID": "CVE-2013-4235",
"PkgName": "passwd",
"InstalledVersion": "1:4.2-3.1ubuntu5.4",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "shadow-utils: TOCTOU race conditions by copying and removing directory trees",
"Description": "A TOCTOU race condition was discovered in shadow-utils. A local attacker with write privileges in a directory removed or copied by usermod/userdel could potentially exploit this flaw, when the administrator invokes usermod/userdel, to delete or modify other files on the system.",
"Severity": "LOW"
},
{
"VulnerabilityID": "CVE-2018-20839",
"PkgName": "systemd",
"InstalledVersion": "229-4ubuntu21.22",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "systemd: mishandling of the current keyboard mode check leading to passwords being disclosed in cleartext to attacker",
"Description": "systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/108389",
"https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1803993",
"https://github.com/systemd/systemd/commit/9725f1a10f80f5e0ae7d9b60547458622aeb322f",
"https://github.com/systemd/systemd/pull/12378",
"https://security.netapp.com/advisory/ntap-20190530-0002/"
]
},
{
"VulnerabilityID": "CVE-2018-16888",
"PkgName": "systemd",
"InstalledVersion": "229-4ubuntu21.22",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "systemd: kills privileged process if unprivileged PIDFile was tampered",
"Description": "It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.",
"Severity": "LOW",
"References": [
"https://access.redhat.com/errata/RHSA-2019:2091",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888",
"https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20190307-0007/"
]
},
{
"VulnerabilityID": "CVE-2018-20839",
"PkgName": "systemd-sysv",
"InstalledVersion": "229-4ubuntu21.22",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "systemd: mishandling of the current keyboard mode check leading to passwords being disclosed in cleartext to attacker",
"Description": "systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.",
"Severity": "MEDIUM",
"References": [
"http://www.securityfocus.com/bid/108389",
"https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1803993",
"https://github.com/systemd/systemd/commit/9725f1a10f80f5e0ae7d9b60547458622aeb322f",
"https://github.com/systemd/systemd/pull/12378",
"https://security.netapp.com/advisory/ntap-20190530-0002/"
]
},
{
"VulnerabilityID": "CVE-2018-16888",
"PkgName": "systemd-sysv",
"InstalledVersion": "229-4ubuntu21.22",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "systemd: kills privileged process if unprivileged PIDFile was tampered",
"Description": "It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.",
"Severity": "LOW",
"References": [
"https://access.redhat.com/errata/RHSA-2019:2091",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888",
"https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20190307-0007/"
]
},
{
"VulnerabilityID": "CVE-2018-20482",
"PkgName": "tar",
"InstalledVersion": "1.28-2.1ubuntu0.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "tar: Infinite read loop in sparse_dump_region function in sparse.c",
"Description": "GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).",
"Severity": "LOW",
"References": [
"http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454",
"http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html",
"http://www.securityfocus.com/bid/106354",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482",
"https://lists.debian.org/debian-lts-announce/2018/12/msg00023.html",
"https://news.ycombinator.com/item?id=18745431",
"https://security.gentoo.org/glsa/201903-05",
"https://twitter.com/thatcks/status/1076166645708668928",
"https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug"
]
},
{
"VulnerabilityID": "CVE-2016-2779",
"PkgName": "util-linux",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: runuser tty hijack via TIOCSTI ioctl",
"Description": "runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
"Severity": "HIGH",
"References": [
"http://www.openwall.com/lists/oss-security/2016/02/27/1",
"http://www.openwall.com/lists/oss-security/2016/02/27/2",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779"
]
},
{
"VulnerabilityID": "CVE-2016-5011",
"PkgName": "util-linux",
"InstalledVersion": "2.27.1-6ubuntu3.7",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "util-linux: Extended partition loop in MBR partition table leads to DOS",
"Description": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"Severity": "MEDIUM",
"References": [
"http://rhn.redhat.com/errata/RHSA-2016-2605.html",
"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543",
"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801",
"http://www.openwall.com/lists/oss-security/2016/07/11/2",
"http://www.securityfocus.com/bid/91683",
"http://www.securitytracker.com/id/1036272",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011",
"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"
]
},
{
"VulnerabilityID": "CVE-2016-9841",
"PkgName": "zlib1g",
"InstalledVersion": "1:1.2.8.dfsg-2ubuntu4.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "zlib: Out-of-bounds pointer arithmetic in inffast.c",
"Description": "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"Severity": "HIGH",
"References": [
"http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
"http://www.openwall.com/lists/oss-security/2016/12/05/21",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/95131",
"http://www.securitytracker.com/id/1039427",
"http://www.securitytracker.com/id/1039596",
"https://access.redhat.com/errata/RHSA-2017:1220",
"https://access.redhat.com/errata/RHSA-2017:1221",
"https://access.redhat.com/errata/RHSA-2017:1222",
"https://access.redhat.com/errata/RHSA-2017:2999",
"https://access.redhat.com/errata/RHSA-2017:3046",
"https://access.redhat.com/errata/RHSA-2017:3047",
"https://access.redhat.com/errata/RHSA-2017:3453",
"https://bugzilla.redhat.com/show_bug.cgi?id=1402346",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841",
"https://docs.google.com/document/d/10i1KZS5so8xDqH2rplRa2xet0tyTvvJlLbQQmZIUIKE/edit#heading=h.t13tvnx4loq7",
"https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
"https://security.gentoo.org/glsa/201701-56",
"https://security.netapp.com/advisory/ntap-20171019-0001/",
"https://support.apple.com/HT208112",
"https://support.apple.com/HT208113",
"https://support.apple.com/HT208115",
"https://support.apple.com/HT208144",
"https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
"https://wiki.mozilla.org/images/0/09/Zlib-report.pdf"
]
},
{
"VulnerabilityID": "CVE-2016-9843",
"PkgName": "zlib1g",
"InstalledVersion": "1:1.2.8.dfsg-2ubuntu4.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "zlib: Big-endian out-of-bounds pointer",
"Description": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.",
"Severity": "HIGH",
"References": [
"http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
"http://www.openwall.com/lists/oss-security/2016/12/05/21",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/95131",
"http://www.securitytracker.com/id/1039427",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2017:1220",
"https://access.redhat.com/errata/RHSA-2017:1221",
"https://access.redhat.com/errata/RHSA-2017:1222",
"https://access.redhat.com/errata/RHSA-2017:2999",
"https://access.redhat.com/errata/RHSA-2017:3046",
"https://access.redhat.com/errata/RHSA-2017:3047",
"https://access.redhat.com/errata/RHSA-2017:3453",
"https://bugzilla.redhat.com/show_bug.cgi?id=1402351",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843",
"https://docs.google.com/document/d/10i1KZS5so8xDqH2rplRa2xet0tyTvvJlLbQQmZIUIKE/edit#heading=h.t13tvnx4loq7",
"https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
"https://security.gentoo.org/glsa/201701-56",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://support.apple.com/HT208112",
"https://support.apple.com/HT208113",
"https://support.apple.com/HT208115",
"https://support.apple.com/HT208144",
"https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
"https://wiki.mozilla.org/images/0/09/Zlib-report.pdf"
]
},
{
"VulnerabilityID": "CVE-2016-9840",
"PkgName": "zlib1g",
"InstalledVersion": "1:1.2.8.dfsg-2ubuntu4.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "zlib: Out-of-bounds pointer arithmetic in inftrees.c",
"Description": "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"Severity": "MEDIUM",
"References": [
"http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
"http://www.openwall.com/lists/oss-security/2016/12/05/21",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/95131",
"http://www.securitytracker.com/id/1039427",
"https://access.redhat.com/errata/RHSA-2017:1220",
"https://access.redhat.com/errata/RHSA-2017:1221",
"https://access.redhat.com/errata/RHSA-2017:1222",
"https://access.redhat.com/errata/RHSA-2017:2999",
"https://access.redhat.com/errata/RHSA-2017:3046",
"https://access.redhat.com/errata/RHSA-2017:3047",
"https://access.redhat.com/errata/RHSA-2017:3453",
"https://bugzilla.redhat.com/show_bug.cgi?id=1402345",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840",
"https://docs.google.com/document/d/10i1KZS5so8xDqH2rplRa2xet0tyTvvJlLbQQmZIUIKE/edit#heading=h.t13tvnx4loq7",
"https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
"https://security.gentoo.org/glsa/201701-56",
"https://support.apple.com/HT208112",
"https://support.apple.com/HT208113",
"https://support.apple.com/HT208115",
"https://support.apple.com/HT208144",
"https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
"https://wiki.mozilla.org/images/0/09/Zlib-report.pdf"
]
},
{
"VulnerabilityID": "CVE-2016-9842",
"PkgName": "zlib1g",
"InstalledVersion": "1:1.2.8.dfsg-2ubuntu4.1",
"LayerID": "sha256:f749b9b0fb213e9897417a985aaa9753d41bff474e1d0c0d1d266c4512eaf031",
"Title": "zlib: Undefined left shift of negative number",
"Description": "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.",
"Severity": "MEDIUM",
"References": [
"http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
"http://www.openwall.com/lists/oss-security/2016/12/05/21",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/95131",
"http://www.securitytracker.com/id/1039427",
"https://access.redhat.com/errata/RHSA-2017:1220",
"https://access.redhat.com/errata/RHSA-2017:1221",
"https://access.redhat.com/errata/RHSA-2017:1222",
"https://access.redhat.com/errata/RHSA-2017:2999",
"https://access.redhat.com/errata/RHSA-2017:3046",
"https://access.redhat.com/errata/RHSA-2017:3047",
"https://access.redhat.com/errata/RHSA-2017:3453",
"https://bugzilla.redhat.com/show_bug.cgi?id=1402348",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842",
"https://docs.google.com/document/d/10i1KZS5so8xDqH2rplRa2xet0tyTvvJlLbQQmZIUIKE/edit#heading=h.t13tvnx4loq7",
"https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
"https://security.gentoo.org/glsa/201701-56",
"https://support.apple.com/HT208112",
"https://support.apple.com/HT208113",
"https://support.apple.com/HT208115",
"https://support.apple.com/HT208144",
"https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
"https://wiki.mozilla.org/images/0/09/Zlib-report.pdf"
]
}
]
}
]