{
"SchemaVersion": 2,
"ArtifactName": "node:latest",
"ArtifactType": "container_image",
"Metadata": {
"OS": {
"Family": "debian",
"Name": "11.5"
},
"ImageID": "sha256:2577ab2cda97de4c7f3b9dbabdf04ac13582454f22cf3cc425e966e67b6ac8d5",
"DiffIDs": [
"sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c",
"sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41",
"sha256:a24f9e96a54c5be9dbb04a4438aa9462f29387c9735c560a80f4df6ae2e7d7f0",
"sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10",
"sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc",
"sha256:aa543709daea49b5ebb5d822d51cfc3259c6ef5e4db75c32aa3b9e8655b8d91a",
"sha256:144afe7313683212bb8f7005ba2699aab05fe70daa18d7b82aa538c62e135dcc",
"sha256:a4aedfc24d148071c146f765110aa4634712e7ad8c5cac38f7f2499b8f50a14e",
"sha256:1769e93ea2649681d28e26cb817a5470f4823b4d88cd940e4506898ad95d4990"
],
"RepoTags": [
"node:latest"
],
"RepoDigests": [
"node@sha256:8a45c95c328809e7e10e8c9ed5bf8374620d62e52de1df7ef8e71a9596ec8676"
],
"ImageConfig": {
"architecture": "amd64",
"container": "006ea37ce93efdb4d7ea84e4f26c0c24cb1fa93ef3bd296c25c7aea43cf2a9d2",
"created": "2022-09-13T06:33:46.886258328Z",
"docker_version": "20.10.12",
"history": [
{
"created": "2022-09-13T00:56:18.878860216Z",
"created_by": "/bin/sh -c #(nop) ADD file:ff01c6dedb67cf22e9b0735e099b9b6367770c4880941862cc7ec0e979b4118b in / "
},
{
"created": "2022-09-13T00:56:19.369186372Z",
"created_by": "/bin/sh -c #(nop) CMD [\"bash\"]",
"empty_layer": true
},
{
"created": "2022-09-13T03:43:12.365181513Z",
"created_by": "/bin/sh -c set -eux; \tapt-get update; \tapt-get install -y --no-install-recommends \t\tca-certificates \t\tcurl \t\tnetbase \t\twget \t; \trm -rf /var/lib/apt/lists/*"
},
{
"created": "2022-09-13T03:43:18.187479811Z",
"created_by": "/bin/sh -c set -ex; \tif ! command -v gpg > /dev/null; then \t\tapt-get update; \t\tapt-get install -y --no-install-recommends \t\t\tgnupg \t\t\tdirmngr \t\t; \t\trm -rf /var/lib/apt/lists/*; \tfi"
},
{
"created": "2022-09-13T03:43:33.000502602Z",
"created_by": "/bin/sh -c apt-get update && apt-get install -y --no-install-recommends \t\tgit \t\tmercurial \t\topenssh-client \t\tsubversion \t\t\t\tprocps \t&& rm -rf /var/lib/apt/lists/*"
},
{
"created": "2022-09-13T03:44:22.889884064Z",
"created_by": "/bin/sh -c set -ex; \tapt-get update; \tapt-get install -y --no-install-recommends \t\tautoconf \t\tautomake \t\tbzip2 \t\tdpkg-dev \t\tfile \t\tg++ \t\tgcc \t\timagemagick \t\tlibbz2-dev \t\tlibc6-dev \t\tlibcurl4-openssl-dev \t\tlibdb-dev \t\tlibevent-dev \t\tlibffi-dev \t\tlibgdbm-dev \t\tlibglib2.0-dev \t\tlibgmp-dev \t\tlibjpeg-dev \t\tlibkrb5-dev \t\tliblzma-dev \t\tlibmagickcore-dev \t\tlibmagickwand-dev \t\tlibmaxminddb-dev \t\tlibncurses5-dev \t\tlibncursesw5-dev \t\tlibpng-dev \t\tlibpq-dev \t\tlibreadline-dev \t\tlibsqlite3-dev \t\tlibssl-dev \t\tlibtool \t\tlibwebp-dev \t\tlibxml2-dev \t\tlibxslt-dev \t\tlibyaml-dev \t\tmake \t\tpatch \t\tunzip \t\txz-utils \t\tzlib1g-dev \t\t\t\t$( \t\t\tif apt-cache show 'default-libmysqlclient-dev' 2>/dev/null | grep -q '^Version:'; then \t\t\t\techo 'default-libmysqlclient-dev'; \t\t\telse \t\t\t\techo 'libmysqlclient-dev'; \t\t\tfi \t\t) \t; \trm -rf /var/lib/apt/lists/*"
},
{
"created": "2022-09-13T06:33:20.29035211Z",
"created_by": "/bin/sh -c groupadd --gid 1000 node && useradd --uid 1000 --gid node --shell /bin/bash --create-home node"
},
{
"created": "2022-09-13T06:33:20.385687699Z",
"created_by": "/bin/sh -c #(nop) ENV NODE_VERSION=18.9.0",
"empty_layer": true
},
{
"created": "2022-09-13T06:33:42.43655498Z",
"created_by": "/bin/sh -c ARCH= && dpkgArch=\"$(dpkg --print-architecture)\" && case \"${dpkgArch##*-}\" in amd64) ARCH='x64';; ppc64el) ARCH='ppc64le';; s390x) ARCH='s390x';; arm64) ARCH='arm64';; armhf) ARCH='armv7l';; i386) ARCH='x86';; *) echo \"unsupported architecture\"; exit 1 ;; esac && set -ex && for key in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do gpg --batch --keyserver hkps://keys.openpgp.org --recv-keys \"$key\" || gpg --batch --keyserver keyserver.ubuntu.com --recv-keys \"$key\" ; done && curl -fsSLO --compressed \"https://nodejs.org/dist/v$NODE_VERSION/node-v$NODE_VERSION-linux-$ARCH.tar.xz\" && curl -fsSLO --compressed \"https://nodejs.org/dist/v$NODE_VERSION/SHASUMS256.txt.asc\" && gpg --batch --decrypt --output SHASUMS256.txt SHASUMS256.txt.asc && grep \" node-v$NODE_VERSION-linux-$ARCH.tar.xz\\$\" SHASUMS256.txt | sha256sum -c - && tar -xJf \"node-v$NODE_VERSION-linux-$ARCH.tar.xz\" -C /usr/local --strip-components=1 --no-same-owner && rm \"node-v$NODE_VERSION-linux-$ARCH.tar.xz\" SHASUMS256.txt.asc SHASUMS256.txt && ln -s /usr/local/bin/node /usr/local/bin/nodejs && node --version && npm --version"
},
{
"created": "2022-09-13T06:33:42.914432198Z",
"created_by": "/bin/sh -c #(nop) ENV YARN_VERSION=1.22.19",
"empty_layer": true
},
{
"created": "2022-09-13T06:33:46.580911258Z",
"created_by": "/bin/sh -c set -ex && for key in 6A010C5166006599AA17F08146C2130DFD2497F5 ; do gpg --batch --keyserver hkps://keys.openpgp.org --recv-keys \"$key\" || gpg --batch --keyserver keyserver.ubuntu.com --recv-keys \"$key\" ; done && curl -fsSLO --compressed \"https://yarnpkg.com/downloads/$YARN_VERSION/yarn-v$YARN_VERSION.tar.gz\" && curl -fsSLO --compressed \"https://yarnpkg.com/downloads/$YARN_VERSION/yarn-v$YARN_VERSION.tar.gz.asc\" && gpg --batch --verify yarn-v$YARN_VERSION.tar.gz.asc yarn-v$YARN_VERSION.tar.gz && mkdir -p /opt && tar -xzf yarn-v$YARN_VERSION.tar.gz -C /opt/ && ln -s /opt/yarn-v$YARN_VERSION/bin/yarn /usr/local/bin/yarn && ln -s /opt/yarn-v$YARN_VERSION/bin/yarnpkg /usr/local/bin/yarnpkg && rm yarn-v$YARN_VERSION.tar.gz.asc yarn-v$YARN_VERSION.tar.gz && yarn --version"
},
{
"created": "2022-09-13T06:33:46.704698368Z",
"created_by": "/bin/sh -c #(nop) COPY file:4d192565a7220e135cab6c77fbc1c73211b69f3d9fb37e62857b2c6eb9363d51 in /usr/local/bin/ "
},
{
"created": "2022-09-13T06:33:46.792647656Z",
"created_by": "/bin/sh -c #(nop) ENTRYPOINT [\"docker-entrypoint.sh\"]",
"empty_layer": true
},
{
"created": "2022-09-13T06:33:46.886258328Z",
"created_by": "/bin/sh -c #(nop) CMD [\"node\"]",
"empty_layer": true
}
],
"os": "linux",
"rootfs": {
"type": "layers",
"diff_ids": [
"sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c",
"sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41",
"sha256:a24f9e96a54c5be9dbb04a4438aa9462f29387c9735c560a80f4df6ae2e7d7f0",
"sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10",
"sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc",
"sha256:aa543709daea49b5ebb5d822d51cfc3259c6ef5e4db75c32aa3b9e8655b8d91a",
"sha256:144afe7313683212bb8f7005ba2699aab05fe70daa18d7b82aa538c62e135dcc",
"sha256:a4aedfc24d148071c146f765110aa4634712e7ad8c5cac38f7f2499b8f50a14e",
"sha256:1769e93ea2649681d28e26cb817a5470f4823b4d88cd940e4506898ad95d4990"
]
},
"config": {
"Cmd": [
"node"
],
"Entrypoint": [
"docker-entrypoint.sh"
],
"Env": [
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"NODE_VERSION=18.9.0",
"YARN_VERSION=1.22.19"
],
"Image": "sha256:366e41b4574806ee8d86c44d27f215ffcb7817ae188a48d9c358c2e91efd9852"
}
}
},
"Results": [
{
"Target": "node:latest (debian 11.5)",
"Class": "os-pkgs",
"Type": "debian",
"Vulnerabilities": [
{
"VulnerabilityID": "CVE-2011-3374",
"PkgName": "apt",
"InstalledVersion": "2.2.4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3374",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "It was found that apt-key in apt, all versions, do not correctly valid ...",
"Description": "It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.",
"Severity": "LOW",
"CweIDs": [
"CWE-347"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V2Score": 4.3,
"V3Score": 3.7
}
},
"References": [
"https://access.redhat.com/security/cve/cve-2011-3374",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480",
"https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html",
"https://seclists.org/fulldisclosure/2011/Sep/221",
"https://security-tracker.debian.org/tracker/CVE-2011-3374",
"https://snyk.io/vuln/SNYK-LINUX-APT-116518",
"https://ubuntu.com/security/CVE-2011-3374"
],
"PublishedDate": "2019-11-26T00:15:00Z",
"LastModifiedDate": "2021-02-09T16:08:00Z"
},
{
"VulnerabilityID": "CVE-2017-13716",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-13716",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Memory leak with the C++ symbol demangler routine in libiberty",
"Description": "The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) library (aka libbfd).",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-13716",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22009"
],
"PublishedDate": "2017-08-28T21:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-12934",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-12934",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c",
"Description": "remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-12934",
"https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23059",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-06-28T14:29:00Z",
"LastModifiedDate": "2020-04-21T22:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-18483",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-18483",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service",
"Description": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 4.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/105689",
"https://access.redhat.com/security/cve/CVE-2018-18483",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23767",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-10-18T21:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20623",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20623",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Use-after-free in the error function",
"Description": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/106370",
"https://access.redhat.com/security/cve/CVE-2018-20623",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24049",
"https://support.f5.com/csp/article/K38336243",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-12-31T19:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20673",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20673",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: Integer overflow in demangle_template() function",
"Description": "The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for \"Create an array for saving the template argument values\") that can trigger a heap-based buffer overflow, as demonstrated by nm.",
"Severity": "LOW",
"CweIDs": [
"CWE-787",
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/106454",
"https://access.redhat.com/security/cve/CVE-2018-20673",
"https://linux.oracle.com/cve/CVE-2018-20673.html",
"https://linux.oracle.com/errata/ELSA-2021-4386.html",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24039"
],
"PublishedDate": "2019-01-04T18:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2018-20712",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20712",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: heap-based buffer over-read in d_expression_1",
"Description": "A heap-based buffer over-read exists in the function d_expression_1 in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31.1. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"http://www.securityfocus.com/bid/106563",
"https://access.redhat.com/security/cve/CVE-2018-20712",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24043",
"https://support.f5.com/csp/article/K38336243"
],
"PublishedDate": "2019-01-15T00:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-9996",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-9996",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Stack-overflow in libiberty/cplus-dem.c causes crash",
"Description": "An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/103733",
"https://access.redhat.com/security/cve/CVE-2018-9996",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304"
],
"PublishedDate": "2018-04-10T22:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010204",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010204",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service",
"Description": "GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.",
"Severity": "LOW",
"CweIDs": [
"CWE-125",
"CWE-681"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010204",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204",
"https://linux.oracle.com/cve/CVE-2019-1010204.html",
"https://linux.oracle.com/errata/ELSA-2020-1797.html",
"https://security.netapp.com/advisory/ntap-20190822-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23765",
"https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/notices/USN-5349-1"
],
"PublishedDate": "2019-07-23T14:15:00Z",
"LastModifiedDate": "2022-04-18T17:02:00Z"
},
{
"VulnerabilityID": "CVE-2020-35448",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-35448",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c",
"Description": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V2Score": 4.3,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-35448",
"https://linux.oracle.com/cve/CVE-2020-35448.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202107-24",
"https://security.netapp.com/advisory/ntap-20210129-0008/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26574",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679"
],
"PublishedDate": "2020-12-27T04:15:00Z",
"LastModifiedDate": "2022-04-26T16:13:00Z"
},
{
"VulnerabilityID": "CVE-2021-20197",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20197",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Race window allows users to own arbitrary files",
"Description": "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"V2Score": 3.3,
"V3Score": 6.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"V3Score": 4.2
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20197",
"https://bugzilla.redhat.com/show_bug.cgi?id=1913743",
"https://linux.oracle.com/cve/CVE-2021-20197.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-20197",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210528-0009/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26945"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20284",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20284",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c",
"Description": "A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20284",
"https://bugzilla.redhat.com/show_bug.cgi?id=1937784",
"https://linux.oracle.com/cve/CVE-2021-20284.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210521-0010/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26931"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3487",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3487",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section()",
"Description": "There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.",
"Severity": "LOW",
"CweIDs": [
"CWE-20",
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3487",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947111",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487",
"https://linux.oracle.com/cve/CVE-2021-3487.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3487",
"https://security.gentoo.org/glsa/202208-30",
"https://ubuntu.com/security/notices/USN-5124-1",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-04-15T14:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3530",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3530",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: stack memory exhaustion in demangle_path() in rust-demangle.c",
"Description": "A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3530",
"https://bugzilla.redhat.com/show_bug.cgi?id=1956423",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210716-0006/",
"https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch"
],
"PublishedDate": "2021-06-02T15:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3549",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3549",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter",
"Description": "An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3549",
"https://bugzilla.redhat.com/show_bug.cgi?id=1960717",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549",
"https://security.gentoo.org/glsa/202208-30"
],
"PublishedDate": "2021-05-26T21:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-45078",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45078",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c",
"Description": "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-45078",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-45078",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20220107-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=28694",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-12-15T20:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-46195",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46195",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "gcc: uncontrolled recursion in libiberty/rust-demangle.c",
"Description": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-46195",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841"
],
"PublishedDate": "2022-01-14T20:15:00Z",
"LastModifiedDate": "2022-01-22T01:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-38126",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38126",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Assertion fail in the display_debug_names() function in binutils/dwarf.c",
"Description": "Assertion fail in the display_debug_names() function in binutils/dwarf.c may lead to program crash and denial of service.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38126",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29289"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:22:00Z"
},
{
"VulnerabilityID": "CVE-2022-38127",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38127",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c",
"Description": "A NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c may lead to program crash when parsing corrupt DWARF data.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38127",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29290"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:23:00Z"
},
{
"VulnerabilityID": "CVE-2022-38128",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38128",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Infinite loop in display_debug_abbrev() function in binutils/dwarf.c",
"Description": "An infinite loop may be triggered in display_debug_abbrev() function in binutils/dwarf.c while opening a crafted ELF, which may lead to denial of service by a local attacker.",
"Severity": "LOW",
"CweIDs": [
"CWE-835"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38128",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29370"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:05:00Z"
},
{
"VulnerabilityID": "CVE-2022-38533",
"PkgName": "binutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38533",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file",
"Description": "In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38533",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533",
"https://nvd.nist.gov/vuln/detail/CVE-2022-38533",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2"
],
"PublishedDate": "2022-08-26T00:15:00Z",
"LastModifiedDate": "2022-09-19T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2017-13716",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-13716",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Memory leak with the C++ symbol demangler routine in libiberty",
"Description": "The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) library (aka libbfd).",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-13716",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22009"
],
"PublishedDate": "2017-08-28T21:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-12934",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-12934",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c",
"Description": "remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-12934",
"https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23059",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-06-28T14:29:00Z",
"LastModifiedDate": "2020-04-21T22:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-18483",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-18483",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service",
"Description": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 4.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/105689",
"https://access.redhat.com/security/cve/CVE-2018-18483",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23767",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-10-18T21:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20623",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20623",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Use-after-free in the error function",
"Description": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/106370",
"https://access.redhat.com/security/cve/CVE-2018-20623",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24049",
"https://support.f5.com/csp/article/K38336243",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-12-31T19:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20673",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20673",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: Integer overflow in demangle_template() function",
"Description": "The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for \"Create an array for saving the template argument values\") that can trigger a heap-based buffer overflow, as demonstrated by nm.",
"Severity": "LOW",
"CweIDs": [
"CWE-787",
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/106454",
"https://access.redhat.com/security/cve/CVE-2018-20673",
"https://linux.oracle.com/cve/CVE-2018-20673.html",
"https://linux.oracle.com/errata/ELSA-2021-4386.html",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24039"
],
"PublishedDate": "2019-01-04T18:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2018-20712",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20712",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: heap-based buffer over-read in d_expression_1",
"Description": "A heap-based buffer over-read exists in the function d_expression_1 in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31.1. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"http://www.securityfocus.com/bid/106563",
"https://access.redhat.com/security/cve/CVE-2018-20712",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24043",
"https://support.f5.com/csp/article/K38336243"
],
"PublishedDate": "2019-01-15T00:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-9996",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-9996",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Stack-overflow in libiberty/cplus-dem.c causes crash",
"Description": "An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/103733",
"https://access.redhat.com/security/cve/CVE-2018-9996",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304"
],
"PublishedDate": "2018-04-10T22:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010204",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010204",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service",
"Description": "GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.",
"Severity": "LOW",
"CweIDs": [
"CWE-125",
"CWE-681"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010204",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204",
"https://linux.oracle.com/cve/CVE-2019-1010204.html",
"https://linux.oracle.com/errata/ELSA-2020-1797.html",
"https://security.netapp.com/advisory/ntap-20190822-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23765",
"https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/notices/USN-5349-1"
],
"PublishedDate": "2019-07-23T14:15:00Z",
"LastModifiedDate": "2022-04-18T17:02:00Z"
},
{
"VulnerabilityID": "CVE-2020-35448",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-35448",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c",
"Description": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V2Score": 4.3,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-35448",
"https://linux.oracle.com/cve/CVE-2020-35448.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202107-24",
"https://security.netapp.com/advisory/ntap-20210129-0008/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26574",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679"
],
"PublishedDate": "2020-12-27T04:15:00Z",
"LastModifiedDate": "2022-04-26T16:13:00Z"
},
{
"VulnerabilityID": "CVE-2021-20197",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20197",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Race window allows users to own arbitrary files",
"Description": "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"V2Score": 3.3,
"V3Score": 6.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"V3Score": 4.2
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20197",
"https://bugzilla.redhat.com/show_bug.cgi?id=1913743",
"https://linux.oracle.com/cve/CVE-2021-20197.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-20197",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210528-0009/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26945"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20284",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20284",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c",
"Description": "A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20284",
"https://bugzilla.redhat.com/show_bug.cgi?id=1937784",
"https://linux.oracle.com/cve/CVE-2021-20284.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210521-0010/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26931"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3487",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3487",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section()",
"Description": "There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.",
"Severity": "LOW",
"CweIDs": [
"CWE-20",
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3487",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947111",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487",
"https://linux.oracle.com/cve/CVE-2021-3487.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3487",
"https://security.gentoo.org/glsa/202208-30",
"https://ubuntu.com/security/notices/USN-5124-1",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-04-15T14:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3530",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3530",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: stack memory exhaustion in demangle_path() in rust-demangle.c",
"Description": "A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3530",
"https://bugzilla.redhat.com/show_bug.cgi?id=1956423",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210716-0006/",
"https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch"
],
"PublishedDate": "2021-06-02T15:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3549",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3549",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter",
"Description": "An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3549",
"https://bugzilla.redhat.com/show_bug.cgi?id=1960717",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549",
"https://security.gentoo.org/glsa/202208-30"
],
"PublishedDate": "2021-05-26T21:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-45078",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45078",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c",
"Description": "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-45078",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-45078",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20220107-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=28694",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-12-15T20:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-46195",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46195",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "gcc: uncontrolled recursion in libiberty/rust-demangle.c",
"Description": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-46195",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841"
],
"PublishedDate": "2022-01-14T20:15:00Z",
"LastModifiedDate": "2022-01-22T01:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-38126",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38126",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Assertion fail in the display_debug_names() function in binutils/dwarf.c",
"Description": "Assertion fail in the display_debug_names() function in binutils/dwarf.c may lead to program crash and denial of service.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38126",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29289"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:22:00Z"
},
{
"VulnerabilityID": "CVE-2022-38127",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38127",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c",
"Description": "A NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c may lead to program crash when parsing corrupt DWARF data.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38127",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29290"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:23:00Z"
},
{
"VulnerabilityID": "CVE-2022-38128",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38128",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Infinite loop in display_debug_abbrev() function in binutils/dwarf.c",
"Description": "An infinite loop may be triggered in display_debug_abbrev() function in binutils/dwarf.c while opening a crafted ELF, which may lead to denial of service by a local attacker.",
"Severity": "LOW",
"CweIDs": [
"CWE-835"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38128",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29370"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:05:00Z"
},
{
"VulnerabilityID": "CVE-2022-38533",
"PkgName": "binutils-common",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38533",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file",
"Description": "In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38533",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533",
"https://nvd.nist.gov/vuln/detail/CVE-2022-38533",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2"
],
"PublishedDate": "2022-08-26T00:15:00Z",
"LastModifiedDate": "2022-09-19T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2017-13716",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-13716",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Memory leak with the C++ symbol demangler routine in libiberty",
"Description": "The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) library (aka libbfd).",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-13716",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22009"
],
"PublishedDate": "2017-08-28T21:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-12934",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-12934",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c",
"Description": "remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-12934",
"https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23059",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-06-28T14:29:00Z",
"LastModifiedDate": "2020-04-21T22:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-18483",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-18483",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service",
"Description": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 4.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/105689",
"https://access.redhat.com/security/cve/CVE-2018-18483",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23767",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-10-18T21:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20623",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20623",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Use-after-free in the error function",
"Description": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/106370",
"https://access.redhat.com/security/cve/CVE-2018-20623",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24049",
"https://support.f5.com/csp/article/K38336243",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-12-31T19:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20673",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20673",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: Integer overflow in demangle_template() function",
"Description": "The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for \"Create an array for saving the template argument values\") that can trigger a heap-based buffer overflow, as demonstrated by nm.",
"Severity": "LOW",
"CweIDs": [
"CWE-787",
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/106454",
"https://access.redhat.com/security/cve/CVE-2018-20673",
"https://linux.oracle.com/cve/CVE-2018-20673.html",
"https://linux.oracle.com/errata/ELSA-2021-4386.html",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24039"
],
"PublishedDate": "2019-01-04T18:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2018-20712",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20712",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: heap-based buffer over-read in d_expression_1",
"Description": "A heap-based buffer over-read exists in the function d_expression_1 in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31.1. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"http://www.securityfocus.com/bid/106563",
"https://access.redhat.com/security/cve/CVE-2018-20712",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24043",
"https://support.f5.com/csp/article/K38336243"
],
"PublishedDate": "2019-01-15T00:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-9996",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-9996",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Stack-overflow in libiberty/cplus-dem.c causes crash",
"Description": "An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/103733",
"https://access.redhat.com/security/cve/CVE-2018-9996",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304"
],
"PublishedDate": "2018-04-10T22:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010204",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010204",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service",
"Description": "GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.",
"Severity": "LOW",
"CweIDs": [
"CWE-125",
"CWE-681"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010204",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204",
"https://linux.oracle.com/cve/CVE-2019-1010204.html",
"https://linux.oracle.com/errata/ELSA-2020-1797.html",
"https://security.netapp.com/advisory/ntap-20190822-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23765",
"https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/notices/USN-5349-1"
],
"PublishedDate": "2019-07-23T14:15:00Z",
"LastModifiedDate": "2022-04-18T17:02:00Z"
},
{
"VulnerabilityID": "CVE-2020-35448",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-35448",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c",
"Description": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V2Score": 4.3,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-35448",
"https://linux.oracle.com/cve/CVE-2020-35448.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202107-24",
"https://security.netapp.com/advisory/ntap-20210129-0008/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26574",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679"
],
"PublishedDate": "2020-12-27T04:15:00Z",
"LastModifiedDate": "2022-04-26T16:13:00Z"
},
{
"VulnerabilityID": "CVE-2021-20197",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20197",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Race window allows users to own arbitrary files",
"Description": "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"V2Score": 3.3,
"V3Score": 6.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"V3Score": 4.2
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20197",
"https://bugzilla.redhat.com/show_bug.cgi?id=1913743",
"https://linux.oracle.com/cve/CVE-2021-20197.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-20197",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210528-0009/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26945"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20284",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20284",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c",
"Description": "A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20284",
"https://bugzilla.redhat.com/show_bug.cgi?id=1937784",
"https://linux.oracle.com/cve/CVE-2021-20284.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210521-0010/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26931"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3487",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3487",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section()",
"Description": "There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.",
"Severity": "LOW",
"CweIDs": [
"CWE-20",
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3487",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947111",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487",
"https://linux.oracle.com/cve/CVE-2021-3487.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3487",
"https://security.gentoo.org/glsa/202208-30",
"https://ubuntu.com/security/notices/USN-5124-1",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-04-15T14:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3530",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3530",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: stack memory exhaustion in demangle_path() in rust-demangle.c",
"Description": "A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3530",
"https://bugzilla.redhat.com/show_bug.cgi?id=1956423",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210716-0006/",
"https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch"
],
"PublishedDate": "2021-06-02T15:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3549",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3549",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter",
"Description": "An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3549",
"https://bugzilla.redhat.com/show_bug.cgi?id=1960717",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549",
"https://security.gentoo.org/glsa/202208-30"
],
"PublishedDate": "2021-05-26T21:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-45078",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45078",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c",
"Description": "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-45078",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-45078",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20220107-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=28694",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-12-15T20:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-46195",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46195",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "gcc: uncontrolled recursion in libiberty/rust-demangle.c",
"Description": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-46195",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841"
],
"PublishedDate": "2022-01-14T20:15:00Z",
"LastModifiedDate": "2022-01-22T01:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-38126",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38126",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Assertion fail in the display_debug_names() function in binutils/dwarf.c",
"Description": "Assertion fail in the display_debug_names() function in binutils/dwarf.c may lead to program crash and denial of service.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38126",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29289"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:22:00Z"
},
{
"VulnerabilityID": "CVE-2022-38127",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38127",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c",
"Description": "A NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c may lead to program crash when parsing corrupt DWARF data.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38127",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29290"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:23:00Z"
},
{
"VulnerabilityID": "CVE-2022-38128",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38128",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Infinite loop in display_debug_abbrev() function in binutils/dwarf.c",
"Description": "An infinite loop may be triggered in display_debug_abbrev() function in binutils/dwarf.c while opening a crafted ELF, which may lead to denial of service by a local attacker.",
"Severity": "LOW",
"CweIDs": [
"CWE-835"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38128",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29370"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:05:00Z"
},
{
"VulnerabilityID": "CVE-2022-38533",
"PkgName": "binutils-x86-64-linux-gnu",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38533",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file",
"Description": "In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38533",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533",
"https://nvd.nist.gov/vuln/detail/CVE-2022-38533",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2"
],
"PublishedDate": "2022-08-26T00:15:00Z",
"LastModifiedDate": "2022-09-19T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2022-0563",
"PkgName": "bsdutils",
"InstalledVersion": "2.36.1-8+deb11u1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
"Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
"Severity": "LOW",
"CweIDs": [
"CWE-209"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0563",
"https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
"https://security.netapp.com/advisory/ntap-20220331-0002/"
],
"PublishedDate": "2022-02-21T19:15:00Z",
"LastModifiedDate": "2022-06-03T14:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-1304",
"PkgName": "comerr-dev",
"InstalledVersion": "1.46.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1304",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "e2fsprogs: out-of-bounds read/write via crafted filesystem",
"Description": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"V3Score": 5.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1304",
"https://bugzilla.redhat.com/show_bug.cgi?id=2069726",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304",
"https://marc.info/?l=linux-ext4&m=165056234501732&w=2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1304",
"https://ubuntu.com/security/notices/USN-5464-1"
],
"PublishedDate": "2022-04-14T21:15:00Z",
"LastModifiedDate": "2022-04-21T15:36:00Z"
},
{
"VulnerabilityID": "CVE-2016-2781",
"PkgName": "coreutils",
"InstalledVersion": "8.32-4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-2781",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "coreutils: Non-privileged session can escape to the parent session in chroot",
"Description": "chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
"Severity": "LOW",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
"V2Score": 2.1,
"V3Score": 6.5
},
"redhat": {
"V2Vector": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"V2Score": 6.2,
"V3Score": 8.6
}
},
"References": [
"http://seclists.org/oss-sec/2016/q1/452",
"http://www.openwall.com/lists/oss-security/2016/02/28/2",
"http://www.openwall.com/lists/oss-security/2016/02/28/3",
"https://access.redhat.com/security/cve/CVE-2016-2781",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://lore.kernel.org/patchwork/patch/793178/",
"https://nvd.nist.gov/vuln/detail/CVE-2016-2781"
],
"PublishedDate": "2017-02-07T15:59:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2017-18018",
"PkgName": "coreutils",
"InstalledVersion": "8.32-4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-18018",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "coreutils: race condition vulnerability in chown and chgrp",
"Description": "In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX \"-R -L\" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 1.9,
"V3Score": 4.7
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 4.2
}
},
"References": [
"http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html",
"https://access.redhat.com/security/cve/CVE-2017-18018"
],
"PublishedDate": "2018-01-04T04:29:00Z",
"LastModifiedDate": "2018-01-19T15:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-22922",
"PkgName": "curl",
"InstalledVersion": "7.74.0-1.3+deb11u3",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-22922",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "curl: Content not matching hash in Metalink is not being discarded",
"Description": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.",
"Severity": "LOW",
"CweIDs": [
"CWE-755"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-22922",
"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
"https://curl.se/docs/CVE-2021-22922.html",
"https://hackerone.com/reports/1213175",
"https://linux.oracle.com/cve/CVE-2021-22922.html",
"https://linux.oracle.com/errata/ELSA-2021-3582.html",
"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-22922",
"https://security.netapp.com/advisory/ntap-20210902-0003/",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-08-05T21:15:00Z",
"LastModifiedDate": "2022-08-30T22:39:00Z"
},
{
"VulnerabilityID": "CVE-2021-22923",
"PkgName": "curl",
"InstalledVersion": "7.74.0-1.3+deb11u3",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-22923",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "curl: Metalink download sends credentials",
"Description": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.",
"Severity": "LOW",
"CweIDs": [
"CWE-522"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"V2Score": 2.6,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"V3Score": 5.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-22923",
"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
"https://curl.se/docs/CVE-2021-22923.html",
"https://hackerone.com/reports/1213181",
"https://linux.oracle.com/cve/CVE-2021-22923.html",
"https://linux.oracle.com/errata/ELSA-2021-3582.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-22923",
"https://security.netapp.com/advisory/ntap-20210902-0003/",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-08-05T21:15:00Z",
"LastModifiedDate": "2022-04-06T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2022-1304",
"PkgName": "e2fsprogs",
"InstalledVersion": "1.46.2-2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1304",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "e2fsprogs: out-of-bounds read/write via crafted filesystem",
"Description": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"V3Score": 5.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1304",
"https://bugzilla.redhat.com/show_bug.cgi?id=2069726",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304",
"https://marc.info/?l=linux-ext4&m=165056234501732&w=2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1304",
"https://ubuntu.com/security/notices/USN-5464-1"
],
"PublishedDate": "2022-04-14T21:15:00Z",
"LastModifiedDate": "2022-04-21T15:36:00Z"
},
{
"VulnerabilityID": "CVE-2022-24765",
"PkgName": "git",
"InstalledVersion": "1:2.30.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-24765",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree",
"Description": "Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\\.git\\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\\Users` if the user profile is located in `C:\\Users\\my-user-name`.",
"Severity": "HIGH",
"CweIDs": [
"CWE-427"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 6.9,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://seclists.org/fulldisclosure/2022/May/31",
"http://www.openwall.com/lists/oss-security/2022/04/12/7",
"https://access.redhat.com/security/cve/CVE-2022-24765",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765",
"https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash",
"https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode",
"https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/",
"https://support.apple.com/kb/HT213261",
"https://ubuntu.com/security/notices/USN-5376-1",
"https://ubuntu.com/security/notices/USN-5376-2",
"https://ubuntu.com/security/notices/USN-5376-3"
],
"PublishedDate": "2022-04-12T18:15:00Z",
"LastModifiedDate": "2022-07-29T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-29187",
"PkgName": "git",
"InstalledVersion": "1:2.30.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29187",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "git: Bypass of safe.directory protections",
"Description": "Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.",
"Severity": "HIGH",
"CweIDs": [
"CWE-427",
"CWE-282"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 6.9,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2022/07/14/1",
"https://access.redhat.com/security/cve/CVE-2022-29187",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187",
"https://github.blog/2022-04-12-git-security-vulnerability-announced",
"https://github.com/git/git/security/advisories/GHSA-j342-m5hw-rr3v",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/",
"https://lore.kernel.org/git/xmqqv8s2fefi.fsf@gitster.g/T/#u",
"https://ubuntu.com/security/notices/USN-5511-1"
],
"PublishedDate": "2022-07-12T21:15:00Z",
"LastModifiedDate": "2022-07-29T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-1000021",
"PkgName": "git",
"InstalledVersion": "1:2.30.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-1000021",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages to potentially execute arbitrary commands",
"Description": "GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).",
"Severity": "LOW",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5
}
},
"References": [
"http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html",
"https://access.redhat.com/security/cve/CVE-2018-1000021",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021"
],
"PublishedDate": "2018-02-09T23:29:00Z",
"LastModifiedDate": "2018-03-06T19:34:00Z"
},
{
"VulnerabilityID": "CVE-2022-24975",
"PkgName": "git",
"InstalledVersion": "1:2.30.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-24975",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "git: The --mirror option for git leaks secret for deleted content, aka the \"GitBleed\"",
"Description": "The --mirror documentation for Git through 2.35.1 does not mention the availability of deleted content, aka the \"GitBleed\" issue. This could present a security risk if information-disclosure auditing processes rely on a clone operation without the --mirror option.",
"Severity": "LOW",
"CweIDs": [
"CWE-668"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 4.3,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-24975",
"https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191",
"https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/"
],
"PublishedDate": "2022-02-11T20:15:00Z",
"LastModifiedDate": "2022-02-22T20:19:00Z"
},
{
"VulnerabilityID": "CVE-2022-24765",
"PkgName": "git-man",
"InstalledVersion": "1:2.30.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-24765",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree",
"Description": "Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\\.git\\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\\Users` if the user profile is located in `C:\\Users\\my-user-name`.",
"Severity": "HIGH",
"CweIDs": [
"CWE-427"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 6.9,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://seclists.org/fulldisclosure/2022/May/31",
"http://www.openwall.com/lists/oss-security/2022/04/12/7",
"https://access.redhat.com/security/cve/CVE-2022-24765",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765",
"https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash",
"https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode",
"https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/",
"https://support.apple.com/kb/HT213261",
"https://ubuntu.com/security/notices/USN-5376-1",
"https://ubuntu.com/security/notices/USN-5376-2",
"https://ubuntu.com/security/notices/USN-5376-3"
],
"PublishedDate": "2022-04-12T18:15:00Z",
"LastModifiedDate": "2022-07-29T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-29187",
"PkgName": "git-man",
"InstalledVersion": "1:2.30.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29187",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "git: Bypass of safe.directory protections",
"Description": "Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.",
"Severity": "HIGH",
"CweIDs": [
"CWE-427",
"CWE-282"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 6.9,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2022/07/14/1",
"https://access.redhat.com/security/cve/CVE-2022-29187",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187",
"https://github.blog/2022-04-12-git-security-vulnerability-announced",
"https://github.com/git/git/security/advisories/GHSA-j342-m5hw-rr3v",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/",
"https://lore.kernel.org/git/xmqqv8s2fefi.fsf@gitster.g/T/#u",
"https://ubuntu.com/security/notices/USN-5511-1"
],
"PublishedDate": "2022-07-12T21:15:00Z",
"LastModifiedDate": "2022-07-29T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-1000021",
"PkgName": "git-man",
"InstalledVersion": "1:2.30.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-1000021",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages to potentially execute arbitrary commands",
"Description": "GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).",
"Severity": "LOW",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5
}
},
"References": [
"http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html",
"https://access.redhat.com/security/cve/CVE-2018-1000021",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021"
],
"PublishedDate": "2018-02-09T23:29:00Z",
"LastModifiedDate": "2018-03-06T19:34:00Z"
},
{
"VulnerabilityID": "CVE-2022-24975",
"PkgName": "git-man",
"InstalledVersion": "1:2.30.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-24975",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "git: The --mirror option for git leaks secret for deleted content, aka the \"GitBleed\"",
"Description": "The --mirror documentation for Git through 2.35.1 does not mention the availability of deleted content, aka the \"GitBleed\" issue. This could present a security risk if information-disclosure auditing processes rely on a clone operation without the --mirror option.",
"Severity": "LOW",
"CweIDs": [
"CWE-668"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 4.3,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-24975",
"https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191",
"https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/"
],
"PublishedDate": "2022-02-11T20:15:00Z",
"LastModifiedDate": "2022-02-22T20:19:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "imagemagick",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "imagemagick-6-common",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "imagemagick-6.q16",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2004-0971",
"PkgName": "krb5-multidev",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2004-0971",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "security flaw",
"Description": "The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 2.1
}
},
"References": [
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304",
"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml",
"http://www.redhat.com/support/errata/RHSA-2005-012.html",
"http://www.securityfocus.com/bid/11289",
"http://www.trustix.org/errata/2004/0050",
"https://access.redhat.com/security/cve/CVE-2004-0971",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497"
],
"PublishedDate": "2005-02-09T05:00:00Z",
"LastModifiedDate": "2021-06-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-5709",
"PkgName": "krb5-multidev",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c",
"Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-5709",
"https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-01-16T09:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-30473",
"PkgName": "libaom0",
"InstalledVersion": "1.0.0.errata1-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-30473",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that i ...",
"Description": "aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that is not located on the heap.",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-763"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
}
},
"References": [
"https://aomedia.googlesource.com/aom/+/4efe20e99dcd9b6f8eadc8de8acc825be7416578",
"https://bugs.chromium.org/p/aomedia/issues/detail?id=2998",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/"
],
"PublishedDate": "2021-05-06T15:15:00Z",
"LastModifiedDate": "2021-06-17T16:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-30474",
"PkgName": "libaom0",
"InstalledVersion": "1.0.0.errata1-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-30474",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "aom_dsp/grain_table.c in libaom in AOMedia before 2021-03-30 has a use ...",
"Description": "aom_dsp/grain_table.c in libaom in AOMedia before 2021-03-30 has a use-after-free.",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
}
},
"References": [
"https://aomedia.googlesource.com/aom/+/6e31957b6dc62dbc7d1bb70cd84902dd14c4bf2e",
"https://bugs.chromium.org/p/aomedia/issues/detail?id=3000"
],
"PublishedDate": "2021-06-02T17:15:00Z",
"LastModifiedDate": "2021-06-09T18:20:00Z"
},
{
"VulnerabilityID": "CVE-2021-30475",
"PkgName": "libaom0",
"InstalledVersion": "1.0.0.errata1-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-30475",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "aom_dsp/noise_model.c in libaom in AOMedia before 2021-03-24 has a buf ...",
"Description": "aom_dsp/noise_model.c in libaom in AOMedia before 2021-03-24 has a buffer overflow.",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
}
},
"References": [
"https://aomedia.googlesource.com/aom/+/12adc723acf02633595a4d8da8345742729f46c0",
"https://bugs.chromium.org/p/aomedia/issues/detail?id=2999",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/"
],
"PublishedDate": "2021-06-04T14:15:00Z",
"LastModifiedDate": "2021-06-17T16:40:00Z"
},
{
"VulnerabilityID": "CVE-2020-0478",
"PkgName": "libaom0",
"InstalledVersion": "1.0.0.errata1-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-0478",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "In extend_frame_lowbd of restoration.c, there is a possible out of bou ...",
"Description": "In extend_frame_lowbd of restoration.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150780418",
"Severity": "HIGH",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
}
},
"References": [
"https://source.android.com/security/bulletin/pixel/2020-12-01"
],
"PublishedDate": "2020-12-15T16:15:00Z",
"LastModifiedDate": "2020-12-16T15:09:00Z"
},
{
"VulnerabilityID": "CVE-2020-36131",
"PkgName": "libaom0",
"InstalledVersion": "1.0.0.errata1-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-36131",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "AOM v2.0.1 was discovered to contain a stack buffer overflow via the c ...",
"Description": "AOM v2.0.1 was discovered to contain a stack buffer overflow via the component stats/rate_hist.c.",
"Severity": "HIGH",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
}
},
"References": [
"https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)",
"https://bugs.chromium.org/p/aomedia/issues/detail?id=2911&q=&can=1",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131"
],
"PublishedDate": "2021-12-02T22:15:00Z",
"LastModifiedDate": "2021-12-03T15:43:00Z"
},
{
"VulnerabilityID": "CVE-2020-36133",
"PkgName": "libaom0",
"InstalledVersion": "1.0.0.errata1-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-36133",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "AOM v2.0.1 was discovered to contain a global buffer overflow via the ...",
"Description": "AOM v2.0.1 was discovered to contain a global buffer overflow via the component av1/encoder/partition_search.h.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
}
},
"References": [
"https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.0.0)",
"https://bugs.chromium.org/p/aomedia/issues/detail?id=2913&q=&can=1",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133"
],
"PublishedDate": "2021-12-02T22:15:00Z",
"LastModifiedDate": "2021-12-03T15:42:00Z"
},
{
"VulnerabilityID": "CVE-2020-36130",
"PkgName": "libaom0",
"InstalledVersion": "1.0.0.errata1-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-36130",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "AOM v2.0.1 was discovered to contain a NULL pointer dereference via th ...",
"Description": "AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component av1/av1_dx_iface.c.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://aomedia.googlesource.com/aom/+/be4ee75fd762d361d0679cc892e4c74af8140093%5E%21/#F0 (v2.0.1)",
"https://bugs.chromium.org/p/aomedia/issues/detail?id=2905&q=&can=1",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130"
],
"PublishedDate": "2021-12-02T22:15:00Z",
"LastModifiedDate": "2021-12-03T15:43:00Z"
},
{
"VulnerabilityID": "CVE-2020-36135",
"PkgName": "libaom0",
"InstalledVersion": "1.0.0.errata1-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-36135",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "AOM v2.0.1 was discovered to contain a NULL pointer dereference via th ...",
"Description": "AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component rate_hist.c.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)",
"https://bugs.chromium.org/p/aomedia/issues/detail?id=2910&q=&can=1",
"https://bugs.chromium.org/p/aomedia/issues/detail?id=2911",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135"
],
"PublishedDate": "2021-12-02T22:15:00Z",
"LastModifiedDate": "2021-12-03T16:11:00Z"
},
{
"VulnerabilityID": "CVE-2011-3374",
"PkgName": "libapt-pkg6.0",
"InstalledVersion": "2.2.4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3374",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "It was found that apt-key in apt, all versions, do not correctly valid ...",
"Description": "It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.",
"Severity": "LOW",
"CweIDs": [
"CWE-347"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V2Score": 4.3,
"V3Score": 3.7
}
},
"References": [
"https://access.redhat.com/security/cve/cve-2011-3374",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480",
"https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html",
"https://seclists.org/fulldisclosure/2011/Sep/221",
"https://security-tracker.debian.org/tracker/CVE-2011-3374",
"https://snyk.io/vuln/SNYK-LINUX-APT-116518",
"https://ubuntu.com/security/CVE-2011-3374"
],
"PublishedDate": "2019-11-26T00:15:00Z",
"LastModifiedDate": "2021-02-09T16:08:00Z"
},
{
"VulnerabilityID": "CVE-2017-13716",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-13716",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Memory leak with the C++ symbol demangler routine in libiberty",
"Description": "The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) library (aka libbfd).",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-13716",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22009"
],
"PublishedDate": "2017-08-28T21:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-12934",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-12934",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c",
"Description": "remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-12934",
"https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23059",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-06-28T14:29:00Z",
"LastModifiedDate": "2020-04-21T22:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-18483",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-18483",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service",
"Description": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 4.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/105689",
"https://access.redhat.com/security/cve/CVE-2018-18483",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23767",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-10-18T21:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20623",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20623",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Use-after-free in the error function",
"Description": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/106370",
"https://access.redhat.com/security/cve/CVE-2018-20623",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24049",
"https://support.f5.com/csp/article/K38336243",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-12-31T19:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20673",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20673",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: Integer overflow in demangle_template() function",
"Description": "The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for \"Create an array for saving the template argument values\") that can trigger a heap-based buffer overflow, as demonstrated by nm.",
"Severity": "LOW",
"CweIDs": [
"CWE-787",
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/106454",
"https://access.redhat.com/security/cve/CVE-2018-20673",
"https://linux.oracle.com/cve/CVE-2018-20673.html",
"https://linux.oracle.com/errata/ELSA-2021-4386.html",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24039"
],
"PublishedDate": "2019-01-04T18:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2018-20712",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20712",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: heap-based buffer over-read in d_expression_1",
"Description": "A heap-based buffer over-read exists in the function d_expression_1 in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31.1. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"http://www.securityfocus.com/bid/106563",
"https://access.redhat.com/security/cve/CVE-2018-20712",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24043",
"https://support.f5.com/csp/article/K38336243"
],
"PublishedDate": "2019-01-15T00:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-9996",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-9996",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Stack-overflow in libiberty/cplus-dem.c causes crash",
"Description": "An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/103733",
"https://access.redhat.com/security/cve/CVE-2018-9996",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304"
],
"PublishedDate": "2018-04-10T22:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010204",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010204",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service",
"Description": "GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.",
"Severity": "LOW",
"CweIDs": [
"CWE-125",
"CWE-681"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010204",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204",
"https://linux.oracle.com/cve/CVE-2019-1010204.html",
"https://linux.oracle.com/errata/ELSA-2020-1797.html",
"https://security.netapp.com/advisory/ntap-20190822-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23765",
"https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/notices/USN-5349-1"
],
"PublishedDate": "2019-07-23T14:15:00Z",
"LastModifiedDate": "2022-04-18T17:02:00Z"
},
{
"VulnerabilityID": "CVE-2020-35448",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-35448",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c",
"Description": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V2Score": 4.3,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-35448",
"https://linux.oracle.com/cve/CVE-2020-35448.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202107-24",
"https://security.netapp.com/advisory/ntap-20210129-0008/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26574",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679"
],
"PublishedDate": "2020-12-27T04:15:00Z",
"LastModifiedDate": "2022-04-26T16:13:00Z"
},
{
"VulnerabilityID": "CVE-2021-20197",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20197",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Race window allows users to own arbitrary files",
"Description": "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"V2Score": 3.3,
"V3Score": 6.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"V3Score": 4.2
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20197",
"https://bugzilla.redhat.com/show_bug.cgi?id=1913743",
"https://linux.oracle.com/cve/CVE-2021-20197.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-20197",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210528-0009/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26945"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20284",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20284",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c",
"Description": "A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20284",
"https://bugzilla.redhat.com/show_bug.cgi?id=1937784",
"https://linux.oracle.com/cve/CVE-2021-20284.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210521-0010/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26931"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3487",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3487",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section()",
"Description": "There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.",
"Severity": "LOW",
"CweIDs": [
"CWE-20",
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3487",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947111",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487",
"https://linux.oracle.com/cve/CVE-2021-3487.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3487",
"https://security.gentoo.org/glsa/202208-30",
"https://ubuntu.com/security/notices/USN-5124-1",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-04-15T14:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3530",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3530",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: stack memory exhaustion in demangle_path() in rust-demangle.c",
"Description": "A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3530",
"https://bugzilla.redhat.com/show_bug.cgi?id=1956423",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210716-0006/",
"https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch"
],
"PublishedDate": "2021-06-02T15:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3549",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3549",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter",
"Description": "An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3549",
"https://bugzilla.redhat.com/show_bug.cgi?id=1960717",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549",
"https://security.gentoo.org/glsa/202208-30"
],
"PublishedDate": "2021-05-26T21:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-45078",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45078",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c",
"Description": "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-45078",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-45078",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20220107-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=28694",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-12-15T20:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-46195",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46195",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "gcc: uncontrolled recursion in libiberty/rust-demangle.c",
"Description": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-46195",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841"
],
"PublishedDate": "2022-01-14T20:15:00Z",
"LastModifiedDate": "2022-01-22T01:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-38126",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38126",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Assertion fail in the display_debug_names() function in binutils/dwarf.c",
"Description": "Assertion fail in the display_debug_names() function in binutils/dwarf.c may lead to program crash and denial of service.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38126",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29289"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:22:00Z"
},
{
"VulnerabilityID": "CVE-2022-38127",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38127",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c",
"Description": "A NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c may lead to program crash when parsing corrupt DWARF data.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38127",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29290"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:23:00Z"
},
{
"VulnerabilityID": "CVE-2022-38128",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38128",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Infinite loop in display_debug_abbrev() function in binutils/dwarf.c",
"Description": "An infinite loop may be triggered in display_debug_abbrev() function in binutils/dwarf.c while opening a crafted ELF, which may lead to denial of service by a local attacker.",
"Severity": "LOW",
"CweIDs": [
"CWE-835"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38128",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29370"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:05:00Z"
},
{
"VulnerabilityID": "CVE-2022-38533",
"PkgName": "libbinutils",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38533",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file",
"Description": "In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38533",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533",
"https://nvd.nist.gov/vuln/detail/CVE-2022-38533",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2"
],
"PublishedDate": "2022-08-26T00:15:00Z",
"LastModifiedDate": "2022-09-19T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2022-0563",
"PkgName": "libblkid-dev",
"InstalledVersion": "2.36.1-8+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
"Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
"Severity": "LOW",
"CweIDs": [
"CWE-209"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0563",
"https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
"https://security.netapp.com/advisory/ntap-20220331-0002/"
],
"PublishedDate": "2022-02-21T19:15:00Z",
"LastModifiedDate": "2022-06-03T14:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-0563",
"PkgName": "libblkid1",
"InstalledVersion": "2.36.1-8+deb11u1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
"Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
"Severity": "LOW",
"CweIDs": [
"CWE-209"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0563",
"https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
"https://security.netapp.com/advisory/ntap-20220331-0002/"
],
"PublishedDate": "2022-02-21T19:15:00Z",
"LastModifiedDate": "2022-06-03T14:15:00Z"
},
{
"VulnerabilityID": "CVE-2010-4756",
"PkgName": "libc-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions",
"Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V2Score": 4
},
"redhat": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"http://cxib.net/stuff/glob-0day.c",
"http://securityreason.com/achievement_securityalert/89",
"http://securityreason.com/exploitalert/9223",
"https://access.redhat.com/security/cve/CVE-2010-4756",
"https://bugzilla.redhat.com/show_bug.cgi?id=681681",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756",
"https://nvd.nist.gov/vuln/detail/CVE-2010-4756"
],
"PublishedDate": "2011-03-02T20:00:00Z",
"LastModifiedDate": "2021-09-01T12:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20796",
"PkgName": "libc-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/107160",
"https://access.redhat.com/security/cve/CVE-2018-20796",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
"https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
"https://nvd.nist.gov/vuln/detail/CVE-2018-20796",
"https://security.netapp.com/advisory/ntap-20190315-0002/",
"https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS"
],
"PublishedDate": "2019-02-26T02:29:00Z",
"LastModifiedDate": "2019-11-05T21:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010022",
"PkgName": "libc-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: stack guard protection bypass",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010022",
"https://security-tracker.debian.org/tracker/CVE-2019-1010022",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22850",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3",
"https://ubuntu.com/security/CVE-2019-1010022"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2021-06-10T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010023",
"PkgName": "libc-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation",
"Description": "** DISPUTED ** GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://www.securityfocus.com/bid/109167",
"https://access.redhat.com/security/cve/CVE-2019-1010023",
"https://security-tracker.debian.org/tracker/CVE-2019-1010023",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22851",
"https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010023"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010024",
"PkgName": "libc-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: ASLR bypass using cache of thread stack and heap",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/109162",
"https://access.redhat.com/security/cve/CVE-2019-1010024",
"https://security-tracker.debian.org/tracker/CVE-2019-1010024",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22852",
"https://support.f5.com/csp/article/K06046097",
"https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010024"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010025",
"PkgName": "libc-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: information disclosure of heap addresses of pthread_created thread",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-330"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 2.9
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010025",
"https://security-tracker.debian.org/tracker/CVE-2019-1010025",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22853",
"https://support.f5.com/csp/article/K06046097",
"https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010025"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-9192",
"PkgName": "libc-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "** DISPUTED ** In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-9192",
"https://nvd.nist.gov/vuln/detail/CVE-2019-9192",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
"https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS"
],
"PublishedDate": "2019-02-26T18:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2010-4756",
"PkgName": "libc-dev-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions",
"Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V2Score": 4
},
"redhat": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"http://cxib.net/stuff/glob-0day.c",
"http://securityreason.com/achievement_securityalert/89",
"http://securityreason.com/exploitalert/9223",
"https://access.redhat.com/security/cve/CVE-2010-4756",
"https://bugzilla.redhat.com/show_bug.cgi?id=681681",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756",
"https://nvd.nist.gov/vuln/detail/CVE-2010-4756"
],
"PublishedDate": "2011-03-02T20:00:00Z",
"LastModifiedDate": "2021-09-01T12:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20796",
"PkgName": "libc-dev-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/107160",
"https://access.redhat.com/security/cve/CVE-2018-20796",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
"https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
"https://nvd.nist.gov/vuln/detail/CVE-2018-20796",
"https://security.netapp.com/advisory/ntap-20190315-0002/",
"https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS"
],
"PublishedDate": "2019-02-26T02:29:00Z",
"LastModifiedDate": "2019-11-05T21:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010022",
"PkgName": "libc-dev-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: stack guard protection bypass",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010022",
"https://security-tracker.debian.org/tracker/CVE-2019-1010022",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22850",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3",
"https://ubuntu.com/security/CVE-2019-1010022"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2021-06-10T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010023",
"PkgName": "libc-dev-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation",
"Description": "** DISPUTED ** GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://www.securityfocus.com/bid/109167",
"https://access.redhat.com/security/cve/CVE-2019-1010023",
"https://security-tracker.debian.org/tracker/CVE-2019-1010023",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22851",
"https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010023"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010024",
"PkgName": "libc-dev-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: ASLR bypass using cache of thread stack and heap",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/109162",
"https://access.redhat.com/security/cve/CVE-2019-1010024",
"https://security-tracker.debian.org/tracker/CVE-2019-1010024",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22852",
"https://support.f5.com/csp/article/K06046097",
"https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010024"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010025",
"PkgName": "libc-dev-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: information disclosure of heap addresses of pthread_created thread",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-330"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 2.9
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010025",
"https://security-tracker.debian.org/tracker/CVE-2019-1010025",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22853",
"https://support.f5.com/csp/article/K06046097",
"https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010025"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-9192",
"PkgName": "libc-dev-bin",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "** DISPUTED ** In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-9192",
"https://nvd.nist.gov/vuln/detail/CVE-2019-9192",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
"https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS"
],
"PublishedDate": "2019-02-26T18:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2010-4756",
"PkgName": "libc6",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions",
"Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V2Score": 4
},
"redhat": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"http://cxib.net/stuff/glob-0day.c",
"http://securityreason.com/achievement_securityalert/89",
"http://securityreason.com/exploitalert/9223",
"https://access.redhat.com/security/cve/CVE-2010-4756",
"https://bugzilla.redhat.com/show_bug.cgi?id=681681",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756",
"https://nvd.nist.gov/vuln/detail/CVE-2010-4756"
],
"PublishedDate": "2011-03-02T20:00:00Z",
"LastModifiedDate": "2021-09-01T12:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20796",
"PkgName": "libc6",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/107160",
"https://access.redhat.com/security/cve/CVE-2018-20796",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
"https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
"https://nvd.nist.gov/vuln/detail/CVE-2018-20796",
"https://security.netapp.com/advisory/ntap-20190315-0002/",
"https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS"
],
"PublishedDate": "2019-02-26T02:29:00Z",
"LastModifiedDate": "2019-11-05T21:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010022",
"PkgName": "libc6",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: stack guard protection bypass",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010022",
"https://security-tracker.debian.org/tracker/CVE-2019-1010022",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22850",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3",
"https://ubuntu.com/security/CVE-2019-1010022"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2021-06-10T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010023",
"PkgName": "libc6",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation",
"Description": "** DISPUTED ** GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://www.securityfocus.com/bid/109167",
"https://access.redhat.com/security/cve/CVE-2019-1010023",
"https://security-tracker.debian.org/tracker/CVE-2019-1010023",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22851",
"https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010023"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010024",
"PkgName": "libc6",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: ASLR bypass using cache of thread stack and heap",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/109162",
"https://access.redhat.com/security/cve/CVE-2019-1010024",
"https://security-tracker.debian.org/tracker/CVE-2019-1010024",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22852",
"https://support.f5.com/csp/article/K06046097",
"https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010024"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010025",
"PkgName": "libc6",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: information disclosure of heap addresses of pthread_created thread",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-330"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 2.9
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010025",
"https://security-tracker.debian.org/tracker/CVE-2019-1010025",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22853",
"https://support.f5.com/csp/article/K06046097",
"https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010025"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-9192",
"PkgName": "libc6",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "** DISPUTED ** In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-9192",
"https://nvd.nist.gov/vuln/detail/CVE-2019-9192",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
"https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS"
],
"PublishedDate": "2019-02-26T18:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2010-4756",
"PkgName": "libc6-dev",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions",
"Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V2Score": 4
},
"redhat": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"http://cxib.net/stuff/glob-0day.c",
"http://securityreason.com/achievement_securityalert/89",
"http://securityreason.com/exploitalert/9223",
"https://access.redhat.com/security/cve/CVE-2010-4756",
"https://bugzilla.redhat.com/show_bug.cgi?id=681681",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756",
"https://nvd.nist.gov/vuln/detail/CVE-2010-4756"
],
"PublishedDate": "2011-03-02T20:00:00Z",
"LastModifiedDate": "2021-09-01T12:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20796",
"PkgName": "libc6-dev",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/107160",
"https://access.redhat.com/security/cve/CVE-2018-20796",
"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
"https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
"https://nvd.nist.gov/vuln/detail/CVE-2018-20796",
"https://security.netapp.com/advisory/ntap-20190315-0002/",
"https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS"
],
"PublishedDate": "2019-02-26T02:29:00Z",
"LastModifiedDate": "2019-11-05T21:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010022",
"PkgName": "libc6-dev",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: stack guard protection bypass",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010022",
"https://security-tracker.debian.org/tracker/CVE-2019-1010022",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22850",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3",
"https://ubuntu.com/security/CVE-2019-1010022"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2021-06-10T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010023",
"PkgName": "libc6-dev",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation",
"Description": "** DISPUTED ** GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://www.securityfocus.com/bid/109167",
"https://access.redhat.com/security/cve/CVE-2019-1010023",
"https://security-tracker.debian.org/tracker/CVE-2019-1010023",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22851",
"https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010023"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010024",
"PkgName": "libc6-dev",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: ASLR bypass using cache of thread stack and heap",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/109162",
"https://access.redhat.com/security/cve/CVE-2019-1010024",
"https://security-tracker.debian.org/tracker/CVE-2019-1010024",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22852",
"https://support.f5.com/csp/article/K06046097",
"https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010024"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010025",
"PkgName": "libc6-dev",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: information disclosure of heap addresses of pthread_created thread",
"Description": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-330"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 2.9
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010025",
"https://security-tracker.debian.org/tracker/CVE-2019-1010025",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22853",
"https://support.f5.com/csp/article/K06046097",
"https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/CVE-2019-1010025"
],
"PublishedDate": "2019-07-15T04:15:00Z",
"LastModifiedDate": "2020-11-16T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-9192",
"PkgName": "libc6-dev",
"InstalledVersion": "2.31-13+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
"Description": "** DISPUTED ** In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-9192",
"https://nvd.nist.gov/vuln/detail/CVE-2019-9192",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
"https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS"
],
"PublishedDate": "2019-02-26T18:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2017-7475",
"PkgName": "libcairo-gobject2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7475",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: NULL pointer dereference with a crafted font file",
"Description": "Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://seclists.org/oss-sec/2017/q2/151",
"https://access.redhat.com/security/cve/CVE-2017-7475",
"https://bugs.freedesktop.org/show_bug.cgi?id=100763",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475",
"https://github.com/advisories/GHSA-5v3f-73gv-x7x5",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2017-7475"
],
"PublishedDate": "2017-05-19T20:29:00Z",
"LastModifiedDate": "2021-03-04T21:09:00Z"
},
{
"VulnerabilityID": "CVE-2018-18064",
"PkgName": "libcairo-gobject2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-18064",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document",
"Description": "cairo through 1.15.14 has an out-of-bounds stack-memory write during processing of a crafted document by WebKitGTK+ because of the interaction between cairo-rectangular-scan-converter.c (the generate and render_rows functions) and cairo-image-compositor.c (the _cairo_image_spans_and_zero function).",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-18064",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064",
"https://gitlab.freedesktop.org/cairo/cairo/issues/341",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-10-08T18:29:00Z",
"LastModifiedDate": "2021-03-15T22:28:00Z"
},
{
"VulnerabilityID": "CVE-2019-6461",
"PkgName": "libcairo-gobject2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6461",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c",
"Description": "An issue was discovered in cairo 1.16.0. There is an assertion problem in the function _cairo_arc_in_direction in the file cairo-arc.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-6461",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461",
"https://github.com/TeamSeri0us/pocs/tree/master/gerbv",
"https://gitlab.freedesktop.org/cairo/cairo/issues/352",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-6461"
],
"PublishedDate": "2019-01-16T18:29:00Z",
"LastModifiedDate": "2021-03-04T17:24:00Z"
},
{
"VulnerabilityID": "CVE-2019-6462",
"PkgName": "libcairo-gobject2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6462",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c",
"Description": "An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized.",
"Severity": "LOW",
"CweIDs": [
"CWE-835"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-6462",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462",
"https://github.com/TeamSeri0us/pocs/tree/master/gerbv",
"https://gitlab.freedesktop.org/cairo/cairo/issues/353",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-6462",
"https://ubuntu.com/security/notices/USN-5407-1"
],
"PublishedDate": "2019-01-16T18:29:00Z",
"LastModifiedDate": "2021-03-04T17:31:00Z"
},
{
"VulnerabilityID": "CVE-2017-7475",
"PkgName": "libcairo-script-interpreter2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7475",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: NULL pointer dereference with a crafted font file",
"Description": "Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://seclists.org/oss-sec/2017/q2/151",
"https://access.redhat.com/security/cve/CVE-2017-7475",
"https://bugs.freedesktop.org/show_bug.cgi?id=100763",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475",
"https://github.com/advisories/GHSA-5v3f-73gv-x7x5",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2017-7475"
],
"PublishedDate": "2017-05-19T20:29:00Z",
"LastModifiedDate": "2021-03-04T21:09:00Z"
},
{
"VulnerabilityID": "CVE-2018-18064",
"PkgName": "libcairo-script-interpreter2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-18064",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document",
"Description": "cairo through 1.15.14 has an out-of-bounds stack-memory write during processing of a crafted document by WebKitGTK+ because of the interaction between cairo-rectangular-scan-converter.c (the generate and render_rows functions) and cairo-image-compositor.c (the _cairo_image_spans_and_zero function).",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-18064",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064",
"https://gitlab.freedesktop.org/cairo/cairo/issues/341",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-10-08T18:29:00Z",
"LastModifiedDate": "2021-03-15T22:28:00Z"
},
{
"VulnerabilityID": "CVE-2019-6461",
"PkgName": "libcairo-script-interpreter2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6461",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c",
"Description": "An issue was discovered in cairo 1.16.0. There is an assertion problem in the function _cairo_arc_in_direction in the file cairo-arc.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-6461",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461",
"https://github.com/TeamSeri0us/pocs/tree/master/gerbv",
"https://gitlab.freedesktop.org/cairo/cairo/issues/352",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-6461"
],
"PublishedDate": "2019-01-16T18:29:00Z",
"LastModifiedDate": "2021-03-04T17:24:00Z"
},
{
"VulnerabilityID": "CVE-2019-6462",
"PkgName": "libcairo-script-interpreter2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6462",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c",
"Description": "An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized.",
"Severity": "LOW",
"CweIDs": [
"CWE-835"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-6462",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462",
"https://github.com/TeamSeri0us/pocs/tree/master/gerbv",
"https://gitlab.freedesktop.org/cairo/cairo/issues/353",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-6462",
"https://ubuntu.com/security/notices/USN-5407-1"
],
"PublishedDate": "2019-01-16T18:29:00Z",
"LastModifiedDate": "2021-03-04T17:31:00Z"
},
{
"VulnerabilityID": "CVE-2017-7475",
"PkgName": "libcairo2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7475",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: NULL pointer dereference with a crafted font file",
"Description": "Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://seclists.org/oss-sec/2017/q2/151",
"https://access.redhat.com/security/cve/CVE-2017-7475",
"https://bugs.freedesktop.org/show_bug.cgi?id=100763",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475",
"https://github.com/advisories/GHSA-5v3f-73gv-x7x5",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2017-7475"
],
"PublishedDate": "2017-05-19T20:29:00Z",
"LastModifiedDate": "2021-03-04T21:09:00Z"
},
{
"VulnerabilityID": "CVE-2018-18064",
"PkgName": "libcairo2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-18064",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document",
"Description": "cairo through 1.15.14 has an out-of-bounds stack-memory write during processing of a crafted document by WebKitGTK+ because of the interaction between cairo-rectangular-scan-converter.c (the generate and render_rows functions) and cairo-image-compositor.c (the _cairo_image_spans_and_zero function).",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-18064",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064",
"https://gitlab.freedesktop.org/cairo/cairo/issues/341",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-10-08T18:29:00Z",
"LastModifiedDate": "2021-03-15T22:28:00Z"
},
{
"VulnerabilityID": "CVE-2019-6461",
"PkgName": "libcairo2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6461",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c",
"Description": "An issue was discovered in cairo 1.16.0. There is an assertion problem in the function _cairo_arc_in_direction in the file cairo-arc.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-6461",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461",
"https://github.com/TeamSeri0us/pocs/tree/master/gerbv",
"https://gitlab.freedesktop.org/cairo/cairo/issues/352",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-6461"
],
"PublishedDate": "2019-01-16T18:29:00Z",
"LastModifiedDate": "2021-03-04T17:24:00Z"
},
{
"VulnerabilityID": "CVE-2019-6462",
"PkgName": "libcairo2",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6462",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c",
"Description": "An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized.",
"Severity": "LOW",
"CweIDs": [
"CWE-835"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-6462",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462",
"https://github.com/TeamSeri0us/pocs/tree/master/gerbv",
"https://gitlab.freedesktop.org/cairo/cairo/issues/353",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-6462",
"https://ubuntu.com/security/notices/USN-5407-1"
],
"PublishedDate": "2019-01-16T18:29:00Z",
"LastModifiedDate": "2021-03-04T17:31:00Z"
},
{
"VulnerabilityID": "CVE-2017-7475",
"PkgName": "libcairo2-dev",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7475",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: NULL pointer dereference with a crafted font file",
"Description": "Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://seclists.org/oss-sec/2017/q2/151",
"https://access.redhat.com/security/cve/CVE-2017-7475",
"https://bugs.freedesktop.org/show_bug.cgi?id=100763",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475",
"https://github.com/advisories/GHSA-5v3f-73gv-x7x5",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2017-7475"
],
"PublishedDate": "2017-05-19T20:29:00Z",
"LastModifiedDate": "2021-03-04T21:09:00Z"
},
{
"VulnerabilityID": "CVE-2018-18064",
"PkgName": "libcairo2-dev",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-18064",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document",
"Description": "cairo through 1.15.14 has an out-of-bounds stack-memory write during processing of a crafted document by WebKitGTK+ because of the interaction between cairo-rectangular-scan-converter.c (the generate and render_rows functions) and cairo-image-compositor.c (the _cairo_image_spans_and_zero function).",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-18064",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064",
"https://gitlab.freedesktop.org/cairo/cairo/issues/341",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-10-08T18:29:00Z",
"LastModifiedDate": "2021-03-15T22:28:00Z"
},
{
"VulnerabilityID": "CVE-2019-6461",
"PkgName": "libcairo2-dev",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6461",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c",
"Description": "An issue was discovered in cairo 1.16.0. There is an assertion problem in the function _cairo_arc_in_direction in the file cairo-arc.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-6461",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461",
"https://github.com/TeamSeri0us/pocs/tree/master/gerbv",
"https://gitlab.freedesktop.org/cairo/cairo/issues/352",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-6461"
],
"PublishedDate": "2019-01-16T18:29:00Z",
"LastModifiedDate": "2021-03-04T17:24:00Z"
},
{
"VulnerabilityID": "CVE-2019-6462",
"PkgName": "libcairo2-dev",
"InstalledVersion": "1.16.0-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6462",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c",
"Description": "An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized.",
"Severity": "LOW",
"CweIDs": [
"CWE-835"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-6462",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462",
"https://github.com/TeamSeri0us/pocs/tree/master/gerbv",
"https://gitlab.freedesktop.org/cairo/cairo/issues/353",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-6462",
"https://ubuntu.com/security/notices/USN-5407-1"
],
"PublishedDate": "2019-01-16T18:29:00Z",
"LastModifiedDate": "2021-03-04T17:31:00Z"
},
{
"VulnerabilityID": "CVE-2022-1304",
"PkgName": "libcom-err2",
"InstalledVersion": "1.46.2-2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1304",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "e2fsprogs: out-of-bounds read/write via crafted filesystem",
"Description": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"V3Score": 5.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1304",
"https://bugzilla.redhat.com/show_bug.cgi?id=2069726",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304",
"https://marc.info/?l=linux-ext4&m=165056234501732&w=2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1304",
"https://ubuntu.com/security/notices/USN-5464-1"
],
"PublishedDate": "2022-04-14T21:15:00Z",
"LastModifiedDate": "2022-04-21T15:36:00Z"
},
{
"VulnerabilityID": "CVE-2017-13716",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-13716",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Memory leak with the C++ symbol demangler routine in libiberty",
"Description": "The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) library (aka libbfd).",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-13716",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22009"
],
"PublishedDate": "2017-08-28T21:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-12934",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-12934",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c",
"Description": "remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-12934",
"https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23059",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-06-28T14:29:00Z",
"LastModifiedDate": "2020-04-21T22:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-18483",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-18483",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service",
"Description": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 4.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/105689",
"https://access.redhat.com/security/cve/CVE-2018-18483",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23767",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-10-18T21:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20623",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20623",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Use-after-free in the error function",
"Description": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/106370",
"https://access.redhat.com/security/cve/CVE-2018-20623",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24049",
"https://support.f5.com/csp/article/K38336243",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-12-31T19:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20673",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20673",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: Integer overflow in demangle_template() function",
"Description": "The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for \"Create an array for saving the template argument values\") that can trigger a heap-based buffer overflow, as demonstrated by nm.",
"Severity": "LOW",
"CweIDs": [
"CWE-787",
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/106454",
"https://access.redhat.com/security/cve/CVE-2018-20673",
"https://linux.oracle.com/cve/CVE-2018-20673.html",
"https://linux.oracle.com/errata/ELSA-2021-4386.html",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24039"
],
"PublishedDate": "2019-01-04T18:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2018-20712",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20712",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: heap-based buffer over-read in d_expression_1",
"Description": "A heap-based buffer over-read exists in the function d_expression_1 in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31.1. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"http://www.securityfocus.com/bid/106563",
"https://access.redhat.com/security/cve/CVE-2018-20712",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24043",
"https://support.f5.com/csp/article/K38336243"
],
"PublishedDate": "2019-01-15T00:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-9996",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-9996",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Stack-overflow in libiberty/cplus-dem.c causes crash",
"Description": "An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/103733",
"https://access.redhat.com/security/cve/CVE-2018-9996",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304"
],
"PublishedDate": "2018-04-10T22:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010204",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010204",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service",
"Description": "GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.",
"Severity": "LOW",
"CweIDs": [
"CWE-125",
"CWE-681"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010204",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204",
"https://linux.oracle.com/cve/CVE-2019-1010204.html",
"https://linux.oracle.com/errata/ELSA-2020-1797.html",
"https://security.netapp.com/advisory/ntap-20190822-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23765",
"https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/notices/USN-5349-1"
],
"PublishedDate": "2019-07-23T14:15:00Z",
"LastModifiedDate": "2022-04-18T17:02:00Z"
},
{
"VulnerabilityID": "CVE-2020-35448",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-35448",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c",
"Description": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V2Score": 4.3,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-35448",
"https://linux.oracle.com/cve/CVE-2020-35448.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202107-24",
"https://security.netapp.com/advisory/ntap-20210129-0008/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26574",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679"
],
"PublishedDate": "2020-12-27T04:15:00Z",
"LastModifiedDate": "2022-04-26T16:13:00Z"
},
{
"VulnerabilityID": "CVE-2021-20197",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20197",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Race window allows users to own arbitrary files",
"Description": "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"V2Score": 3.3,
"V3Score": 6.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"V3Score": 4.2
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20197",
"https://bugzilla.redhat.com/show_bug.cgi?id=1913743",
"https://linux.oracle.com/cve/CVE-2021-20197.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-20197",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210528-0009/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26945"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20284",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20284",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c",
"Description": "A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20284",
"https://bugzilla.redhat.com/show_bug.cgi?id=1937784",
"https://linux.oracle.com/cve/CVE-2021-20284.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210521-0010/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26931"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3487",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3487",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section()",
"Description": "There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.",
"Severity": "LOW",
"CweIDs": [
"CWE-20",
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3487",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947111",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487",
"https://linux.oracle.com/cve/CVE-2021-3487.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3487",
"https://security.gentoo.org/glsa/202208-30",
"https://ubuntu.com/security/notices/USN-5124-1",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-04-15T14:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3530",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3530",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: stack memory exhaustion in demangle_path() in rust-demangle.c",
"Description": "A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3530",
"https://bugzilla.redhat.com/show_bug.cgi?id=1956423",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210716-0006/",
"https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch"
],
"PublishedDate": "2021-06-02T15:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3549",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3549",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter",
"Description": "An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3549",
"https://bugzilla.redhat.com/show_bug.cgi?id=1960717",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549",
"https://security.gentoo.org/glsa/202208-30"
],
"PublishedDate": "2021-05-26T21:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-45078",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45078",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c",
"Description": "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-45078",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-45078",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20220107-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=28694",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-12-15T20:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-46195",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46195",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "gcc: uncontrolled recursion in libiberty/rust-demangle.c",
"Description": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-46195",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841"
],
"PublishedDate": "2022-01-14T20:15:00Z",
"LastModifiedDate": "2022-01-22T01:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-38126",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38126",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Assertion fail in the display_debug_names() function in binutils/dwarf.c",
"Description": "Assertion fail in the display_debug_names() function in binutils/dwarf.c may lead to program crash and denial of service.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38126",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29289"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:22:00Z"
},
{
"VulnerabilityID": "CVE-2022-38127",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38127",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c",
"Description": "A NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c may lead to program crash when parsing corrupt DWARF data.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38127",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29290"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:23:00Z"
},
{
"VulnerabilityID": "CVE-2022-38128",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38128",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Infinite loop in display_debug_abbrev() function in binutils/dwarf.c",
"Description": "An infinite loop may be triggered in display_debug_abbrev() function in binutils/dwarf.c while opening a crafted ELF, which may lead to denial of service by a local attacker.",
"Severity": "LOW",
"CweIDs": [
"CWE-835"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38128",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29370"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:05:00Z"
},
{
"VulnerabilityID": "CVE-2022-38533",
"PkgName": "libctf-nobfd0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38533",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file",
"Description": "In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38533",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533",
"https://nvd.nist.gov/vuln/detail/CVE-2022-38533",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2"
],
"PublishedDate": "2022-08-26T00:15:00Z",
"LastModifiedDate": "2022-09-19T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2017-13716",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-13716",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Memory leak with the C++ symbol demangler routine in libiberty",
"Description": "The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) library (aka libbfd).",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-13716",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716",
"https://sourceware.org/bugzilla/show_bug.cgi?id=22009"
],
"PublishedDate": "2017-08-28T21:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-12934",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-12934",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c",
"Description": "remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-12934",
"https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23059",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-06-28T14:29:00Z",
"LastModifiedDate": "2020-04-21T22:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-18483",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-18483",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service",
"Description": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 4.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/105689",
"https://access.redhat.com/security/cve/CVE-2018-18483",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23767",
"https://ubuntu.com/security/notices/USN-4326-1",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4326-1/",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-10-18T21:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20623",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20623",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Use-after-free in the error function",
"Description": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
"http://www.securityfocus.com/bid/106370",
"https://access.redhat.com/security/cve/CVE-2018-20623",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24049",
"https://support.f5.com/csp/article/K38336243",
"https://ubuntu.com/security/notices/USN-4336-1",
"https://ubuntu.com/security/notices/USN-4336-2",
"https://usn.ubuntu.com/4336-1/"
],
"PublishedDate": "2018-12-31T19:29:00Z",
"LastModifiedDate": "2019-10-31T01:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-20673",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20673",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: Integer overflow in demangle_template() function",
"Description": "The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for \"Create an array for saving the template argument values\") that can trigger a heap-based buffer overflow, as demonstrated by nm.",
"Severity": "LOW",
"CweIDs": [
"CWE-787",
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/106454",
"https://access.redhat.com/security/cve/CVE-2018-20673",
"https://linux.oracle.com/cve/CVE-2018-20673.html",
"https://linux.oracle.com/errata/ELSA-2021-4386.html",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24039"
],
"PublishedDate": "2019-01-04T18:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2018-20712",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20712",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libiberty: heap-based buffer over-read in d_expression_1",
"Description": "A heap-based buffer over-read exists in the function d_expression_1 in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31.1. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by c++filt.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"http://www.securityfocus.com/bid/106563",
"https://access.redhat.com/security/cve/CVE-2018-20712",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629",
"https://sourceware.org/bugzilla/show_bug.cgi?id=24043",
"https://support.f5.com/csp/article/K38336243"
],
"PublishedDate": "2019-01-15T00:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-9996",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-9996",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Stack-overflow in libiberty/cplus-dem.c causes crash",
"Description": "An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/103733",
"https://access.redhat.com/security/cve/CVE-2018-9996",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304"
],
"PublishedDate": "2018-04-10T22:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2019-1010204",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010204",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service",
"Description": "GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.",
"Severity": "LOW",
"CweIDs": [
"CWE-125",
"CWE-681"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-1010204",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204",
"https://linux.oracle.com/cve/CVE-2019-1010204.html",
"https://linux.oracle.com/errata/ELSA-2020-1797.html",
"https://security.netapp.com/advisory/ntap-20190822-0001/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=23765",
"https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/notices/USN-5349-1"
],
"PublishedDate": "2019-07-23T14:15:00Z",
"LastModifiedDate": "2022-04-18T17:02:00Z"
},
{
"VulnerabilityID": "CVE-2020-35448",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-35448",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c",
"Description": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V2Score": 4.3,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-35448",
"https://linux.oracle.com/cve/CVE-2020-35448.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202107-24",
"https://security.netapp.com/advisory/ntap-20210129-0008/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26574",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679"
],
"PublishedDate": "2020-12-27T04:15:00Z",
"LastModifiedDate": "2022-04-26T16:13:00Z"
},
{
"VulnerabilityID": "CVE-2021-20197",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20197",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Race window allows users to own arbitrary files",
"Description": "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"V2Score": 3.3,
"V3Score": 6.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"V3Score": 4.2
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20197",
"https://bugzilla.redhat.com/show_bug.cgi?id=1913743",
"https://linux.oracle.com/cve/CVE-2021-20197.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-20197",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210528-0009/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26945"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20284",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20284",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c",
"Description": "A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20284",
"https://bugzilla.redhat.com/show_bug.cgi?id=1937784",
"https://linux.oracle.com/cve/CVE-2021-20284.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210521-0010/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=26931"
],
"PublishedDate": "2021-03-26T17:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3487",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3487",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section()",
"Description": "There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.",
"Severity": "LOW",
"CweIDs": [
"CWE-20",
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3487",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947111",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487",
"https://linux.oracle.com/cve/CVE-2021-3487.html",
"https://linux.oracle.com/errata/ELSA-2021-4364.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3487",
"https://security.gentoo.org/glsa/202208-30",
"https://ubuntu.com/security/notices/USN-5124-1",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-04-15T14:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3530",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3530",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: stack memory exhaustion in demangle_path() in rust-demangle.c",
"Description": "A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3530",
"https://bugzilla.redhat.com/show_bug.cgi?id=1956423",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20210716-0006/",
"https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch"
],
"PublishedDate": "2021-06-02T15:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3549",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3549",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter",
"Description": "An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3549",
"https://bugzilla.redhat.com/show_bug.cgi?id=1960717",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549",
"https://security.gentoo.org/glsa/202208-30"
],
"PublishedDate": "2021-05-26T21:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-45078",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45078",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c",
"Description": "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-45078",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-45078",
"https://security.gentoo.org/glsa/202208-30",
"https://security.netapp.com/advisory/ntap-20220107-0002/",
"https://sourceware.org/bugzilla/show_bug.cgi?id=28694",
"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02",
"https://ubuntu.com/security/notices/USN-5341-1"
],
"PublishedDate": "2021-12-15T20:15:00Z",
"LastModifiedDate": "2022-08-15T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-46195",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46195",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "gcc: uncontrolled recursion in libiberty/rust-demangle.c",
"Description": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-46195",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841"
],
"PublishedDate": "2022-01-14T20:15:00Z",
"LastModifiedDate": "2022-01-22T01:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-38126",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38126",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Assertion fail in the display_debug_names() function in binutils/dwarf.c",
"Description": "Assertion fail in the display_debug_names() function in binutils/dwarf.c may lead to program crash and denial of service.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38126",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29289"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:22:00Z"
},
{
"VulnerabilityID": "CVE-2022-38127",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38127",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c",
"Description": "A NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c may lead to program crash when parsing corrupt DWARF data.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38127",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29290"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:23:00Z"
},
{
"VulnerabilityID": "CVE-2022-38128",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38128",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: Infinite loop in display_debug_abbrev() function in binutils/dwarf.c",
"Description": "An infinite loop may be triggered in display_debug_abbrev() function in binutils/dwarf.c while opening a crafted ELF, which may lead to denial of service by a local attacker.",
"Severity": "LOW",
"CweIDs": [
"CWE-835"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 2.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38128",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29370"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T15:05:00Z"
},
{
"VulnerabilityID": "CVE-2022-38533",
"PkgName": "libctf0",
"InstalledVersion": "2.35.2-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38533",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file",
"Description": "In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-38533",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533",
"https://nvd.nist.gov/vuln/detail/CVE-2022-38533",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482",
"https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2"
],
"PublishedDate": "2022-08-26T00:15:00Z",
"LastModifiedDate": "2022-09-19T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2021-22922",
"PkgName": "libcurl3-gnutls",
"InstalledVersion": "7.74.0-1.3+deb11u3",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-22922",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "curl: Content not matching hash in Metalink is not being discarded",
"Description": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.",
"Severity": "LOW",
"CweIDs": [
"CWE-755"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-22922",
"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
"https://curl.se/docs/CVE-2021-22922.html",
"https://hackerone.com/reports/1213175",
"https://linux.oracle.com/cve/CVE-2021-22922.html",
"https://linux.oracle.com/errata/ELSA-2021-3582.html",
"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-22922",
"https://security.netapp.com/advisory/ntap-20210902-0003/",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-08-05T21:15:00Z",
"LastModifiedDate": "2022-08-30T22:39:00Z"
},
{
"VulnerabilityID": "CVE-2021-22923",
"PkgName": "libcurl3-gnutls",
"InstalledVersion": "7.74.0-1.3+deb11u3",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-22923",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "curl: Metalink download sends credentials",
"Description": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.",
"Severity": "LOW",
"CweIDs": [
"CWE-522"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"V2Score": 2.6,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"V3Score": 5.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-22923",
"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
"https://curl.se/docs/CVE-2021-22923.html",
"https://hackerone.com/reports/1213181",
"https://linux.oracle.com/cve/CVE-2021-22923.html",
"https://linux.oracle.com/errata/ELSA-2021-3582.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-22923",
"https://security.netapp.com/advisory/ntap-20210902-0003/",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-08-05T21:15:00Z",
"LastModifiedDate": "2022-04-06T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2021-22922",
"PkgName": "libcurl4",
"InstalledVersion": "7.74.0-1.3+deb11u3",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-22922",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "curl: Content not matching hash in Metalink is not being discarded",
"Description": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.",
"Severity": "LOW",
"CweIDs": [
"CWE-755"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-22922",
"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
"https://curl.se/docs/CVE-2021-22922.html",
"https://hackerone.com/reports/1213175",
"https://linux.oracle.com/cve/CVE-2021-22922.html",
"https://linux.oracle.com/errata/ELSA-2021-3582.html",
"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-22922",
"https://security.netapp.com/advisory/ntap-20210902-0003/",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-08-05T21:15:00Z",
"LastModifiedDate": "2022-08-30T22:39:00Z"
},
{
"VulnerabilityID": "CVE-2021-22923",
"PkgName": "libcurl4",
"InstalledVersion": "7.74.0-1.3+deb11u3",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-22923",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "curl: Metalink download sends credentials",
"Description": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.",
"Severity": "LOW",
"CweIDs": [
"CWE-522"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"V2Score": 2.6,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"V3Score": 5.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-22923",
"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
"https://curl.se/docs/CVE-2021-22923.html",
"https://hackerone.com/reports/1213181",
"https://linux.oracle.com/cve/CVE-2021-22923.html",
"https://linux.oracle.com/errata/ELSA-2021-3582.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-22923",
"https://security.netapp.com/advisory/ntap-20210902-0003/",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-08-05T21:15:00Z",
"LastModifiedDate": "2022-04-06T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2021-22922",
"PkgName": "libcurl4-openssl-dev",
"InstalledVersion": "7.74.0-1.3+deb11u3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-22922",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "curl: Content not matching hash in Metalink is not being discarded",
"Description": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.",
"Severity": "LOW",
"CweIDs": [
"CWE-755"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-22922",
"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
"https://curl.se/docs/CVE-2021-22922.html",
"https://hackerone.com/reports/1213175",
"https://linux.oracle.com/cve/CVE-2021-22922.html",
"https://linux.oracle.com/errata/ELSA-2021-3582.html",
"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-22922",
"https://security.netapp.com/advisory/ntap-20210902-0003/",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-08-05T21:15:00Z",
"LastModifiedDate": "2022-08-30T22:39:00Z"
},
{
"VulnerabilityID": "CVE-2021-22923",
"PkgName": "libcurl4-openssl-dev",
"InstalledVersion": "7.74.0-1.3+deb11u3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-22923",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "curl: Metalink download sends credentials",
"Description": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.",
"Severity": "LOW",
"CweIDs": [
"CWE-522"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"V2Score": 2.6,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"V3Score": 5.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-22923",
"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
"https://curl.se/docs/CVE-2021-22923.html",
"https://hackerone.com/reports/1213181",
"https://linux.oracle.com/cve/CVE-2021-22923.html",
"https://linux.oracle.com/errata/ELSA-2021-3582.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-22923",
"https://security.netapp.com/advisory/ntap-20210902-0003/",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-08-05T21:15:00Z",
"LastModifiedDate": "2022-04-06T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2019-8457",
"PkgName": "libdb5.3",
"InstalledVersion": "5.3.28+dfsg1-0.8",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-8457",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "sqlite: heap out-of-bound read in function rtreenode()",
"Description": "SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html",
"https://access.redhat.com/security/cve/CVE-2019-8457",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
"https://linux.oracle.com/cve/CVE-2019-8457.html",
"https://linux.oracle.com/errata/ELSA-2020-1810.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/",
"https://security.netapp.com/advisory/ntap-20190606-0002/",
"https://ubuntu.com/security/notices/USN-4004-1",
"https://ubuntu.com/security/notices/USN-4004-2",
"https://ubuntu.com/security/notices/USN-4019-1",
"https://ubuntu.com/security/notices/USN-4019-2",
"https://usn.ubuntu.com/4004-1/",
"https://usn.ubuntu.com/4004-2/",
"https://usn.ubuntu.com/4019-1/",
"https://usn.ubuntu.com/4019-2/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"https://www.sqlite.org/releaselog/3_28_0.html",
"https://www.sqlite.org/src/info/90acdbfce9c08858"
],
"PublishedDate": "2019-05-30T16:29:00Z",
"LastModifiedDate": "2021-07-31T08:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-8457",
"PkgName": "libdb5.3-dev",
"InstalledVersion": "5.3.28+dfsg1-0.8",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-8457",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "sqlite: heap out-of-bound read in function rtreenode()",
"Description": "SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html",
"https://access.redhat.com/security/cve/CVE-2019-8457",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
"https://linux.oracle.com/cve/CVE-2019-8457.html",
"https://linux.oracle.com/errata/ELSA-2020-1810.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/",
"https://security.netapp.com/advisory/ntap-20190606-0002/",
"https://ubuntu.com/security/notices/USN-4004-1",
"https://ubuntu.com/security/notices/USN-4004-2",
"https://ubuntu.com/security/notices/USN-4019-1",
"https://ubuntu.com/security/notices/USN-4019-2",
"https://usn.ubuntu.com/4004-1/",
"https://usn.ubuntu.com/4004-2/",
"https://usn.ubuntu.com/4019-1/",
"https://usn.ubuntu.com/4019-2/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"https://www.sqlite.org/releaselog/3_28_0.html",
"https://www.sqlite.org/src/info/90acdbfce9c08858"
],
"PublishedDate": "2019-05-30T16:29:00Z",
"LastModifiedDate": "2021-07-31T08:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-1253",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1253",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Heap-based Buffer Overflow in GitHub repository strukturag/libde265 pr ...",
"Description": "Heap-based Buffer Overflow in GitHub repository strukturag/libde265 prior to and including 1.0.8. The fix is established in commit 8e89fe0e175d2870c39486fdd09250b230ec10b8 but does not yet belong to an official release.",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
}
},
"References": [
"https://github.com/strukturag/libde265/commit/8e89fe0e175d2870c39486fdd09250b230ec10b8",
"https://huntr.dev/bounties/1-other-strukturag/libde265",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1253"
],
"PublishedDate": "2022-04-06T12:15:00Z",
"LastModifiedDate": "2022-04-14T17:52:00Z"
},
{
"VulnerabilityID": "CVE-2020-21598",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21598",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a heap buffer overflow in the ff_hevc_put_unw ...",
"Description": "libde265 v1.0.4 contains a heap buffer overflow in the ff_hevc_put_unweighted_pred_8_sse function, which can be exploited via a crafted a file.",
"Severity": "HIGH",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
}
},
"References": [
"https://cwe.mitre.org/data/definitions/122.html",
"https://github.com/strukturag/libde265/issues/237"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2022-09-08T21:04:00Z"
},
{
"VulnerabilityID": "CVE-2021-36409",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36409",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at ...",
"Description": "There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at sps.cc:925 in libde265 v1.0.8 when decoding file, which allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file or possibly have unspecified other impact.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
}
},
"References": [
"https://github.com/strukturag/libde265/issues/300",
"https://nvd.nist.gov/vuln/detail/CVE-2021-36409"
],
"PublishedDate": "2022-01-10T23:15:00Z",
"LastModifiedDate": "2022-01-19T14:49:00Z"
},
{
"VulnerabilityID": "CVE-2020-21594",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21594",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a heap buffer overflow in the put_epel_hv_fal ...",
"Description": "libde265 v1.0.4 contains a heap buffer overflow in the put_epel_hv_fallback function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/233"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2021-09-27T20:33:00Z"
},
{
"VulnerabilityID": "CVE-2020-21595",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21595",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a heap buffer overflow in the mc_luma functio ...",
"Description": "libde265 v1.0.4 contains a heap buffer overflow in the mc_luma function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/239"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2021-09-27T20:34:00Z"
},
{
"VulnerabilityID": "CVE-2020-21596",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21596",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_ ...",
"Description": "libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_bit function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/236"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2021-09-27T20:34:00Z"
},
{
"VulnerabilityID": "CVE-2020-21597",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21597",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma funct ...",
"Description": "libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/238"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2021-09-27T20:19:00Z"
},
{
"VulnerabilityID": "CVE-2020-21599",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21599",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a heap buffer overflow in the de265_image::av ...",
"Description": "libde265 v1.0.4 contains a heap buffer overflow in the de265_image::available_zscan function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/235"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2021-09-27T20:32:00Z"
},
{
"VulnerabilityID": "CVE-2020-21600",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21600",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_pr ...",
"Description": "libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_pred_avg_16_fallback function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://cwe.mitre.org/data/definitions/122.html",
"https://github.com/strukturag/libde265/issues/243"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2022-09-08T21:05:00Z"
},
{
"VulnerabilityID": "CVE-2020-21601",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21601",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a stack buffer overflow in the put_qpel_fallb ...",
"Description": "libde265 v1.0.4 contains a stack buffer overflow in the put_qpel_fallback function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/241"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2021-09-27T20:12:00Z"
},
{
"VulnerabilityID": "CVE-2020-21602",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21602",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_bi ...",
"Description": "libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_bipred_16_fallback function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://cwe.mitre.org/data/definitions/122.html",
"https://github.com/strukturag/libde265/issues/242"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2022-09-08T21:05:00Z"
},
{
"VulnerabilityID": "CVE-2020-21603",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21603",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fa ...",
"Description": "libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fallback_16 function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/240"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2021-09-27T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-21604",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21604",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a heap buffer overflow fault in the _mm_loadl ...",
"Description": "libde265 v1.0.4 contains a heap buffer overflow fault in the _mm_loadl_epi64 function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/231"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2021-09-27T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-21605",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21605",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a segmentation fault in the apply_sao_interna ...",
"Description": "libde265 v1.0.4 contains a segmentation fault in the apply_sao_internal function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/234"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2021-09-27T18:56:00Z"
},
{
"VulnerabilityID": "CVE-2020-21606",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-21606",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_ ...",
"Description": "libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_16_fallback function, which can be exploited via a crafted a file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/232"
],
"PublishedDate": "2021-09-16T22:15:00Z",
"LastModifiedDate": "2021-09-27T19:43:00Z"
},
{
"VulnerabilityID": "CVE-2021-35452",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-35452",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "An Incorrect Access Control vulnerability exists in libde265 v1.0.8 du ...",
"Description": "An Incorrect Access Control vulnerability exists in libde265 v1.0.8 due to a SEGV in slice.cc.",
"Severity": "MEDIUM",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/298",
"https://nvd.nist.gov/vuln/detail/CVE-2021-35452"
],
"PublishedDate": "2022-01-10T22:15:00Z",
"LastModifiedDate": "2022-01-18T20:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-36408",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36408",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-f ...",
"Description": "An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-free in intrapred.h when decoding file using dec265.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/299",
"https://nvd.nist.gov/vuln/detail/CVE-2021-36408"
],
"PublishedDate": "2022-01-10T23:15:00Z",
"LastModifiedDate": "2022-01-19T14:25:00Z"
},
{
"VulnerabilityID": "CVE-2021-36410",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36410",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion. ...",
"Description": "A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion.cc in function put_epel_hv_fallback when running program dec265.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/301",
"https://nvd.nist.gov/vuln/detail/CVE-2021-36410"
],
"PublishedDate": "2022-01-10T23:15:00Z",
"LastModifiedDate": "2022-01-19T14:37:00Z"
},
{
"VulnerabilityID": "CVE-2021-36411",
"PkgName": "libde265-0",
"InstalledVersion": "1.0.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36411",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "An issue has been found in libde265 v1.0.8 due to incorrect access con ...",
"Description": "An issue has been found in libde265 v1.0.8 due to incorrect access control. A SEGV caused by a READ memory access in function derive_boundaryStrength of deblock.cc has occurred. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.",
"Severity": "MEDIUM",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
}
},
"References": [
"https://github.com/strukturag/libde265/issues/302",
"https://nvd.nist.gov/vuln/detail/CVE-2021-36411"
],
"PublishedDate": "2022-01-10T23:15:00Z",
"LastModifiedDate": "2022-01-19T14:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-40674",
"VendorIDs": [
"DSA-5236-1"
],
"PkgName": "libexpat1",
"InstalledVersion": "2.2.10-2+deb11u3",
"FixedVersion": "2.2.10-2+deb11u4",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-40674",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libexpat before 2.4.9 has a use-after-free in the doContent function i ...",
"Description": "libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 9.8
}
},
"References": [
"https://github.com/libexpat/libexpat/pull/629",
"https://github.com/libexpat/libexpat/pull/640",
"https://nvd.nist.gov/vuln/detail/CVE-2022-40674",
"https://www.debian.org/security/2022/dsa-5236"
],
"PublishedDate": "2022-09-14T11:15:00Z",
"LastModifiedDate": "2022-09-23T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2013-0340",
"PkgName": "libexpat1",
"InstalledVersion": "2.2.10-2+deb11u3",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-0340",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "expat: internal entity expansion",
"Description": "expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.",
"Severity": "LOW",
"CweIDs": [
"CWE-611"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V2Score": 6.8
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 4.3
}
},
"References": [
"http://openwall.com/lists/oss-security/2013/02/22/3",
"http://seclists.org/fulldisclosure/2021/Oct/61",
"http://seclists.org/fulldisclosure/2021/Oct/62",
"http://seclists.org/fulldisclosure/2021/Oct/63",
"http://seclists.org/fulldisclosure/2021/Sep/33",
"http://seclists.org/fulldisclosure/2021/Sep/34",
"http://seclists.org/fulldisclosure/2021/Sep/35",
"http://seclists.org/fulldisclosure/2021/Sep/38",
"http://seclists.org/fulldisclosure/2021/Sep/39",
"http://seclists.org/fulldisclosure/2021/Sep/40",
"http://securitytracker.com/id?1028213",
"http://www.openwall.com/lists/oss-security/2013/04/12/6",
"http://www.openwall.com/lists/oss-security/2021/10/07/4",
"http://www.osvdb.org/90634",
"http://www.securityfocus.com/bid/58233",
"https://access.redhat.com/security/cve/CVE-2013-0340",
"https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E",
"https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2013-0340",
"https://security.gentoo.org/glsa/201701-21",
"https://support.apple.com/kb/HT212804",
"https://support.apple.com/kb/HT212805",
"https://support.apple.com/kb/HT212807",
"https://support.apple.com/kb/HT212814",
"https://support.apple.com/kb/HT212815",
"https://support.apple.com/kb/HT212819"
],
"PublishedDate": "2014-01-21T18:55:00Z",
"LastModifiedDate": "2022-07-05T18:57:00Z"
},
{
"VulnerabilityID": "CVE-2022-40674",
"VendorIDs": [
"DSA-5236-1"
],
"PkgName": "libexpat1-dev",
"InstalledVersion": "2.2.10-2+deb11u3",
"FixedVersion": "2.2.10-2+deb11u4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-40674",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libexpat before 2.4.9 has a use-after-free in the doContent function i ...",
"Description": "libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 9.8
}
},
"References": [
"https://github.com/libexpat/libexpat/pull/629",
"https://github.com/libexpat/libexpat/pull/640",
"https://nvd.nist.gov/vuln/detail/CVE-2022-40674",
"https://www.debian.org/security/2022/dsa-5236"
],
"PublishedDate": "2022-09-14T11:15:00Z",
"LastModifiedDate": "2022-09-23T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2013-0340",
"PkgName": "libexpat1-dev",
"InstalledVersion": "2.2.10-2+deb11u3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-0340",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "expat: internal entity expansion",
"Description": "expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.",
"Severity": "LOW",
"CweIDs": [
"CWE-611"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V2Score": 6.8
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 4.3
}
},
"References": [
"http://openwall.com/lists/oss-security/2013/02/22/3",
"http://seclists.org/fulldisclosure/2021/Oct/61",
"http://seclists.org/fulldisclosure/2021/Oct/62",
"http://seclists.org/fulldisclosure/2021/Oct/63",
"http://seclists.org/fulldisclosure/2021/Sep/33",
"http://seclists.org/fulldisclosure/2021/Sep/34",
"http://seclists.org/fulldisclosure/2021/Sep/35",
"http://seclists.org/fulldisclosure/2021/Sep/38",
"http://seclists.org/fulldisclosure/2021/Sep/39",
"http://seclists.org/fulldisclosure/2021/Sep/40",
"http://securitytracker.com/id?1028213",
"http://www.openwall.com/lists/oss-security/2013/04/12/6",
"http://www.openwall.com/lists/oss-security/2021/10/07/4",
"http://www.osvdb.org/90634",
"http://www.securityfocus.com/bid/58233",
"https://access.redhat.com/security/cve/CVE-2013-0340",
"https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E",
"https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2013-0340",
"https://security.gentoo.org/glsa/201701-21",
"https://support.apple.com/kb/HT212804",
"https://support.apple.com/kb/HT212805",
"https://support.apple.com/kb/HT212807",
"https://support.apple.com/kb/HT212814",
"https://support.apple.com/kb/HT212815",
"https://support.apple.com/kb/HT212819"
],
"PublishedDate": "2014-01-21T18:55:00Z",
"LastModifiedDate": "2022-07-05T18:57:00Z"
},
{
"VulnerabilityID": "CVE-2022-1304",
"PkgName": "libext2fs2",
"InstalledVersion": "1.46.2-2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1304",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "e2fsprogs: out-of-bounds read/write via crafted filesystem",
"Description": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"V3Score": 5.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1304",
"https://bugzilla.redhat.com/show_bug.cgi?id=2069726",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304",
"https://marc.info/?l=linux-ext4&m=165056234501732&w=2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1304",
"https://ubuntu.com/security/notices/USN-5464-1"
],
"PublishedDate": "2022-04-14T21:15:00Z",
"LastModifiedDate": "2022-04-21T15:36:00Z"
},
{
"VulnerabilityID": "CVE-2022-31782",
"PkgName": "libfreetype-dev",
"InstalledVersion": "2.10.4+dfsg-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-31782",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ...",
"Description": "ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
}
},
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31782",
"https://gitlab.freedesktop.org/freetype/freetype-demos/-/issues/8",
"https://ubuntu.com/security/notices/USN-5528-1"
],
"PublishedDate": "2022-06-02T14:15:00Z",
"LastModifiedDate": "2022-06-10T18:08:00Z"
},
{
"VulnerabilityID": "CVE-2022-31782",
"PkgName": "libfreetype6",
"InstalledVersion": "2.10.4+dfsg-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-31782",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ...",
"Description": "ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
}
},
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31782",
"https://gitlab.freedesktop.org/freetype/freetype-demos/-/issues/8",
"https://ubuntu.com/security/notices/USN-5528-1"
],
"PublishedDate": "2022-06-02T14:15:00Z",
"LastModifiedDate": "2022-06-10T18:08:00Z"
},
{
"VulnerabilityID": "CVE-2022-31782",
"PkgName": "libfreetype6-dev",
"InstalledVersion": "2.10.4+dfsg-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-31782",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ...",
"Description": "ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
}
},
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31782",
"https://gitlab.freedesktop.org/freetype/freetype-demos/-/issues/8",
"https://ubuntu.com/security/notices/USN-5528-1"
],
"PublishedDate": "2022-06-02T14:15:00Z",
"LastModifiedDate": "2022-06-10T18:08:00Z"
},
{
"VulnerabilityID": "CVE-2021-33560",
"PkgName": "libgcrypt20",
"InstalledVersion": "1.8.7-6",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-33560",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm",
"Description": "Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.",
"Severity": "HIGH",
"CweIDs": [
"CWE-203"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json",
"https://access.redhat.com/security/cve/CVE-2021-33560",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560",
"https://dev.gnupg.org/T5305",
"https://dev.gnupg.org/T5328",
"https://dev.gnupg.org/T5466",
"https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61",
"https://eprint.iacr.org/2021/923",
"https://errata.almalinux.org/8/ALSA-2021-4409.html",
"https://linux.oracle.com/cve/CVE-2021-33560.html",
"https://linux.oracle.com/errata/ELSA-2022-9263.html",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-33560",
"https://ubuntu.com/security/notices/USN-5080-1",
"https://ubuntu.com/security/notices/USN-5080-2",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-06-08T11:15:00Z",
"LastModifiedDate": "2022-07-25T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-6829",
"PkgName": "libgcrypt20",
"InstalledVersion": "1.8.7-6",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-6829",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libgcrypt: ElGamal implementation doesn't have semantic security due to incorrectly encoded plaintexts possibly allowing to obtain sensitive information",
"Description": "cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.",
"Severity": "LOW",
"CweIDs": [
"CWE-327"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-6829",
"https://github.com/weikengchen/attack-on-libgcrypt-elgamal",
"https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki",
"https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html",
"https://www.oracle.com/security-alerts/cpujan2020.html"
],
"PublishedDate": "2018-02-07T23:29:00Z",
"LastModifiedDate": "2020-01-15T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2012-0039",
"PkgName": "libglib2.0-0",
"InstalledVersion": "2.66.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2012-0039",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glib2: hash table collisions CPU usage DoS",
"Description": "** DISPUTED ** GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the g_str_hash function is not a vulnerability in the library, because callers of g_hash_table_new and g_hash_table_new_full can specify an arbitrary hash function that is appropriate for the application.",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044",
"http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html",
"http://openwall.com/lists/oss-security/2012/01/10/12",
"https://access.redhat.com/security/cve/CVE-2012-0039",
"https://bugzilla.redhat.com/show_bug.cgi?id=772720"
],
"PublishedDate": "2012-01-14T17:55:00Z",
"LastModifiedDate": "2012-02-08T05:00:00Z"
},
{
"VulnerabilityID": "CVE-2012-0039",
"PkgName": "libglib2.0-bin",
"InstalledVersion": "2.66.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2012-0039",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glib2: hash table collisions CPU usage DoS",
"Description": "** DISPUTED ** GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the g_str_hash function is not a vulnerability in the library, because callers of g_hash_table_new and g_hash_table_new_full can specify an arbitrary hash function that is appropriate for the application.",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044",
"http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html",
"http://openwall.com/lists/oss-security/2012/01/10/12",
"https://access.redhat.com/security/cve/CVE-2012-0039",
"https://bugzilla.redhat.com/show_bug.cgi?id=772720"
],
"PublishedDate": "2012-01-14T17:55:00Z",
"LastModifiedDate": "2012-02-08T05:00:00Z"
},
{
"VulnerabilityID": "CVE-2012-0039",
"PkgName": "libglib2.0-data",
"InstalledVersion": "2.66.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2012-0039",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glib2: hash table collisions CPU usage DoS",
"Description": "** DISPUTED ** GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the g_str_hash function is not a vulnerability in the library, because callers of g_hash_table_new and g_hash_table_new_full can specify an arbitrary hash function that is appropriate for the application.",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044",
"http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html",
"http://openwall.com/lists/oss-security/2012/01/10/12",
"https://access.redhat.com/security/cve/CVE-2012-0039",
"https://bugzilla.redhat.com/show_bug.cgi?id=772720"
],
"PublishedDate": "2012-01-14T17:55:00Z",
"LastModifiedDate": "2012-02-08T05:00:00Z"
},
{
"VulnerabilityID": "CVE-2012-0039",
"PkgName": "libglib2.0-dev",
"InstalledVersion": "2.66.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2012-0039",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glib2: hash table collisions CPU usage DoS",
"Description": "** DISPUTED ** GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the g_str_hash function is not a vulnerability in the library, because callers of g_hash_table_new and g_hash_table_new_full can specify an arbitrary hash function that is appropriate for the application.",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044",
"http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html",
"http://openwall.com/lists/oss-security/2012/01/10/12",
"https://access.redhat.com/security/cve/CVE-2012-0039",
"https://bugzilla.redhat.com/show_bug.cgi?id=772720"
],
"PublishedDate": "2012-01-14T17:55:00Z",
"LastModifiedDate": "2012-02-08T05:00:00Z"
},
{
"VulnerabilityID": "CVE-2012-0039",
"PkgName": "libglib2.0-dev-bin",
"InstalledVersion": "2.66.8-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2012-0039",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "glib2: hash table collisions CPU usage DoS",
"Description": "** DISPUTED ** GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the g_str_hash function is not a vulnerability in the library, because callers of g_hash_table_new and g_hash_table_new_full can specify an arbitrary hash function that is appropriate for the application.",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044",
"http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html",
"http://openwall.com/lists/oss-security/2012/01/10/12",
"https://access.redhat.com/security/cve/CVE-2012-0039",
"https://bugzilla.redhat.com/show_bug.cgi?id=772720"
],
"PublishedDate": "2012-01-14T17:55:00Z",
"LastModifiedDate": "2012-02-08T05:00:00Z"
},
{
"VulnerabilityID": "CVE-2011-3389",
"PkgName": "libgnutls30",
"InstalledVersion": "3.7.1-5+deb11u2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3389",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"Description": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"Severity": "LOW",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V2Score": 4.3
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V2Score": 4.3
}
},
"References": [
"http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/",
"http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/",
"http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx",
"http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx",
"http://curl.haxx.se/docs/adv_20120124B.html",
"http://downloads.asterisk.org/pub/security/AST-2016-001.html",
"http://ekoparty.org/2011/juliano-rizzo.php",
"http://eprint.iacr.org/2004/111",
"http://eprint.iacr.org/2006/136",
"http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html",
"http://isc.sans.edu/diary/SSL+TLS+part+3+/11635",
"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html",
"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html",
"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html",
"http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html",
"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html",
"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html",
"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html",
"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html",
"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
"http://marc.info/?l=bugtraq&m=132750579901589&w=2",
"http://marc.info/?l=bugtraq&m=132872385320240&w=2",
"http://marc.info/?l=bugtraq&m=133365109612558&w=2",
"http://marc.info/?l=bugtraq&m=133728004526190&w=2",
"http://marc.info/?l=bugtraq&m=134254866602253&w=2",
"http://marc.info/?l=bugtraq&m=134254957702612&w=2",
"http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue",
"http://osvdb.org/74829",
"http://rhn.redhat.com/errata/RHSA-2012-0508.html",
"http://rhn.redhat.com/errata/RHSA-2013-1455.html",
"http://secunia.com/advisories/45791",
"http://secunia.com/advisories/47998",
"http://secunia.com/advisories/48256",
"http://secunia.com/advisories/48692",
"http://secunia.com/advisories/48915",
"http://secunia.com/advisories/48948",
"http://secunia.com/advisories/49198",
"http://secunia.com/advisories/55322",
"http://secunia.com/advisories/55350",
"http://secunia.com/advisories/55351",
"http://security.gentoo.org/glsa/glsa-201203-02.xml",
"http://security.gentoo.org/glsa/glsa-201406-32.xml",
"http://support.apple.com/kb/HT4999",
"http://support.apple.com/kb/HT5001",
"http://support.apple.com/kb/HT5130",
"http://support.apple.com/kb/HT5281",
"http://support.apple.com/kb/HT5501",
"http://support.apple.com/kb/HT6150",
"http://technet.microsoft.com/security/advisory/2588513",
"http://vnhacker.blogspot.com/2011/09/beast.html",
"http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf",
"http://www.debian.org/security/2012/dsa-2398",
"http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html",
"http://www.ibm.com/developerworks/java/jdk/alerts/",
"http://www.imperialviolet.org/2011/09/23/chromeandbeast.html",
"http://www.insecure.cl/Beast-SSL.rar",
"http://www.kb.cert.org/vuls/id/864643",
"http://www.mandriva.com/security/advisories?name=MDVSA-2012:058",
"http://www.opera.com/docs/changelogs/mac/1151/",
"http://www.opera.com/docs/changelogs/mac/1160/",
"http://www.opera.com/docs/changelogs/unix/1151/",
"http://www.opera.com/docs/changelogs/unix/1160/",
"http://www.opera.com/docs/changelogs/windows/1151/",
"http://www.opera.com/docs/changelogs/windows/1160/",
"http://www.opera.com/support/kb/view/1004/",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"http://www.redhat.com/support/errata/RHSA-2011-1384.html",
"http://www.redhat.com/support/errata/RHSA-2012-0006.html",
"http://www.securityfocus.com/bid/49388",
"http://www.securityfocus.com/bid/49778",
"http://www.securitytracker.com/id/1029190",
"http://www.securitytracker.com/id?1025997",
"http://www.securitytracker.com/id?1026103",
"http://www.securitytracker.com/id?1026704",
"http://www.ubuntu.com/usn/USN-1263-1",
"http://www.us-cert.gov/cas/techalerts/TA12-010A.html",
"https://access.redhat.com/security/cve/CVE-2011-3389",
"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail",
"https://bugzilla.novell.com/show_bug.cgi?id=719047",
"https://bugzilla.redhat.com/show_bug.cgi?id=737506",
"https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006",
"https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862",
"https://hermes.opensuse.org/messages/13154861",
"https://hermes.opensuse.org/messages/13155432",
"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02",
"https://linux.oracle.com/cve/CVE-2011-3389.html",
"https://linux.oracle.com/errata/ELSA-2011-1380.html",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752",
"https://ubuntu.com/security/notices/USN-1263-1"
],
"PublishedDate": "2011-09-06T19:55:00Z",
"LastModifiedDate": "2021-07-23T15:12:00Z"
},
{
"VulnerabilityID": "CVE-2004-0971",
"PkgName": "libgssapi-krb5-2",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2004-0971",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "security flaw",
"Description": "The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 2.1
}
},
"References": [
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304",
"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml",
"http://www.redhat.com/support/errata/RHSA-2005-012.html",
"http://www.securityfocus.com/bid/11289",
"http://www.trustix.org/errata/2004/0050",
"https://access.redhat.com/security/cve/CVE-2004-0971",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497"
],
"PublishedDate": "2005-02-09T05:00:00Z",
"LastModifiedDate": "2021-06-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-5709",
"PkgName": "libgssapi-krb5-2",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c",
"Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-5709",
"https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-01-16T09:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2004-0971",
"PkgName": "libgssrpc4",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2004-0971",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "security flaw",
"Description": "The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 2.1
}
},
"References": [
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304",
"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml",
"http://www.redhat.com/support/errata/RHSA-2005-012.html",
"http://www.securityfocus.com/bid/11289",
"http://www.trustix.org/errata/2004/0050",
"https://access.redhat.com/security/cve/CVE-2004-0971",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497"
],
"PublishedDate": "2005-02-09T05:00:00Z",
"LastModifiedDate": "2021-06-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-5709",
"PkgName": "libgssrpc4",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c",
"Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-5709",
"https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-01-16T09:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-33068",
"PkgName": "libharfbuzz0b",
"InstalledVersion": "2.7.4-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-33068",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc",
"Description": "An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 4.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-33068",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33068",
"https://github.com/harfbuzz/harfbuzz/commit/62e803b36173fd096d7ad460dd1d1db9be542593",
"https://github.com/harfbuzz/harfbuzz/issues/3557",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FQBJ24W6TXLSAQWCFW7IBGUMX4AJI3S4/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QQMEXOVDL3T2UXKBCON7JSOCE646G7HG/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W56WTC5IY4EIUHVUIHMCXA3BSBZLSZCI/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-33068",
"https://ubuntu.com/security/notices/USN-5524-1"
],
"PublishedDate": "2022-06-23T17:15:00Z",
"LastModifiedDate": "2022-07-30T05:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-23109",
"PkgName": "libheif1",
"InstalledVersion": "1.11.0-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-23109",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Buffer overflow vulnerability in function convert_colorspace in heif_c ...",
"Description": "Buffer overflow vulnerability in function convert_colorspace in heif_colorconversion.cc in libheif v1.6.2, allows attackers to cause a denial of service and disclose sensitive information, via a crafted HEIF file.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 8.1
}
},
"References": [
"https://github.com/strukturag/libheif/issues/207"
],
"PublishedDate": "2021-11-03T17:15:00Z",
"LastModifiedDate": "2021-11-05T16:52:00Z"
},
{
"VulnerabilityID": "CVE-2017-9937",
"PkgName": "libjbig-dev",
"InstalledVersion": "2.1-3.1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-9937",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: memory malloc failure in tif_jbig.c could cause DOS.",
"Description": "In LibTIFF 4.0.8, there is a memory malloc failure in tif_jbig.c. A crafted TIFF document can lead to an abort resulting in a remote denial of service attack.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2707",
"http://www.securityfocus.com/bid/99304",
"https://access.redhat.com/security/cve/CVE-2017-9937",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2017-06-26T12:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2017-9937",
"PkgName": "libjbig0",
"InstalledVersion": "2.1-3.1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-9937",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: memory malloc failure in tif_jbig.c could cause DOS.",
"Description": "In LibTIFF 4.0.8, there is a memory malloc failure in tif_jbig.c. A crafted TIFF document can lead to an abort resulting in a remote denial of service attack.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2707",
"http://www.securityfocus.com/bid/99304",
"https://access.redhat.com/security/cve/CVE-2017-9937",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2017-06-26T12:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-46822",
"PkgName": "libjpeg-dev",
"InstalledVersion": "1:2.0.6-4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46822",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c",
"Description": "The PPM reader in libjpeg-turbo through 2.0.90 mishandles use of tjLoadImage for loading a 16-bit binary PPM file into a grayscale buffer and loading a 16-bit binary PGM file into an RGB buffer. This is related to a heap-based buffer overflow in the get_word_rgb_row function in rdppm.c.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-46822",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46822",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/221567",
"https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2",
"https://nvd.nist.gov/vuln/detail/CVE-2021-46822",
"https://ubuntu.com/security/notices/USN-5631-1"
],
"PublishedDate": "2022-06-18T16:15:00Z",
"LastModifiedDate": "2022-08-15T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2021-46822",
"PkgName": "libjpeg62-turbo",
"InstalledVersion": "1:2.0.6-4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46822",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c",
"Description": "The PPM reader in libjpeg-turbo through 2.0.90 mishandles use of tjLoadImage for loading a 16-bit binary PPM file into a grayscale buffer and loading a 16-bit binary PGM file into an RGB buffer. This is related to a heap-based buffer overflow in the get_word_rgb_row function in rdppm.c.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-46822",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46822",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/221567",
"https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2",
"https://nvd.nist.gov/vuln/detail/CVE-2021-46822",
"https://ubuntu.com/security/notices/USN-5631-1"
],
"PublishedDate": "2022-06-18T16:15:00Z",
"LastModifiedDate": "2022-08-15T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2021-46822",
"PkgName": "libjpeg62-turbo-dev",
"InstalledVersion": "1:2.0.6-4",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46822",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c",
"Description": "The PPM reader in libjpeg-turbo through 2.0.90 mishandles use of tjLoadImage for loading a 16-bit binary PPM file into a grayscale buffer and loading a 16-bit binary PGM file into an RGB buffer. This is related to a heap-based buffer overflow in the get_word_rgb_row function in rdppm.c.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-46822",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46822",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/221567",
"https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2",
"https://nvd.nist.gov/vuln/detail/CVE-2021-46822",
"https://ubuntu.com/security/notices/USN-5631-1"
],
"PublishedDate": "2022-06-18T16:15:00Z",
"LastModifiedDate": "2022-08-15T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2004-0971",
"PkgName": "libk5crypto3",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2004-0971",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "security flaw",
"Description": "The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 2.1
}
},
"References": [
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304",
"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml",
"http://www.redhat.com/support/errata/RHSA-2005-012.html",
"http://www.securityfocus.com/bid/11289",
"http://www.trustix.org/errata/2004/0050",
"https://access.redhat.com/security/cve/CVE-2004-0971",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497"
],
"PublishedDate": "2005-02-09T05:00:00Z",
"LastModifiedDate": "2021-06-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-5709",
"PkgName": "libk5crypto3",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c",
"Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-5709",
"https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-01-16T09:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2004-0971",
"PkgName": "libkadm5clnt-mit12",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2004-0971",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "security flaw",
"Description": "The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 2.1
}
},
"References": [
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304",
"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml",
"http://www.redhat.com/support/errata/RHSA-2005-012.html",
"http://www.securityfocus.com/bid/11289",
"http://www.trustix.org/errata/2004/0050",
"https://access.redhat.com/security/cve/CVE-2004-0971",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497"
],
"PublishedDate": "2005-02-09T05:00:00Z",
"LastModifiedDate": "2021-06-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-5709",
"PkgName": "libkadm5clnt-mit12",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c",
"Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-5709",
"https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-01-16T09:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2004-0971",
"PkgName": "libkadm5srv-mit12",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2004-0971",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "security flaw",
"Description": "The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 2.1
}
},
"References": [
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304",
"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml",
"http://www.redhat.com/support/errata/RHSA-2005-012.html",
"http://www.securityfocus.com/bid/11289",
"http://www.trustix.org/errata/2004/0050",
"https://access.redhat.com/security/cve/CVE-2004-0971",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497"
],
"PublishedDate": "2005-02-09T05:00:00Z",
"LastModifiedDate": "2021-06-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-5709",
"PkgName": "libkadm5srv-mit12",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c",
"Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-5709",
"https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-01-16T09:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2004-0971",
"PkgName": "libkdb5-10",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2004-0971",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "security flaw",
"Description": "The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 2.1
}
},
"References": [
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304",
"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml",
"http://www.redhat.com/support/errata/RHSA-2005-012.html",
"http://www.securityfocus.com/bid/11289",
"http://www.trustix.org/errata/2004/0050",
"https://access.redhat.com/security/cve/CVE-2004-0971",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497"
],
"PublishedDate": "2005-02-09T05:00:00Z",
"LastModifiedDate": "2021-06-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-5709",
"PkgName": "libkdb5-10",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c",
"Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-5709",
"https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-01-16T09:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2004-0971",
"PkgName": "libkrb5-3",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2004-0971",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "security flaw",
"Description": "The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 2.1
}
},
"References": [
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304",
"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml",
"http://www.redhat.com/support/errata/RHSA-2005-012.html",
"http://www.securityfocus.com/bid/11289",
"http://www.trustix.org/errata/2004/0050",
"https://access.redhat.com/security/cve/CVE-2004-0971",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497"
],
"PublishedDate": "2005-02-09T05:00:00Z",
"LastModifiedDate": "2021-06-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-5709",
"PkgName": "libkrb5-3",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c",
"Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-5709",
"https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-01-16T09:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2004-0971",
"PkgName": "libkrb5-dev",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2004-0971",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "security flaw",
"Description": "The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 2.1
}
},
"References": [
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304",
"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml",
"http://www.redhat.com/support/errata/RHSA-2005-012.html",
"http://www.securityfocus.com/bid/11289",
"http://www.trustix.org/errata/2004/0050",
"https://access.redhat.com/security/cve/CVE-2004-0971",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497"
],
"PublishedDate": "2005-02-09T05:00:00Z",
"LastModifiedDate": "2021-06-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-5709",
"PkgName": "libkrb5-dev",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c",
"Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-5709",
"https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-01-16T09:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2004-0971",
"PkgName": "libkrb5support0",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2004-0971",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "security flaw",
"Description": "The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 2.1
}
},
"References": [
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304",
"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml",
"http://www.redhat.com/support/errata/RHSA-2005-012.html",
"http://www.securityfocus.com/bid/11289",
"http://www.trustix.org/errata/2004/0050",
"https://access.redhat.com/security/cve/CVE-2004-0971",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497"
],
"PublishedDate": "2005-02-09T05:00:00Z",
"LastModifiedDate": "2021-06-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-5709",
"PkgName": "libkrb5support0",
"InstalledVersion": "1.18.3-6+deb11u2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c",
"Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 6.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2018-5709",
"https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-01-16T09:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2015-3276",
"PkgName": "libldap-2.4-2",
"InstalledVersion": "2.4.57+dfsg-3+deb11u1",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2015-3276",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openldap: incorrect multi-keyword mode cipherstring parsing",
"Description": "The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"V2Score": 4.3
}
},
"References": [
"http://rhn.redhat.com/errata/RHSA-2015-2131.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"http://www.securitytracker.com/id/1034221",
"https://access.redhat.com/security/cve/CVE-2015-3276",
"https://bugzilla.redhat.com/show_bug.cgi?id=1238322",
"https://linux.oracle.com/cve/CVE-2015-3276.html",
"https://linux.oracle.com/errata/ELSA-2015-2131.html",
"https://nvd.nist.gov/vuln/detail/CVE-2015-3276"
],
"PublishedDate": "2015-12-07T20:59:00Z",
"LastModifiedDate": "2016-10-15T02:01:00Z"
},
{
"VulnerabilityID": "CVE-2017-14159",
"PkgName": "libldap-2.4-2",
"InstalledVersion": "2.4.57+dfsg-3+deb11u1",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-14159",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openldap: Privilege escalation via PID file manipulation",
"Description": "slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a \"kill `cat /pathname`\" command, as demonstrated by openldap-initscript.",
"Severity": "LOW",
"CweIDs": [
"CWE-665"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 1.9,
"V3Score": 4.7
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.4
}
},
"References": [
"http://www.openldap.org/its/index.cgi?findid=8703",
"https://access.redhat.com/security/cve/CVE-2017-14159",
"https://www.oracle.com/security-alerts/cpuapr2022.html"
],
"PublishedDate": "2017-09-05T18:29:00Z",
"LastModifiedDate": "2022-06-13T19:18:00Z"
},
{
"VulnerabilityID": "CVE-2017-17740",
"PkgName": "libldap-2.4-2",
"InstalledVersion": "2.4.57+dfsg-3+deb11u1",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-17740",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openldap: contrib/slapd-modules/nops/nops.c attempts to free stack buffer allowing remote attackers to cause a denial of service",
"Description": "contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html",
"http://www.openldap.org/its/index.cgi/Incoming?id=8759",
"https://access.redhat.com/security/cve/CVE-2017-17740",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
"https://www.oracle.com/security-alerts/cpuapr2022.html"
],
"PublishedDate": "2017-12-18T06:29:00Z",
"LastModifiedDate": "2022-06-13T19:10:00Z"
},
{
"VulnerabilityID": "CVE-2020-15719",
"PkgName": "libldap-2.4-2",
"InstalledVersion": "2.4.57+dfsg-3+deb11u1",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-15719",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openldap: Certificate validation incorrectly matches name against CN-ID",
"Description": "libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.",
"Severity": "LOW",
"CweIDs": [
"CWE-295"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"V2Score": 4,
"V3Score": 4.2
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"V3Score": 4.2
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html",
"https://access.redhat.com/errata/RHBA-2019:3674",
"https://access.redhat.com/security/cve/CVE-2020-15719",
"https://bugs.openldap.org/show_bug.cgi?id=9266",
"https://bugzilla.redhat.com/show_bug.cgi?id=1740070",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
"https://www.oracle.com/security-alerts/cpuapr2022.html"
],
"PublishedDate": "2020-07-14T14:15:00Z",
"LastModifiedDate": "2022-05-12T15:01:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "libmagickcore-6-arch-config",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "libmagickcore-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "libmagickcore-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "libmagickcore-6.q16-6-extra",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "libmagickcore-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "libmagickcore-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "libmagickwand-6-headers",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "libmagickwand-6.q16-6",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "libmagickwand-6.q16-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-20309",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20309",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20309",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20312",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20312",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c",
"Description": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20312",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-20313",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20313",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20313",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-12-03T19:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-1114",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c",
"Description": "A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1114",
"https://bugzilla.redhat.com/show_bug.cgi?id=2064538",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114"
],
"PublishedDate": "2022-04-29T16:15:00Z",
"LastModifiedDate": "2022-05-11T14:48:00Z"
},
{
"VulnerabilityID": "CVE-2022-28463",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-28463",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h",
"Description": "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-28463",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463",
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick/issues/4988",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680",
"https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html",
"https://ubuntu.com/security/notices/USN-5456-1"
],
"PublishedDate": "2022-05-08T23:15:00Z",
"LastModifiedDate": "2022-05-17T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-32545",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32545",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 (7.1.0-28)",
"https://github.com/ImageMagick/ImageMagick/issues/4962",
"https://github.com/ImageMagick/ImageMagick/pull/4963",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa (6.9.12-43)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T13:40:00Z"
},
{
"VulnerabilityID": "CVE-2022-32546",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c",
"Description": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32546",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
"https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 (7.1.0-29)",
"https://github.com/ImageMagick/ImageMagick/issues/4985",
"https://github.com/ImageMagick/ImageMagick/pull/4986",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
"https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T17:55:00Z"
},
{
"VulnerabilityID": "CVE-2022-32547",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32547",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: load of misaligned address at MagickCore/property.c",
"Description": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32547",
"https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
"https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 (7.1.0-30)",
"https://github.com/ImageMagick/ImageMagick/issues/5033",
"https://github.com/ImageMagick/ImageMagick/pull/5034",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
"https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)",
"https://ubuntu.com/security/notices/USN-5534-1"
],
"PublishedDate": "2022-06-16T18:15:00Z",
"LastModifiedDate": "2022-06-30T18:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-20241",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20241",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c",
"Description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20241",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241",
"https://github.com/ImageMagick/ImageMagick/pull/3177",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2021-03-25T18:40:00Z"
},
{
"VulnerabilityID": "CVE-2021-20243",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20243",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928958",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243",
"https://github.com/ImageMagick/ImageMagick/pull/3193",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
"https://ubuntu.com/security/notices/USN-5335-1"
],
"PublishedDate": "2021-03-09T18:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20244",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20244",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c",
"Description": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20244",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928959",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244",
"https://github.com/ImageMagick/ImageMagick/pull/3194",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-20245",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c",
"Description": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20245",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928943",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245",
"https://github.com/ImageMagick/ImageMagick/issues/3176",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2022-01-01T18:02:00Z"
},
{
"VulnerabilityID": "CVE-2021-20246",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c",
"Description": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20246",
"https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
"https://ubuntu.com/security/notices/USN-5158-1"
],
"PublishedDate": "2021-03-09T19:15:00Z",
"LastModifiedDate": "2021-03-25T18:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-4219",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4219",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file",
"Description": "A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4219",
"https://bugzilla.redhat.com/show_bug.cgi?id=2054611"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-03-30T15:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-1115",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h",
"Description": "A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1115",
"https://bugzilla.redhat.com/show_bug.cgi?id=2067022",
"https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09",
"https://github.com/ImageMagick/ImageMagick/issues/4974",
"https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-06T14:09:00Z"
},
{
"VulnerabilityID": "CVE-2022-3213",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: heap buffer overflow while processing a malformed TIFF file",
"Description": "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3213",
"https://bugzilla.redhat.com/show_bug.cgi?id=2126824",
"https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2",
"https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"
],
"PublishedDate": "2022-09-19T18:15:00Z",
"LastModifiedDate": "2022-09-21T18:52:00Z"
},
{
"VulnerabilityID": "CVE-2005-0406",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-0406",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "A design flaw in image processing software that modifies JPEG images m ...",
"Description": "A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html",
"http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
],
"PublishedDate": "2005-02-14T05:00:00Z",
"LastModifiedDate": "2008-09-10T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2008-3134",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3134",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "GraphicsMagick/ImageMagick: multiple crash or DoS issues",
"Description": "Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 1.9
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html",
"http://secunia.com/advisories/30879",
"http://secunia.com/advisories/32151",
"http://sourceforge.net/forum/forum.php?forum_id=841176",
"http://sourceforge.net/project/shownotes.php?release_id=610253",
"http://www.securityfocus.com/bid/30055",
"http://www.securitytracker.com/id?1020413",
"http://www.vupen.com/english/advisories/2008/1984/references",
"https://access.redhat.com/security/cve/CVE-2008-3134",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43511",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/43513"
],
"PublishedDate": "2008-07-10T23:41:00Z",
"LastModifiedDate": "2017-08-08T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8678",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8678",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Heap-buffer overflow in IsPixelMonochrome",
"Description": "The IsPixelMonochrome function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.0 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted file. NOTE: the vendor says \"This is a Q64 issue and we do not support Q64.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/16/2",
"http://www.openwall.com/lists/oss-security/2016/12/08/18",
"http://www.securityfocus.com/bid/93599",
"https://access.redhat.com/security/cve/CVE-2016-8678",
"https://bugzilla.redhat.com/show_bug.cgi?id=1385694",
"https://github.com/ImageMagick/ImageMagick/issues/272"
],
"PublishedDate": "2017-02-15T21:59:00Z",
"LastModifiedDate": "2017-02-22T19:12:00Z"
},
{
"VulnerabilityID": "CVE-2017-11754",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11754",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an OpenPixelCache call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11754",
"https://github.com/ImageMagick/ImageMagick/issues/633"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-11755",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call",
"Description": "The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file that is mishandled in an AcquireSemaphoreInfo call.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-11755",
"https://github.com/ImageMagick/ImageMagick/issues/634"
],
"PublishedDate": "2017-07-30T18:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-7275",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7275",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866)",
"Description": "The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/97166",
"https://access.redhat.com/security/cve/CVE-2017-7275",
"https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/",
"https://github.com/ImageMagick/ImageMagick/issues/271"
],
"PublishedDate": "2017-03-27T18:59:00Z",
"LastModifiedDate": "2017-03-30T01:59:00Z"
},
{
"VulnerabilityID": "CVE-2018-15607",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15607",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: CPU Exhaustion via crafted input file",
"Description": "In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"http://www.securityfocus.com/bid/105137",
"https://access.redhat.com/security/cve/CVE-2018-15607",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607",
"https://github.com/ImageMagick/ImageMagick/issues/1255",
"https://linux.oracle.com/cve/CVE-2018-15607.html",
"https://linux.oracle.com/errata/ELSA-2020-1180.html",
"https://ubuntu.com/security/notices/USN-4034-1",
"https://usn.ubuntu.com/4034-1/"
],
"PublishedDate": "2018-08-21T15:29:00Z",
"LastModifiedDate": "2019-06-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-20311",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20311",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c",
"Description": "A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-20311",
"https://bugzilla.redhat.com/show_bug.cgi?id=1946739"
],
"PublishedDate": "2021-05-11T23:15:00Z",
"LastModifiedDate": "2021-05-17T19:50:00Z"
},
{
"VulnerabilityID": "CVE-2021-3574",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3574",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: memory leaks with convert command",
"Description": "A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3574",
"https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9",
"https://github.com/ImageMagick/ImageMagick/issues/3540",
"https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-39212",
"PkgName": "libmagickwand-dev",
"InstalledVersion": "8:6.9.11.60+dfsg-1.3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39212",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ImageMagick: possible read or write in postscript files",
"Description": "ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39212",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212",
"https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68",
"https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e",
"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr"
],
"PublishedDate": "2021-09-13T18:15:00Z",
"LastModifiedDate": "2022-08-05T10:58:00Z"
},
{
"VulnerabilityID": "CVE-2021-46669",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46669",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used",
"Description": "MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2021-46669",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-25638",
"https://linux.oracle.com/cve/CVE-2021-46669.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
"https://mariadb.com/kb/en/security/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-46669",
"https://security.netapp.com/advisory/ntap-20220221-0002/"
],
"PublishedDate": "2022-02-01T02:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27376",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27376",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in Item_args::walk_arg",
"Description": "MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27376",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26354",
"https://linux.oracle.com/cve/CVE-2022-27376.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27376",
"https://security.netapp.com/advisory/ntap-20220519-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27377",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27377",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison when complex conversion is involved in blob",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27377",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26281",
"https://linux.oracle.com/cve/CVE-2022-27377.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27377",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27378",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27378",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in create_tmp_table::finalize",
"Description": "An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27378",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26423",
"https://linux.oracle.com/cve/CVE-2022-27378.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27378",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27379",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27379",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in component arg_comparator::compare_real_fixed",
"Description": "An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27379",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26353",
"https://linux.oracle.com/cve/CVE-2022-27379.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27379",
"https://security.netapp.com/advisory/ntap-20220526-0005/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27380",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27380",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at my_decimal::operator=",
"Description": "An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27380",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26280",
"https://linux.oracle.com/cve/CVE-2022-27380.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27380",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27381",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27381",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at Field::set_default via specially crafted SQL statements",
"Description": "An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27381",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26061",
"https://linux.oracle.com/cve/CVE-2022-27381.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27381",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27382",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27382",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order",
"Description": "MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27382",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26402",
"https://linux.oracle.com/cve/CVE-2022-27382.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27382",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-07-19T13:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-27383",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27383",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c",
"Description": "MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27383",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26323",
"https://linux.oracle.com/cve/CVE-2022-27383.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27383",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27384",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27384",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash via component Item_subselect::init_expr_cache_tracker",
"Description": "An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27384",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26047",
"https://linux.oracle.com/cve/CVE-2022-27384.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27384",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27385",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27385",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join",
"Description": "An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-27385",
"https://jira.mariadb.org/browse/MDEV-26415",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27385",
"https://security.netapp.com/advisory/ntap-20220526-0008/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-06-07T13:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-27386",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27386",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crashes in query_arena::set_query_arena upon SELECT from view",
"Description": "MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27386",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26406",
"https://linux.oracle.com/cve/CVE-2022-27386.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27386",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27387",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27387",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failures in decimal_bin_size",
"Description": "MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27387",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26422",
"https://linux.oracle.com/cve/CVE-2022-27387.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27387",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27444",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27444",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash when using HAVING with NOT EXIST predicate in an equality",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27444",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28080",
"https://linux.oracle.com/cve/CVE-2022-27444.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27444",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-07-19T13:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-27445",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27445",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in compare_order_elements",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27445",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28081",
"https://linux.oracle.com/cve/CVE-2022-27445.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27445",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27446",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27446",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash when using HAVING with IS NULL predicate in an equality",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27446",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28082",
"https://linux.oracle.com/cve/CVE-2022-27446.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27446",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-07-19T13:35:00Z"
},
{
"VulnerabilityID": "CVE-2022-27447",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27447",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in Binary_string::free_buffer",
"Description": "MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27447",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28099",
"https://linux.oracle.com/cve/CVE-2022-27447.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27447",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27448",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27448",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash in multi-update and implicit grouping",
"Description": "There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27448",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28095",
"https://linux.oracle.com/cve/CVE-2022-27448.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27448",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27449",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27449",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in sql/item_func.cc",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27449",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28089",
"https://linux.oracle.com/cve/CVE-2022-27449.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27449",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27451",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27451",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash via window function in expression in ORDER BY",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27451",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28094",
"https://linux.oracle.com/cve/CVE-2022-27451.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27451",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-27452",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27452",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in sql/item_cmpfunc.cc",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27452",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28090",
"https://linux.oracle.com/cve/CVE-2022-27452.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27452",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27455",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27455",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27455",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28097",
"https://linux.oracle.com/cve/CVE-2022-27455.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:56:00Z"
},
{
"VulnerabilityID": "CVE-2022-27456",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27456",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27456",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28093",
"https://linux.oracle.com/cve/CVE-2022-27456.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27456",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27457",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27457",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: incorrect key in \"dup value\" error after long unique",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27457",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28098",
"https://linux.oracle.com/cve/CVE-2022-27457.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27457",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:56:00Z"
},
{
"VulnerabilityID": "CVE-2022-27458",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in Binary_string::free_buffer",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Binary_string::free_buffer() at /sql/sql_string.h.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27458",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28099",
"https://linux.oracle.com/cve/CVE-2022-27458.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27458",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32081",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32081",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc",
"Description": "MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32081",
"https://jira.mariadb.org/browse/MDEV-26420",
"https://nvd.nist.gov/vuln/detail/CVE-2022-32081",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-26T19:51:00Z"
},
{
"VulnerabilityID": "CVE-2022-32082",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32082",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc",
"Description": "MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32082",
"https://jira.mariadb.org/browse/MDEV-26433",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32083",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32083",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at Item_subselect::init_expr_cache_tracker",
"Description": "MariaDB v10.2 to v10.6.1 was discovered to contain a segmentation fault via the component Item_subselect::init_expr_cache_tracker.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32083",
"https://jira.mariadb.org/browse/MDEV-26047",
"https://linux.oracle.com/cve/CVE-2022-32083.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220826-0006/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32084",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32084",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: segmentation fault via the component sub_select",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component sub_select.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32084",
"https://jira.mariadb.org/browse/MDEV-26427",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32085",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32085",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32085",
"https://jira.mariadb.org/browse/MDEV-26407",
"https://linux.oracle.com/cve/CVE-2022-32085.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32086",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32086",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT",
"Description": "MariaDB v10.4 to v10.8 was discovered to contain a segmentation fault via the component Item_field::fix_outer_field.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32086",
"https://jira.mariadb.org/browse/MDEV-26412",
"https://security.netapp.com/advisory/ntap-20220826-0007/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-26T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32087",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32087",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_args::walk_args",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_args::walk_args.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32087",
"https://jira.mariadb.org/browse/MDEV-26437",
"https://linux.oracle.com/cve/CVE-2022-32087.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32088",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32088",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32088",
"https://jira.mariadb.org/browse/MDEV-26419",
"https://linux.oracle.com/cve/CVE-2022-32088.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32089",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32089",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in st_select_lex_unit::exclude_level",
"Description": "MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32089",
"https://jira.mariadb.org/browse/MDEV-26410",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32091",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32091",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in JOIN_CACHE::free or in copy_fields",
"Description": "MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32091",
"https://jira.mariadb.org/browse/MDEV-26431",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-32091",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-38791",
"PkgName": "libmariadb-dev",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38791",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compr ...",
"Description": "In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock.",
"Severity": "MEDIUM",
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://jira.mariadb.org/browse/MDEV-28719",
"https://nvd.nist.gov/vuln/detail/CVE-2022-38791"
],
"PublishedDate": "2022-08-27T20:15:00Z",
"LastModifiedDate": "2022-09-01T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2021-46669",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46669",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used",
"Description": "MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2021-46669",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-25638",
"https://linux.oracle.com/cve/CVE-2021-46669.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
"https://mariadb.com/kb/en/security/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-46669",
"https://security.netapp.com/advisory/ntap-20220221-0002/"
],
"PublishedDate": "2022-02-01T02:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27376",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27376",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in Item_args::walk_arg",
"Description": "MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27376",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26354",
"https://linux.oracle.com/cve/CVE-2022-27376.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27376",
"https://security.netapp.com/advisory/ntap-20220519-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27377",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27377",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison when complex conversion is involved in blob",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27377",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26281",
"https://linux.oracle.com/cve/CVE-2022-27377.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27377",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27378",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27378",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in create_tmp_table::finalize",
"Description": "An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27378",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26423",
"https://linux.oracle.com/cve/CVE-2022-27378.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27378",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27379",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27379",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in component arg_comparator::compare_real_fixed",
"Description": "An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27379",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26353",
"https://linux.oracle.com/cve/CVE-2022-27379.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27379",
"https://security.netapp.com/advisory/ntap-20220526-0005/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27380",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27380",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at my_decimal::operator=",
"Description": "An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27380",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26280",
"https://linux.oracle.com/cve/CVE-2022-27380.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27380",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27381",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27381",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at Field::set_default via specially crafted SQL statements",
"Description": "An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27381",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26061",
"https://linux.oracle.com/cve/CVE-2022-27381.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27381",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27382",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27382",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order",
"Description": "MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27382",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26402",
"https://linux.oracle.com/cve/CVE-2022-27382.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27382",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-07-19T13:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-27383",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27383",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c",
"Description": "MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27383",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26323",
"https://linux.oracle.com/cve/CVE-2022-27383.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27383",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27384",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27384",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash via component Item_subselect::init_expr_cache_tracker",
"Description": "An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27384",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26047",
"https://linux.oracle.com/cve/CVE-2022-27384.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27384",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27385",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27385",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join",
"Description": "An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-27385",
"https://jira.mariadb.org/browse/MDEV-26415",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27385",
"https://security.netapp.com/advisory/ntap-20220526-0008/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-06-07T13:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-27386",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27386",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crashes in query_arena::set_query_arena upon SELECT from view",
"Description": "MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27386",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26406",
"https://linux.oracle.com/cve/CVE-2022-27386.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27386",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27387",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27387",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failures in decimal_bin_size",
"Description": "MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27387",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26422",
"https://linux.oracle.com/cve/CVE-2022-27387.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27387",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27444",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27444",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash when using HAVING with NOT EXIST predicate in an equality",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27444",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28080",
"https://linux.oracle.com/cve/CVE-2022-27444.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27444",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-07-19T13:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-27445",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27445",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in compare_order_elements",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27445",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28081",
"https://linux.oracle.com/cve/CVE-2022-27445.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27445",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27446",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27446",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash when using HAVING with IS NULL predicate in an equality",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27446",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28082",
"https://linux.oracle.com/cve/CVE-2022-27446.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27446",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-07-19T13:35:00Z"
},
{
"VulnerabilityID": "CVE-2022-27447",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27447",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in Binary_string::free_buffer",
"Description": "MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27447",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28099",
"https://linux.oracle.com/cve/CVE-2022-27447.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27447",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27448",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27448",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash in multi-update and implicit grouping",
"Description": "There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27448",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28095",
"https://linux.oracle.com/cve/CVE-2022-27448.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27448",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27449",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27449",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in sql/item_func.cc",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27449",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28089",
"https://linux.oracle.com/cve/CVE-2022-27449.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27449",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27451",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27451",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash via window function in expression in ORDER BY",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27451",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28094",
"https://linux.oracle.com/cve/CVE-2022-27451.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27451",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-27452",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27452",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in sql/item_cmpfunc.cc",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27452",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28090",
"https://linux.oracle.com/cve/CVE-2022-27452.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27452",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27455",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27455",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27455",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28097",
"https://linux.oracle.com/cve/CVE-2022-27455.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:56:00Z"
},
{
"VulnerabilityID": "CVE-2022-27456",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27456",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27456",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28093",
"https://linux.oracle.com/cve/CVE-2022-27456.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27456",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27457",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27457",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: incorrect key in \"dup value\" error after long unique",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27457",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28098",
"https://linux.oracle.com/cve/CVE-2022-27457.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27457",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:56:00Z"
},
{
"VulnerabilityID": "CVE-2022-27458",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in Binary_string::free_buffer",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Binary_string::free_buffer() at /sql/sql_string.h.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27458",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28099",
"https://linux.oracle.com/cve/CVE-2022-27458.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27458",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32081",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32081",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc",
"Description": "MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32081",
"https://jira.mariadb.org/browse/MDEV-26420",
"https://nvd.nist.gov/vuln/detail/CVE-2022-32081",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-26T19:51:00Z"
},
{
"VulnerabilityID": "CVE-2022-32082",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32082",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc",
"Description": "MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32082",
"https://jira.mariadb.org/browse/MDEV-26433",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32083",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32083",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at Item_subselect::init_expr_cache_tracker",
"Description": "MariaDB v10.2 to v10.6.1 was discovered to contain a segmentation fault via the component Item_subselect::init_expr_cache_tracker.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32083",
"https://jira.mariadb.org/browse/MDEV-26047",
"https://linux.oracle.com/cve/CVE-2022-32083.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220826-0006/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32084",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32084",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: segmentation fault via the component sub_select",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component sub_select.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32084",
"https://jira.mariadb.org/browse/MDEV-26427",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32085",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32085",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32085",
"https://jira.mariadb.org/browse/MDEV-26407",
"https://linux.oracle.com/cve/CVE-2022-32085.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32086",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32086",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT",
"Description": "MariaDB v10.4 to v10.8 was discovered to contain a segmentation fault via the component Item_field::fix_outer_field.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32086",
"https://jira.mariadb.org/browse/MDEV-26412",
"https://security.netapp.com/advisory/ntap-20220826-0007/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-26T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32087",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32087",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_args::walk_args",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_args::walk_args.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32087",
"https://jira.mariadb.org/browse/MDEV-26437",
"https://linux.oracle.com/cve/CVE-2022-32087.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32088",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32088",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32088",
"https://jira.mariadb.org/browse/MDEV-26419",
"https://linux.oracle.com/cve/CVE-2022-32088.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32089",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32089",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in st_select_lex_unit::exclude_level",
"Description": "MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32089",
"https://jira.mariadb.org/browse/MDEV-26410",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32091",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32091",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in JOIN_CACHE::free or in copy_fields",
"Description": "MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32091",
"https://jira.mariadb.org/browse/MDEV-26431",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-32091",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-38791",
"PkgName": "libmariadb-dev-compat",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38791",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compr ...",
"Description": "In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock.",
"Severity": "MEDIUM",
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://jira.mariadb.org/browse/MDEV-28719",
"https://nvd.nist.gov/vuln/detail/CVE-2022-38791"
],
"PublishedDate": "2022-08-27T20:15:00Z",
"LastModifiedDate": "2022-09-01T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2021-46669",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46669",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used",
"Description": "MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2021-46669",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-25638",
"https://linux.oracle.com/cve/CVE-2021-46669.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
"https://mariadb.com/kb/en/security/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-46669",
"https://security.netapp.com/advisory/ntap-20220221-0002/"
],
"PublishedDate": "2022-02-01T02:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27376",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27376",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in Item_args::walk_arg",
"Description": "MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27376",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26354",
"https://linux.oracle.com/cve/CVE-2022-27376.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27376",
"https://security.netapp.com/advisory/ntap-20220519-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27377",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27377",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison when complex conversion is involved in blob",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27377",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26281",
"https://linux.oracle.com/cve/CVE-2022-27377.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27377",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27378",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27378",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in create_tmp_table::finalize",
"Description": "An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27378",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26423",
"https://linux.oracle.com/cve/CVE-2022-27378.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27378",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27379",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27379",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in component arg_comparator::compare_real_fixed",
"Description": "An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27379",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26353",
"https://linux.oracle.com/cve/CVE-2022-27379.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27379",
"https://security.netapp.com/advisory/ntap-20220526-0005/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27380",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27380",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at my_decimal::operator=",
"Description": "An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27380",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26280",
"https://linux.oracle.com/cve/CVE-2022-27380.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27380",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27381",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27381",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at Field::set_default via specially crafted SQL statements",
"Description": "An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27381",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26061",
"https://linux.oracle.com/cve/CVE-2022-27381.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27381",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27382",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27382",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order",
"Description": "MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27382",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26402",
"https://linux.oracle.com/cve/CVE-2022-27382.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27382",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-07-19T13:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-27383",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27383",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c",
"Description": "MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27383",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26323",
"https://linux.oracle.com/cve/CVE-2022-27383.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27383",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27384",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27384",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash via component Item_subselect::init_expr_cache_tracker",
"Description": "An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27384",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26047",
"https://linux.oracle.com/cve/CVE-2022-27384.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27384",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27385",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27385",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join",
"Description": "An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-27385",
"https://jira.mariadb.org/browse/MDEV-26415",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27385",
"https://security.netapp.com/advisory/ntap-20220526-0008/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-06-07T13:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-27386",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27386",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crashes in query_arena::set_query_arena upon SELECT from view",
"Description": "MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27386",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26406",
"https://linux.oracle.com/cve/CVE-2022-27386.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27386",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27387",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27387",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failures in decimal_bin_size",
"Description": "MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27387",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26422",
"https://linux.oracle.com/cve/CVE-2022-27387.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27387",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27444",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27444",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash when using HAVING with NOT EXIST predicate in an equality",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27444",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28080",
"https://linux.oracle.com/cve/CVE-2022-27444.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27444",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-07-19T13:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-27445",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27445",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in compare_order_elements",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27445",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28081",
"https://linux.oracle.com/cve/CVE-2022-27445.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27445",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27446",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27446",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash when using HAVING with IS NULL predicate in an equality",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27446",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28082",
"https://linux.oracle.com/cve/CVE-2022-27446.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27446",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-07-19T13:35:00Z"
},
{
"VulnerabilityID": "CVE-2022-27447",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27447",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in Binary_string::free_buffer",
"Description": "MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27447",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28099",
"https://linux.oracle.com/cve/CVE-2022-27447.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27447",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27448",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27448",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash in multi-update and implicit grouping",
"Description": "There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27448",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28095",
"https://linux.oracle.com/cve/CVE-2022-27448.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27448",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27449",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27449",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in sql/item_func.cc",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27449",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28089",
"https://linux.oracle.com/cve/CVE-2022-27449.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27449",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27451",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27451",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash via window function in expression in ORDER BY",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27451",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28094",
"https://linux.oracle.com/cve/CVE-2022-27451.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27451",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-27452",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27452",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in sql/item_cmpfunc.cc",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27452",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28090",
"https://linux.oracle.com/cve/CVE-2022-27452.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27452",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27455",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27455",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27455",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28097",
"https://linux.oracle.com/cve/CVE-2022-27455.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:56:00Z"
},
{
"VulnerabilityID": "CVE-2022-27456",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27456",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27456",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28093",
"https://linux.oracle.com/cve/CVE-2022-27456.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27456",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27457",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27457",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: incorrect key in \"dup value\" error after long unique",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27457",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28098",
"https://linux.oracle.com/cve/CVE-2022-27457.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27457",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:56:00Z"
},
{
"VulnerabilityID": "CVE-2022-27458",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in Binary_string::free_buffer",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Binary_string::free_buffer() at /sql/sql_string.h.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27458",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28099",
"https://linux.oracle.com/cve/CVE-2022-27458.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27458",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32081",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32081",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc",
"Description": "MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32081",
"https://jira.mariadb.org/browse/MDEV-26420",
"https://nvd.nist.gov/vuln/detail/CVE-2022-32081",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-26T19:51:00Z"
},
{
"VulnerabilityID": "CVE-2022-32082",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32082",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc",
"Description": "MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32082",
"https://jira.mariadb.org/browse/MDEV-26433",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32083",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32083",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at Item_subselect::init_expr_cache_tracker",
"Description": "MariaDB v10.2 to v10.6.1 was discovered to contain a segmentation fault via the component Item_subselect::init_expr_cache_tracker.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32083",
"https://jira.mariadb.org/browse/MDEV-26047",
"https://linux.oracle.com/cve/CVE-2022-32083.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220826-0006/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32084",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32084",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: segmentation fault via the component sub_select",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component sub_select.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32084",
"https://jira.mariadb.org/browse/MDEV-26427",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32085",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32085",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32085",
"https://jira.mariadb.org/browse/MDEV-26407",
"https://linux.oracle.com/cve/CVE-2022-32085.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32086",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32086",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT",
"Description": "MariaDB v10.4 to v10.8 was discovered to contain a segmentation fault via the component Item_field::fix_outer_field.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32086",
"https://jira.mariadb.org/browse/MDEV-26412",
"https://security.netapp.com/advisory/ntap-20220826-0007/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-26T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32087",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32087",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_args::walk_args",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_args::walk_args.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32087",
"https://jira.mariadb.org/browse/MDEV-26437",
"https://linux.oracle.com/cve/CVE-2022-32087.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32088",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32088",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32088",
"https://jira.mariadb.org/browse/MDEV-26419",
"https://linux.oracle.com/cve/CVE-2022-32088.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32089",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32089",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in st_select_lex_unit::exclude_level",
"Description": "MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32089",
"https://jira.mariadb.org/browse/MDEV-26410",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32091",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32091",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in JOIN_CACHE::free or in copy_fields",
"Description": "MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32091",
"https://jira.mariadb.org/browse/MDEV-26431",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-32091",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-38791",
"PkgName": "libmariadb3",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38791",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compr ...",
"Description": "In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock.",
"Severity": "MEDIUM",
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://jira.mariadb.org/browse/MDEV-28719",
"https://nvd.nist.gov/vuln/detail/CVE-2022-38791"
],
"PublishedDate": "2022-08-27T20:15:00Z",
"LastModifiedDate": "2022-09-01T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2022-0563",
"PkgName": "libmount-dev",
"InstalledVersion": "2.36.1-8+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
"Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
"Severity": "LOW",
"CweIDs": [
"CWE-209"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0563",
"https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
"https://security.netapp.com/advisory/ntap-20220331-0002/"
],
"PublishedDate": "2022-02-21T19:15:00Z",
"LastModifiedDate": "2022-06-03T14:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-0563",
"PkgName": "libmount1",
"InstalledVersion": "2.36.1-8+deb11u1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
"Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
"Severity": "LOW",
"CweIDs": [
"CWE-209"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0563",
"https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
"https://security.netapp.com/advisory/ntap-20220331-0002/"
],
"PublishedDate": "2022-02-21T19:15:00Z",
"LastModifiedDate": "2022-06-03T14:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgName": "libncurses-dev",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-04-27T13:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgName": "libncurses-dev",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2021-11-30T22:42:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgName": "libncurses5-dev",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-04-27T13:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgName": "libncurses5-dev",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2021-11-30T22:42:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgName": "libncurses6",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-04-27T13:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgName": "libncurses6",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2021-11-30T22:42:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgName": "libncursesw5-dev",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-04-27T13:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgName": "libncursesw5-dev",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2021-11-30T22:42:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgName": "libncursesw6",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:a42821cd14fb31c4aa253203e7f8e34fc3b15d69ce370f1223fbbe4252a64202",
"DiffID": "sha256:a24f9e96a54c5be9dbb04a4438aa9462f29387c9735c560a80f4df6ae2e7d7f0"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-04-27T13:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgName": "libncursesw6",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:a42821cd14fb31c4aa253203e7f8e34fc3b15d69ce370f1223fbbe4252a64202",
"DiffID": "sha256:a24f9e96a54c5be9dbb04a4438aa9462f29387c9735c560a80f4df6ae2e7d7f0"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2021-11-30T22:42:00Z"
},
{
"VulnerabilityID": "CVE-2021-23215",
"PkgName": "libopenexr-dev",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-23215",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers",
"Description": "An integer overflow leading to a heap-buffer overflow was found in the DwaCompressor of OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-23215",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947586",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215",
"https://github.com/AcademySoftwareFoundation/openexr/pull/901",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-23215",
"https://ubuntu.com/security/notices/USN-4996-1",
"https://ubuntu.com/security/notices/USN-4996-2"
],
"PublishedDate": "2021-06-08T12:15:00Z",
"LastModifiedDate": "2021-12-01T18:26:00Z"
},
{
"VulnerabilityID": "CVE-2021-26260",
"PkgName": "libopenexr-dev",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-26260",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers",
"Description": "An integer overflow leading to a heap-buffer overflow was found in the DwaCompressor of OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR. This is a different flaw from CVE-2021-23215.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-26260",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947582",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260",
"https://github.com/AcademySoftwareFoundation/openexr/pull/894",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-26260",
"https://ubuntu.com/security/notices/USN-4996-1",
"https://ubuntu.com/security/notices/USN-4996-2"
],
"PublishedDate": "2021-06-08T12:15:00Z",
"LastModifiedDate": "2021-12-01T18:26:00Z"
},
{
"VulnerabilityID": "CVE-2021-3598",
"PkgName": "libopenexr-dev",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3598",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Heap buffer overflow in Imf_3_1::CharPtrIO::readChars",
"Description": "There's a flaw in OpenEXR's ImfDeepScanLineInputFile functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-119",
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3598",
"https://bugzilla.redhat.com/show_bug.cgi?id=1970987",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598",
"https://github.com/AcademySoftwareFoundation/openexr/pull/1037",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3598",
"https://ubuntu.com/security/notices/USN-4996-1",
"https://ubuntu.com/security/notices/USN-4996-2"
],
"PublishedDate": "2021-07-06T15:15:00Z",
"LastModifiedDate": "2021-07-09T15:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-3605",
"PkgName": "libopenexr-dev",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3605",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Heap buffer overflow in the rleUncompress function",
"Description": "There's a flaw in OpenEXR's rleUncompress functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3605",
"https://bugzilla.redhat.com/show_bug.cgi?id=1970991",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605",
"https://github.com/AcademySoftwareFoundation/openexr/pull/1036",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3605",
"https://ubuntu.com/security/notices/USN-4996-1",
"https://ubuntu.com/security/notices/USN-4996-2"
],
"PublishedDate": "2021-08-25T19:15:00Z",
"LastModifiedDate": "2021-09-01T02:04:00Z"
},
{
"VulnerabilityID": "CVE-2021-3933",
"PkgName": "libopenexr-dev",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3933",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openexr: Integer-overflow in Imf_3_1::bytesPerDeepLineTable",
"Description": "An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t < 64 bits. This could cause an invalid bytesPerLine and maxBytesPerLine value, which could lead to problems with application stability or lead to other attack paths.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3933",
"https://bugzilla.redhat.com/show_bug.cgi?id=2019783",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3933",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3933",
"https://ubuntu.com/security/notices/USN-5144-1"
],
"PublishedDate": "2022-03-25T19:15:00Z",
"LastModifiedDate": "2022-04-05T12:55:00Z"
},
{
"VulnerabilityID": "CVE-2021-3941",
"PkgName": "libopenexr-dev",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3941",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openexr: Divide-by-zero in Imf_3_1::RGBtoXYZ",
"Description": "In ImfChromaticities.cpp routine RGBtoXYZ(), there are some division operations such as `float Z = (1 - chroma.white.x - chroma.white.y) * Y / chroma.white.y;` and `chroma.green.y * (X + Z))) / d;` but the divisor is not checked for a 0 value. A specially crafted file could trigger a divide-by-zero condition which could affect the availability of programs linked with OpenEXR.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3941",
"https://bugzilla.redhat.com/show_bug.cgi?id=2019789",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941",
"https://github.com/AcademySoftwareFoundation/openexr/pull/1153",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3941",
"https://ubuntu.com/security/notices/USN-5150-1"
],
"PublishedDate": "2022-03-25T19:15:00Z",
"LastModifiedDate": "2022-04-04T16:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-45942",
"PkgName": "libopenexr-dev",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45942",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute",
"Description": "OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-45942",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942",
"https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022",
"https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e",
"https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0",
"https://github.com/AcademySoftwareFoundation/openexr/pull/1209",
"https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TEZDE2S2DB4BF4LZSSV4W3DNW7DSRHJ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJ5PW4WNXBKCRFGDZGAQOSVH2BKZKL4X/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJUK7WIQV5EKWTCZBRXFN6INHG6MLS5O/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-45942"
],
"PublishedDate": "2022-01-01T01:15:00Z",
"LastModifiedDate": "2022-04-26T15:35:00Z"
},
{
"VulnerabilityID": "CVE-2017-14988",
"PkgName": "libopenexr-dev",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-14988",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Excessive memory allocation in Header::readfrom",
"Description": "** DISPUTED ** Header::readfrom in IlmImf/ImfHeader.cpp in OpenEXR 2.2.0 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file that is accessed with the ImfOpenInputFile function in IlmImf/ImfCRgbaFile.cpp. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html",
"https://access.redhat.com/security/cve/CVE-2017-14988",
"https://github.com/openexr/openexr/issues/248"
],
"PublishedDate": "2017-10-03T01:29:00Z",
"LastModifiedDate": "2019-09-23T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-26945",
"PkgName": "libopenexr-dev",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-26945",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Integer-overflow in bool Imf_2_5::readDeepTile",
"Description": "An integer overflow leading to a heap-buffer overflow was found in OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR.",
"Severity": "LOW",
"CweIDs": [
"CWE-191",
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-26945",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947591",
"https://nvd.nist.gov/vuln/detail/CVE-2021-26945"
],
"PublishedDate": "2021-06-08T12:15:00Z",
"LastModifiedDate": "2021-06-11T18:41:00Z"
},
{
"VulnerabilityID": "CVE-2021-23215",
"PkgName": "libopenexr25",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-23215",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers",
"Description": "An integer overflow leading to a heap-buffer overflow was found in the DwaCompressor of OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-23215",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947586",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215",
"https://github.com/AcademySoftwareFoundation/openexr/pull/901",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-23215",
"https://ubuntu.com/security/notices/USN-4996-1",
"https://ubuntu.com/security/notices/USN-4996-2"
],
"PublishedDate": "2021-06-08T12:15:00Z",
"LastModifiedDate": "2021-12-01T18:26:00Z"
},
{
"VulnerabilityID": "CVE-2021-26260",
"PkgName": "libopenexr25",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-26260",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers",
"Description": "An integer overflow leading to a heap-buffer overflow was found in the DwaCompressor of OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR. This is a different flaw from CVE-2021-23215.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-26260",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947582",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260",
"https://github.com/AcademySoftwareFoundation/openexr/pull/894",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-26260",
"https://ubuntu.com/security/notices/USN-4996-1",
"https://ubuntu.com/security/notices/USN-4996-2"
],
"PublishedDate": "2021-06-08T12:15:00Z",
"LastModifiedDate": "2021-12-01T18:26:00Z"
},
{
"VulnerabilityID": "CVE-2021-3598",
"PkgName": "libopenexr25",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3598",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Heap buffer overflow in Imf_3_1::CharPtrIO::readChars",
"Description": "There's a flaw in OpenEXR's ImfDeepScanLineInputFile functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-119",
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3598",
"https://bugzilla.redhat.com/show_bug.cgi?id=1970987",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598",
"https://github.com/AcademySoftwareFoundation/openexr/pull/1037",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3598",
"https://ubuntu.com/security/notices/USN-4996-1",
"https://ubuntu.com/security/notices/USN-4996-2"
],
"PublishedDate": "2021-07-06T15:15:00Z",
"LastModifiedDate": "2021-07-09T15:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-3605",
"PkgName": "libopenexr25",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3605",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Heap buffer overflow in the rleUncompress function",
"Description": "There's a flaw in OpenEXR's rleUncompress functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3605",
"https://bugzilla.redhat.com/show_bug.cgi?id=1970991",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605",
"https://github.com/AcademySoftwareFoundation/openexr/pull/1036",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3605",
"https://ubuntu.com/security/notices/USN-4996-1",
"https://ubuntu.com/security/notices/USN-4996-2"
],
"PublishedDate": "2021-08-25T19:15:00Z",
"LastModifiedDate": "2021-09-01T02:04:00Z"
},
{
"VulnerabilityID": "CVE-2021-3933",
"PkgName": "libopenexr25",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3933",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openexr: Integer-overflow in Imf_3_1::bytesPerDeepLineTable",
"Description": "An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t < 64 bits. This could cause an invalid bytesPerLine and maxBytesPerLine value, which could lead to problems with application stability or lead to other attack paths.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3933",
"https://bugzilla.redhat.com/show_bug.cgi?id=2019783",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3933",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3933",
"https://ubuntu.com/security/notices/USN-5144-1"
],
"PublishedDate": "2022-03-25T19:15:00Z",
"LastModifiedDate": "2022-04-05T12:55:00Z"
},
{
"VulnerabilityID": "CVE-2021-3941",
"PkgName": "libopenexr25",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3941",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openexr: Divide-by-zero in Imf_3_1::RGBtoXYZ",
"Description": "In ImfChromaticities.cpp routine RGBtoXYZ(), there are some division operations such as `float Z = (1 - chroma.white.x - chroma.white.y) * Y / chroma.white.y;` and `chroma.green.y * (X + Z))) / d;` but the divisor is not checked for a 0 value. A specially crafted file could trigger a divide-by-zero condition which could affect the availability of programs linked with OpenEXR.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3941",
"https://bugzilla.redhat.com/show_bug.cgi?id=2019789",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941",
"https://github.com/AcademySoftwareFoundation/openexr/pull/1153",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3941",
"https://ubuntu.com/security/notices/USN-5150-1"
],
"PublishedDate": "2022-03-25T19:15:00Z",
"LastModifiedDate": "2022-04-04T16:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-45942",
"PkgName": "libopenexr25",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45942",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute",
"Description": "OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-45942",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942",
"https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022",
"https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e",
"https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0",
"https://github.com/AcademySoftwareFoundation/openexr/pull/1209",
"https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TEZDE2S2DB4BF4LZSSV4W3DNW7DSRHJ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJ5PW4WNXBKCRFGDZGAQOSVH2BKZKL4X/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJUK7WIQV5EKWTCZBRXFN6INHG6MLS5O/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-45942"
],
"PublishedDate": "2022-01-01T01:15:00Z",
"LastModifiedDate": "2022-04-26T15:35:00Z"
},
{
"VulnerabilityID": "CVE-2017-14988",
"PkgName": "libopenexr25",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-14988",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Excessive memory allocation in Header::readfrom",
"Description": "** DISPUTED ** Header::readfrom in IlmImf/ImfHeader.cpp in OpenEXR 2.2.0 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file that is accessed with the ImfOpenInputFile function in IlmImf/ImfCRgbaFile.cpp. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html",
"https://access.redhat.com/security/cve/CVE-2017-14988",
"https://github.com/openexr/openexr/issues/248"
],
"PublishedDate": "2017-10-03T01:29:00Z",
"LastModifiedDate": "2019-09-23T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-26945",
"PkgName": "libopenexr25",
"InstalledVersion": "2.5.4-2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-26945",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenEXR: Integer-overflow in bool Imf_2_5::readDeepTile",
"Description": "An integer overflow leading to a heap-buffer overflow was found in OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR.",
"Severity": "LOW",
"CweIDs": [
"CWE-191",
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-26945",
"https://bugzilla.redhat.com/show_bug.cgi?id=1947591",
"https://nvd.nist.gov/vuln/detail/CVE-2021-26945"
],
"PublishedDate": "2021-06-08T12:15:00Z",
"LastModifiedDate": "2021-06-11T18:41:00Z"
},
{
"VulnerabilityID": "CVE-2021-3575",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3575",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution",
"Description": "A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.",
"Severity": "HIGH",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json",
"https://access.redhat.com/security/cve/CVE-2021-3575",
"https://bugzilla.redhat.com/show_bug.cgi?id=1957616",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575",
"https://github.com/uclouvain/openjpeg/issues/1347",
"https://linux.oracle.com/cve/CVE-2021-3575.html",
"https://linux.oracle.com/errata/ELSA-2021-4251.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3575",
"https://ubuntu.com/security/CVE-2021-3575"
],
"PublishedDate": "2022-03-04T18:15:00Z",
"LastModifiedDate": "2022-07-21T12:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-29338",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-29338",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c",
"Description": "Integer Overflow in OpenJPEG v2.4.0 allows remote attackers to crash the application, causing a Denial of Service (DoS). This occurs when the attacker uses the command line option \"-ImgDir\" on a directory that contains 1048576 files.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"V3Score": 6.2
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json",
"https://access.redhat.com/security/cve/CVE-2021-29338",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338",
"https://github.com/uclouvain/openjpeg/issues/1338",
"https://github.com/uclouvain/openjpeg/pull/1346",
"https://github.com/uclouvain/openjpeg/pull/1395",
"https://github.com/uclouvain/openjpeg/pull/1396",
"https://github.com/uclouvain/openjpeg/pull/1397",
"https://github.com/uclouvain/openjpeg/pull/1398",
"https://linux.oracle.com/cve/CVE-2021-29338.html",
"https://linux.oracle.com/errata/ELSA-2021-4251.html",
"https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-29338",
"https://security.gentoo.org/glsa/202209-04"
],
"PublishedDate": "2021-04-14T14:15:00Z",
"LastModifiedDate": "2022-09-07T05:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-1122",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1122",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer",
"Description": "A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-824",
"CWE-665"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1122",
"https://github.com/uclouvain/openjpeg/issues/1368",
"https://github.com/uclouvain/openjpeg/pull/1369",
"https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIWSQFQWXDU4MT3XTVAO6HC7TVL3NHS7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RMKBAMK2CAM5TMC5TODKVCE5AAPTD5YV/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1122",
"https://security.gentoo.org/glsa/202209-04"
],
"PublishedDate": "2022-03-29T18:15:00Z",
"LastModifiedDate": "2022-09-07T05:15:00Z"
},
{
"VulnerabilityID": "CVE-2016-10505",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-10505",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: NULL pointer dereference in imagetopnm function in convert.c",
"Description": "NULL pointer dereference vulnerabilities in the imagetopnm function in convert.c, sycc444_to_rgb function in color.c, color_esycc_to_rgb function in color.c, and sycc422_to_rgb function in color.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2016-10505",
"https://github.com/uclouvain/openjpeg/issues/776",
"https://github.com/uclouvain/openjpeg/issues/784",
"https://github.com/uclouvain/openjpeg/issues/785",
"https://github.com/uclouvain/openjpeg/issues/792",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2017-08-30T09:29:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-10506",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-10506",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: Division by zero in functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c",
"Description": "Division-by-zero vulnerabilities in the functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/100573",
"https://access.redhat.com/security/cve/CVE-2016-10506",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10506",
"https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b",
"https://github.com/uclouvain/openjpeg/issues/731",
"https://github.com/uclouvain/openjpeg/issues/732",
"https://github.com/uclouvain/openjpeg/issues/777",
"https://github.com/uclouvain/openjpeg/issues/778",
"https://github.com/uclouvain/openjpeg/issues/779",
"https://github.com/uclouvain/openjpeg/issues/780",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2017-08-30T09:29:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9113",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9113",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security issues",
"Description": "There is a NULL pointer dereference in function imagetobmp of convertbmp.c:980 of OpenJPEG 2.1.2. image->comps[0].data is not assigned a value after initialization(NULL). Impact is Denial of Service.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.6
}
},
"References": [
"http://www.securityfocus.com/bid/93980",
"https://access.redhat.com/security/cve/CVE-2016-9113",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9113",
"https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC",
"https://github.com/uclouvain/openjpeg/issues/856",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2016-10-30T22:59:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9114",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security issues",
"Description": "There is a NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) of OpenJPEG 2.1.2. image->comps[compno].data is not assigned a value after initialization(NULL). Impact is Denial of Service.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.6
}
},
"References": [
"http://www.securityfocus.com/bid/93979",
"https://access.redhat.com/security/cve/CVE-2016-9114",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9114",
"https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC",
"https://github.com/uclouvain/openjpeg/issues/857",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2016-10-30T22:59:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9115",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security issues",
"Description": "Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.6
}
},
"References": [
"http://www.securityfocus.com/bid/93977",
"https://access.redhat.com/security/cve/CVE-2016-9115",
"https://bugs.gentoo.org/628418",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9115",
"https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC",
"https://github.com/uclouvain/openjpeg/issues/858",
"https://security.gentoo.org/glsa/201710-26",
"https://vuldb.com/?id.93190"
],
"PublishedDate": "2016-10-30T22:59:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9116",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9116",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security issues",
"Description": "NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.6
}
},
"References": [
"http://www.securityfocus.com/bid/93975",
"https://access.redhat.com/security/cve/CVE-2016-9116",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9116",
"https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC",
"https://github.com/uclouvain/openjpeg/issues/859",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2016-10-30T22:59:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9117",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9117",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security issues",
"Description": "NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.6
}
},
"References": [
"http://www.securityfocus.com/bid/93783",
"https://access.redhat.com/security/cve/CVE-2016-9117",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9117",
"https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC",
"https://github.com/uclouvain/openjpeg/issues/860",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2016-10-30T22:59:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9580",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9580",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg2: Integer overflow in tiftoimage causes heap buffer overflow",
"Description": "An integer overflow vulnerability was found in tiftoimage function in openjpeg 2.1.2, resulting in heap buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/12/09/4",
"http://www.securityfocus.com/bid/94822",
"https://access.redhat.com/security/cve/CVE-2016-9580",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9580",
"https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255",
"https://github.com/uclouvain/openjpeg/issues/871",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2018-08-01T16:29:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9581",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9581",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg2: Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1",
"Description": "An infinite loop vulnerability in tiftoimage that results in heap buffer overflow in convert_32s_C1P1 was found in openjpeg 2.1.2.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/12/09/4",
"http://www.securityfocus.com/bid/94822",
"https://access.redhat.com/security/cve/CVE-2016-9581",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9581",
"https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255",
"https://github.com/uclouvain/openjpeg/issues/872",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2018-08-01T14:29:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2017-17479",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-17479",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: Stack-buffer overflow in the pgxtoimage function",
"Description": "In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-17479",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479",
"https://github.com/uclouvain/openjpeg/issues/1044"
],
"PublishedDate": "2017-12-08T19:29:00Z",
"LastModifiedDate": "2018-11-29T14:51:00Z"
},
{
"VulnerabilityID": "CVE-2018-16375",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-16375",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c",
"Description": "An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7
}
},
"References": [
"http://www.securityfocus.com/bid/105266",
"https://access.redhat.com/security/cve/CVE-2018-16375",
"https://github.com/uclouvain/openjpeg/issues/1126"
],
"PublishedDate": "2018-09-03T00:29:00Z",
"LastModifiedDate": "2021-01-26T12:50:00Z"
},
{
"VulnerabilityID": "CVE-2018-16376",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-16376",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c",
"Description": "An issue was discovered in OpenJPEG 2.3.0. A heap-based buffer overflow was discovered in the function t2_encode_packet in lib/openmj2/t2.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"V3Score": 5.8
}
},
"References": [
"http://www.securityfocus.com/bid/105262",
"https://access.redhat.com/security/cve/CVE-2018-16376",
"https://github.com/uclouvain/openjpeg/issues/1127"
],
"PublishedDate": "2018-09-03T00:29:00Z",
"LastModifiedDate": "2018-10-31T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2018-20846",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20846",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c leads to denial of service",
"Description": "Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).",
"Severity": "LOW",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"V3Score": 6.5
}
},
"References": [
"http://www.securityfocus.com/bid/108921",
"https://access.redhat.com/security/cve/CVE-2018-20846",
"https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc"
],
"PublishedDate": "2019-06-26T18:15:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2019-6988",
"PkgName": "libopenjp2-7",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6988",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: DoS via memory exhaustion in opj_decompress",
"Description": "An issue was discovered in OpenJPEG 2.3.0. It allows remote attackers to cause a denial of service (attempted excessive memory allocation) in opj_calloc in openjp2/opj_malloc.c, when called from opj_tcd_init_tile in openjp2/tcd.c, as demonstrated by the 64-bit opj_decompress.",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.5
}
},
"References": [
"http://www.securityfocus.com/bid/106785",
"https://access.redhat.com/security/cve/CVE-2019-6988",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988",
"https://github.com/uclouvain/openjpeg/issues/1178"
],
"PublishedDate": "2019-01-28T16:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2021-3575",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3575",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution",
"Description": "A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.",
"Severity": "HIGH",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json",
"https://access.redhat.com/security/cve/CVE-2021-3575",
"https://bugzilla.redhat.com/show_bug.cgi?id=1957616",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575",
"https://github.com/uclouvain/openjpeg/issues/1347",
"https://linux.oracle.com/cve/CVE-2021-3575.html",
"https://linux.oracle.com/errata/ELSA-2021-4251.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3575",
"https://ubuntu.com/security/CVE-2021-3575"
],
"PublishedDate": "2022-03-04T18:15:00Z",
"LastModifiedDate": "2022-07-21T12:32:00Z"
},
{
"VulnerabilityID": "CVE-2021-29338",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-29338",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c",
"Description": "Integer Overflow in OpenJPEG v2.4.0 allows remote attackers to crash the application, causing a Denial of Service (DoS). This occurs when the attacker uses the command line option \"-ImgDir\" on a directory that contains 1048576 files.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"V3Score": 6.2
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json",
"https://access.redhat.com/security/cve/CVE-2021-29338",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338",
"https://github.com/uclouvain/openjpeg/issues/1338",
"https://github.com/uclouvain/openjpeg/pull/1346",
"https://github.com/uclouvain/openjpeg/pull/1395",
"https://github.com/uclouvain/openjpeg/pull/1396",
"https://github.com/uclouvain/openjpeg/pull/1397",
"https://github.com/uclouvain/openjpeg/pull/1398",
"https://linux.oracle.com/cve/CVE-2021-29338.html",
"https://linux.oracle.com/errata/ELSA-2021-4251.html",
"https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-29338",
"https://security.gentoo.org/glsa/202209-04"
],
"PublishedDate": "2021-04-14T14:15:00Z",
"LastModifiedDate": "2022-09-07T05:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-1122",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1122",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer",
"Description": "A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-824",
"CWE-665"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1122",
"https://github.com/uclouvain/openjpeg/issues/1368",
"https://github.com/uclouvain/openjpeg/pull/1369",
"https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIWSQFQWXDU4MT3XTVAO6HC7TVL3NHS7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RMKBAMK2CAM5TMC5TODKVCE5AAPTD5YV/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1122",
"https://security.gentoo.org/glsa/202209-04"
],
"PublishedDate": "2022-03-29T18:15:00Z",
"LastModifiedDate": "2022-09-07T05:15:00Z"
},
{
"VulnerabilityID": "CVE-2016-10505",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-10505",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: NULL pointer dereference in imagetopnm function in convert.c",
"Description": "NULL pointer dereference vulnerabilities in the imagetopnm function in convert.c, sycc444_to_rgb function in color.c, color_esycc_to_rgb function in color.c, and sycc422_to_rgb function in color.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2016-10505",
"https://github.com/uclouvain/openjpeg/issues/776",
"https://github.com/uclouvain/openjpeg/issues/784",
"https://github.com/uclouvain/openjpeg/issues/785",
"https://github.com/uclouvain/openjpeg/issues/792",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2017-08-30T09:29:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-10506",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-10506",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: Division by zero in functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c",
"Description": "Division-by-zero vulnerabilities in the functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/100573",
"https://access.redhat.com/security/cve/CVE-2016-10506",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10506",
"https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b",
"https://github.com/uclouvain/openjpeg/issues/731",
"https://github.com/uclouvain/openjpeg/issues/732",
"https://github.com/uclouvain/openjpeg/issues/777",
"https://github.com/uclouvain/openjpeg/issues/778",
"https://github.com/uclouvain/openjpeg/issues/779",
"https://github.com/uclouvain/openjpeg/issues/780",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2017-08-30T09:29:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9113",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9113",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security issues",
"Description": "There is a NULL pointer dereference in function imagetobmp of convertbmp.c:980 of OpenJPEG 2.1.2. image->comps[0].data is not assigned a value after initialization(NULL). Impact is Denial of Service.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.6
}
},
"References": [
"http://www.securityfocus.com/bid/93980",
"https://access.redhat.com/security/cve/CVE-2016-9113",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9113",
"https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC",
"https://github.com/uclouvain/openjpeg/issues/856",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2016-10-30T22:59:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9114",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9114",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security issues",
"Description": "There is a NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) of OpenJPEG 2.1.2. image->comps[compno].data is not assigned a value after initialization(NULL). Impact is Denial of Service.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.6
}
},
"References": [
"http://www.securityfocus.com/bid/93979",
"https://access.redhat.com/security/cve/CVE-2016-9114",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9114",
"https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC",
"https://github.com/uclouvain/openjpeg/issues/857",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2016-10-30T22:59:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9115",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9115",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security issues",
"Description": "Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.6
}
},
"References": [
"http://www.securityfocus.com/bid/93977",
"https://access.redhat.com/security/cve/CVE-2016-9115",
"https://bugs.gentoo.org/628418",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9115",
"https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC",
"https://github.com/uclouvain/openjpeg/issues/858",
"https://security.gentoo.org/glsa/201710-26",
"https://vuldb.com/?id.93190"
],
"PublishedDate": "2016-10-30T22:59:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9116",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9116",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security issues",
"Description": "NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.6
}
},
"References": [
"http://www.securityfocus.com/bid/93975",
"https://access.redhat.com/security/cve/CVE-2016-9116",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9116",
"https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC",
"https://github.com/uclouvain/openjpeg/issues/859",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2016-10-30T22:59:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9117",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9117",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security issues",
"Description": "NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"V3Score": 5.6
}
},
"References": [
"http://www.securityfocus.com/bid/93783",
"https://access.redhat.com/security/cve/CVE-2016-9117",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9117",
"https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC",
"https://github.com/uclouvain/openjpeg/issues/860",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2016-10-30T22:59:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9580",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9580",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg2: Integer overflow in tiftoimage causes heap buffer overflow",
"Description": "An integer overflow vulnerability was found in tiftoimage function in openjpeg 2.1.2, resulting in heap buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/12/09/4",
"http://www.securityfocus.com/bid/94822",
"https://access.redhat.com/security/cve/CVE-2016-9580",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9580",
"https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255",
"https://github.com/uclouvain/openjpeg/issues/871",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2018-08-01T16:29:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2016-9581",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9581",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg2: Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1",
"Description": "An infinite loop vulnerability in tiftoimage that results in heap buffer overflow in convert_32s_C1P1 was found in openjpeg 2.1.2.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/12/09/4",
"http://www.securityfocus.com/bid/94822",
"https://access.redhat.com/security/cve/CVE-2016-9581",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9581",
"https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255",
"https://github.com/uclouvain/openjpeg/issues/872",
"https://security.gentoo.org/glsa/201710-26"
],
"PublishedDate": "2018-08-01T14:29:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2017-17479",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-17479",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: Stack-buffer overflow in the pgxtoimage function",
"Description": "In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2017-17479",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479",
"https://github.com/uclouvain/openjpeg/issues/1044"
],
"PublishedDate": "2017-12-08T19:29:00Z",
"LastModifiedDate": "2018-11-29T14:51:00Z"
},
{
"VulnerabilityID": "CVE-2018-16375",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-16375",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c",
"Description": "An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7
}
},
"References": [
"http://www.securityfocus.com/bid/105266",
"https://access.redhat.com/security/cve/CVE-2018-16375",
"https://github.com/uclouvain/openjpeg/issues/1126"
],
"PublishedDate": "2018-09-03T00:29:00Z",
"LastModifiedDate": "2021-01-26T12:50:00Z"
},
{
"VulnerabilityID": "CVE-2018-16376",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-16376",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c",
"Description": "An issue was discovered in OpenJPEG 2.3.0. A heap-based buffer overflow was discovered in the function t2_encode_packet in lib/openmj2/t2.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"V3Score": 5.8
}
},
"References": [
"http://www.securityfocus.com/bid/105262",
"https://access.redhat.com/security/cve/CVE-2018-16376",
"https://github.com/uclouvain/openjpeg/issues/1127"
],
"PublishedDate": "2018-09-03T00:29:00Z",
"LastModifiedDate": "2018-10-31T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2018-20846",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20846",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c leads to denial of service",
"Description": "Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).",
"Severity": "LOW",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"V3Score": 6.5
}
},
"References": [
"http://www.securityfocus.com/bid/108921",
"https://access.redhat.com/security/cve/CVE-2018-20846",
"https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc"
],
"PublishedDate": "2019-06-26T18:15:00Z",
"LastModifiedDate": "2020-09-09T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2019-6988",
"PkgName": "libopenjp2-7-dev",
"InstalledVersion": "2.4.0-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6988",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openjpeg: DoS via memory exhaustion in opj_decompress",
"Description": "An issue was discovered in OpenJPEG 2.3.0. It allows remote attackers to cause a denial of service (attempted excessive memory allocation) in opj_calloc in openjp2/opj_malloc.c, when called from opj_tcd_init_tile in openjp2/tcd.c, as demonstrated by the 64-bit opj_decompress.",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.5
}
},
"References": [
"http://www.securityfocus.com/bid/106785",
"https://access.redhat.com/security/cve/CVE-2019-6988",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988",
"https://github.com/uclouvain/openjpeg/issues/1178"
],
"PublishedDate": "2019-01-28T16:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2017-11164",
"PkgName": "libpcre16-3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11164",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: OP_KETRMAX feature in the match function in pcre_exec.c",
"Description": "In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://openwall.com/lists/oss-security/2017/07/11/3",
"http://www.securityfocus.com/bid/99575",
"https://access.redhat.com/security/cve/CVE-2017-11164",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2017-07-11T03:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2017-16231",
"PkgName": "libpcre16-3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-16231",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: self-recursive call in match() in pcre_exec.c leads to denial of service",
"Description": "** DISPUTED ** In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html",
"http://seclists.org/fulldisclosure/2018/Dec/33",
"http://www.openwall.com/lists/oss-security/2017/11/01/11",
"http://www.openwall.com/lists/oss-security/2017/11/01/3",
"http://www.openwall.com/lists/oss-security/2017/11/01/7",
"http://www.openwall.com/lists/oss-security/2017/11/01/8",
"http://www.securityfocus.com/bid/101688",
"https://access.redhat.com/security/cve/CVE-2017-16231",
"https://bugs.exim.org/show_bug.cgi?id=2047"
],
"PublishedDate": "2019-03-21T15:59:00Z",
"LastModifiedDate": "2019-04-02T13:55:00Z"
},
{
"VulnerabilityID": "CVE-2017-7245",
"PkgName": "libpcre16-3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.7
}
},
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://access.redhat.com/security/cve/CVE-2017-7245",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
],
"PublishedDate": "2017-03-23T21:59:00Z",
"LastModifiedDate": "2018-08-17T10:29:00Z"
},
{
"VulnerabilityID": "CVE-2017-7246",
"PkgName": "libpcre16-3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.7
}
},
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://access.redhat.com/security/cve/CVE-2017-7246",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
],
"PublishedDate": "2017-03-23T21:59:00Z",
"LastModifiedDate": "2018-08-17T10:29:00Z"
},
{
"VulnerabilityID": "CVE-2019-20838",
"PkgName": "libpcre16-3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-20838",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1",
"Description": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://seclists.org/fulldisclosure/2020/Dec/32",
"http://seclists.org/fulldisclosure/2021/Feb/14",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20838.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json",
"https://access.redhat.com/security/cve/CVE-2019-20838",
"https://bugs.gentoo.org/717920",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838",
"https://errata.almalinux.org/8/ALSA-2021-4373.html",
"https://linux.oracle.com/cve/CVE-2019-20838.html",
"https://linux.oracle.com/errata/ELSA-2021-4373.html",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-20838",
"https://support.apple.com/kb/HT211931",
"https://support.apple.com/kb/HT212147",
"https://ubuntu.com/security/notices/USN-5425-1",
"https://www.pcre.org/original/changelog.txt"
],
"PublishedDate": "2020-06-15T17:15:00Z",
"LastModifiedDate": "2021-09-22T14:22:00Z"
},
{
"VulnerabilityID": "CVE-2017-11164",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11164",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: OP_KETRMAX feature in the match function in pcre_exec.c",
"Description": "In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://openwall.com/lists/oss-security/2017/07/11/3",
"http://www.securityfocus.com/bid/99575",
"https://access.redhat.com/security/cve/CVE-2017-11164",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2017-07-11T03:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2017-16231",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-16231",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: self-recursive call in match() in pcre_exec.c leads to denial of service",
"Description": "** DISPUTED ** In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html",
"http://seclists.org/fulldisclosure/2018/Dec/33",
"http://www.openwall.com/lists/oss-security/2017/11/01/11",
"http://www.openwall.com/lists/oss-security/2017/11/01/3",
"http://www.openwall.com/lists/oss-security/2017/11/01/7",
"http://www.openwall.com/lists/oss-security/2017/11/01/8",
"http://www.securityfocus.com/bid/101688",
"https://access.redhat.com/security/cve/CVE-2017-16231",
"https://bugs.exim.org/show_bug.cgi?id=2047"
],
"PublishedDate": "2019-03-21T15:59:00Z",
"LastModifiedDate": "2019-04-02T13:55:00Z"
},
{
"VulnerabilityID": "CVE-2017-7245",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.7
}
},
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://access.redhat.com/security/cve/CVE-2017-7245",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
],
"PublishedDate": "2017-03-23T21:59:00Z",
"LastModifiedDate": "2018-08-17T10:29:00Z"
},
{
"VulnerabilityID": "CVE-2017-7246",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.7
}
},
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://access.redhat.com/security/cve/CVE-2017-7246",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
],
"PublishedDate": "2017-03-23T21:59:00Z",
"LastModifiedDate": "2018-08-17T10:29:00Z"
},
{
"VulnerabilityID": "CVE-2019-20838",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-20838",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1",
"Description": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://seclists.org/fulldisclosure/2020/Dec/32",
"http://seclists.org/fulldisclosure/2021/Feb/14",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20838.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json",
"https://access.redhat.com/security/cve/CVE-2019-20838",
"https://bugs.gentoo.org/717920",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838",
"https://errata.almalinux.org/8/ALSA-2021-4373.html",
"https://linux.oracle.com/cve/CVE-2019-20838.html",
"https://linux.oracle.com/errata/ELSA-2021-4373.html",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-20838",
"https://support.apple.com/kb/HT211931",
"https://support.apple.com/kb/HT212147",
"https://ubuntu.com/security/notices/USN-5425-1",
"https://www.pcre.org/original/changelog.txt"
],
"PublishedDate": "2020-06-15T17:15:00Z",
"LastModifiedDate": "2021-09-22T14:22:00Z"
},
{
"VulnerabilityID": "CVE-2017-11164",
"PkgName": "libpcre3-dev",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11164",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: OP_KETRMAX feature in the match function in pcre_exec.c",
"Description": "In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://openwall.com/lists/oss-security/2017/07/11/3",
"http://www.securityfocus.com/bid/99575",
"https://access.redhat.com/security/cve/CVE-2017-11164",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2017-07-11T03:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2017-16231",
"PkgName": "libpcre3-dev",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-16231",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: self-recursive call in match() in pcre_exec.c leads to denial of service",
"Description": "** DISPUTED ** In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html",
"http://seclists.org/fulldisclosure/2018/Dec/33",
"http://www.openwall.com/lists/oss-security/2017/11/01/11",
"http://www.openwall.com/lists/oss-security/2017/11/01/3",
"http://www.openwall.com/lists/oss-security/2017/11/01/7",
"http://www.openwall.com/lists/oss-security/2017/11/01/8",
"http://www.securityfocus.com/bid/101688",
"https://access.redhat.com/security/cve/CVE-2017-16231",
"https://bugs.exim.org/show_bug.cgi?id=2047"
],
"PublishedDate": "2019-03-21T15:59:00Z",
"LastModifiedDate": "2019-04-02T13:55:00Z"
},
{
"VulnerabilityID": "CVE-2017-7245",
"PkgName": "libpcre3-dev",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.7
}
},
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://access.redhat.com/security/cve/CVE-2017-7245",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
],
"PublishedDate": "2017-03-23T21:59:00Z",
"LastModifiedDate": "2018-08-17T10:29:00Z"
},
{
"VulnerabilityID": "CVE-2017-7246",
"PkgName": "libpcre3-dev",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.7
}
},
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://access.redhat.com/security/cve/CVE-2017-7246",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
],
"PublishedDate": "2017-03-23T21:59:00Z",
"LastModifiedDate": "2018-08-17T10:29:00Z"
},
{
"VulnerabilityID": "CVE-2019-20838",
"PkgName": "libpcre3-dev",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-20838",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1",
"Description": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://seclists.org/fulldisclosure/2020/Dec/32",
"http://seclists.org/fulldisclosure/2021/Feb/14",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20838.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json",
"https://access.redhat.com/security/cve/CVE-2019-20838",
"https://bugs.gentoo.org/717920",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838",
"https://errata.almalinux.org/8/ALSA-2021-4373.html",
"https://linux.oracle.com/cve/CVE-2019-20838.html",
"https://linux.oracle.com/errata/ELSA-2021-4373.html",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-20838",
"https://support.apple.com/kb/HT211931",
"https://support.apple.com/kb/HT212147",
"https://ubuntu.com/security/notices/USN-5425-1",
"https://www.pcre.org/original/changelog.txt"
],
"PublishedDate": "2020-06-15T17:15:00Z",
"LastModifiedDate": "2021-09-22T14:22:00Z"
},
{
"VulnerabilityID": "CVE-2017-11164",
"PkgName": "libpcre32-3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11164",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: OP_KETRMAX feature in the match function in pcre_exec.c",
"Description": "In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://openwall.com/lists/oss-security/2017/07/11/3",
"http://www.securityfocus.com/bid/99575",
"https://access.redhat.com/security/cve/CVE-2017-11164",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2017-07-11T03:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2017-16231",
"PkgName": "libpcre32-3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-16231",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: self-recursive call in match() in pcre_exec.c leads to denial of service",
"Description": "** DISPUTED ** In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html",
"http://seclists.org/fulldisclosure/2018/Dec/33",
"http://www.openwall.com/lists/oss-security/2017/11/01/11",
"http://www.openwall.com/lists/oss-security/2017/11/01/3",
"http://www.openwall.com/lists/oss-security/2017/11/01/7",
"http://www.openwall.com/lists/oss-security/2017/11/01/8",
"http://www.securityfocus.com/bid/101688",
"https://access.redhat.com/security/cve/CVE-2017-16231",
"https://bugs.exim.org/show_bug.cgi?id=2047"
],
"PublishedDate": "2019-03-21T15:59:00Z",
"LastModifiedDate": "2019-04-02T13:55:00Z"
},
{
"VulnerabilityID": "CVE-2017-7245",
"PkgName": "libpcre32-3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.7
}
},
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://access.redhat.com/security/cve/CVE-2017-7245",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
],
"PublishedDate": "2017-03-23T21:59:00Z",
"LastModifiedDate": "2018-08-17T10:29:00Z"
},
{
"VulnerabilityID": "CVE-2017-7246",
"PkgName": "libpcre32-3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.7
}
},
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://access.redhat.com/security/cve/CVE-2017-7246",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
],
"PublishedDate": "2017-03-23T21:59:00Z",
"LastModifiedDate": "2018-08-17T10:29:00Z"
},
{
"VulnerabilityID": "CVE-2019-20838",
"PkgName": "libpcre32-3",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-20838",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1",
"Description": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://seclists.org/fulldisclosure/2020/Dec/32",
"http://seclists.org/fulldisclosure/2021/Feb/14",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20838.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json",
"https://access.redhat.com/security/cve/CVE-2019-20838",
"https://bugs.gentoo.org/717920",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838",
"https://errata.almalinux.org/8/ALSA-2021-4373.html",
"https://linux.oracle.com/cve/CVE-2019-20838.html",
"https://linux.oracle.com/errata/ELSA-2021-4373.html",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-20838",
"https://support.apple.com/kb/HT211931",
"https://support.apple.com/kb/HT212147",
"https://ubuntu.com/security/notices/USN-5425-1",
"https://www.pcre.org/original/changelog.txt"
],
"PublishedDate": "2020-06-15T17:15:00Z",
"LastModifiedDate": "2021-09-22T14:22:00Z"
},
{
"VulnerabilityID": "CVE-2017-11164",
"PkgName": "libpcrecpp0v5",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11164",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: OP_KETRMAX feature in the match function in pcre_exec.c",
"Description": "In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://openwall.com/lists/oss-security/2017/07/11/3",
"http://www.securityfocus.com/bid/99575",
"https://access.redhat.com/security/cve/CVE-2017-11164",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2017-07-11T03:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2017-16231",
"PkgName": "libpcrecpp0v5",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-16231",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: self-recursive call in match() in pcre_exec.c leads to denial of service",
"Description": "** DISPUTED ** In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html",
"http://seclists.org/fulldisclosure/2018/Dec/33",
"http://www.openwall.com/lists/oss-security/2017/11/01/11",
"http://www.openwall.com/lists/oss-security/2017/11/01/3",
"http://www.openwall.com/lists/oss-security/2017/11/01/7",
"http://www.openwall.com/lists/oss-security/2017/11/01/8",
"http://www.securityfocus.com/bid/101688",
"https://access.redhat.com/security/cve/CVE-2017-16231",
"https://bugs.exim.org/show_bug.cgi?id=2047"
],
"PublishedDate": "2019-03-21T15:59:00Z",
"LastModifiedDate": "2019-04-02T13:55:00Z"
},
{
"VulnerabilityID": "CVE-2017-7245",
"PkgName": "libpcrecpp0v5",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7245",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.7
}
},
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://access.redhat.com/security/cve/CVE-2017-7245",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
],
"PublishedDate": "2017-03-23T21:59:00Z",
"LastModifiedDate": "2018-08-17T10:29:00Z"
},
{
"VulnerabilityID": "CVE-2017-7246",
"PkgName": "libpcrecpp0v5",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-7246",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: stack-based buffer overflow write in pcre32_copy_substring",
"Description": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.7
}
},
"References": [
"http://www.securityfocus.com/bid/97067",
"https://access.redhat.com/errata/RHSA-2018:2486",
"https://access.redhat.com/security/cve/CVE-2017-7246",
"https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/",
"https://security.gentoo.org/glsa/201710-25"
],
"PublishedDate": "2017-03-23T21:59:00Z",
"LastModifiedDate": "2018-08-17T10:29:00Z"
},
{
"VulnerabilityID": "CVE-2019-20838",
"PkgName": "libpcrecpp0v5",
"InstalledVersion": "2:8.39-13",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-20838",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1",
"Description": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://seclists.org/fulldisclosure/2020/Dec/32",
"http://seclists.org/fulldisclosure/2021/Feb/14",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20838.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json",
"https://access.redhat.com/security/cve/CVE-2019-20838",
"https://bugs.gentoo.org/717920",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838",
"https://errata.almalinux.org/8/ALSA-2021-4373.html",
"https://linux.oracle.com/cve/CVE-2019-20838.html",
"https://linux.oracle.com/errata/ELSA-2021-4373.html",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2019-20838",
"https://support.apple.com/kb/HT211931",
"https://support.apple.com/kb/HT212147",
"https://ubuntu.com/security/notices/USN-5425-1",
"https://www.pcre.org/original/changelog.txt"
],
"PublishedDate": "2020-06-15T17:15:00Z",
"LastModifiedDate": "2021-09-22T14:22:00Z"
},
{
"VulnerabilityID": "CVE-2020-16156",
"PkgName": "libperl5.32",
"InstalledVersion": "5.32.1-4+deb11u2",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-16156",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "perl-CPAN: Bypass of verification of signatures in CHECKSUMS files",
"Description": "CPAN 2.28 allows Signature Verification Bypass.",
"Severity": "HIGH",
"CweIDs": [
"CWE-347"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html",
"https://access.redhat.com/security/cve/CVE-2020-16156",
"https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/",
"https://metacpan.org/pod/distribution/CPAN/scripts/cpan"
],
"PublishedDate": "2021-12-13T18:15:00Z",
"LastModifiedDate": "2022-04-01T13:26:00Z"
},
{
"VulnerabilityID": "CVE-2011-4116",
"PkgName": "libperl5.32",
"InstalledVersion": "5.32.1-4+deb11u2",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-4116",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "perl: File::Temp insecure temporary file handling",
"Description": "_is_safe in the File::Temp module for Perl does not properly handle symlinks.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"V2Score": 1.9
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2011/11/04/2",
"http://www.openwall.com/lists/oss-security/2011/11/04/4",
"https://access.redhat.com/security/cve/CVE-2011-4116",
"https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14",
"https://rt.cpan.org/Public/Bug/Display.html?id=69106",
"https://seclists.org/oss-sec/2011/q4/238"
],
"PublishedDate": "2020-01-31T18:15:00Z",
"LastModifiedDate": "2020-02-05T22:10:00Z"
},
{
"VulnerabilityID": "CVE-2019-6129",
"PkgName": "libpng-dev",
"InstalledVersion": "1.6.37-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6129",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libpng: memory leak of png_info struct in pngcp.c",
"Description": "** DISPUTED ** png_create_info_struct in png.c in libpng 1.6.36 has a memory leak, as demonstrated by pngcp. NOTE: a third party has stated \"I don't think it is libpng's job to free this buffer.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-6129",
"https://github.com/glennrp/libpng/issues/269",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
],
"PublishedDate": "2019-01-11T05:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2021-4214",
"PkgName": "libpng-dev",
"InstalledVersion": "1.6.37-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4214",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libpng: hardcoded value leads to heap-overflow",
"Description": "A heap overflow flaw was found in libpngs' pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4214",
"https://bugzilla.redhat.com/show_bug.cgi?id=2043393",
"https://github.com/glennrp/libpng/issues/302",
"https://nvd.nist.gov/vuln/detail/CVE-2021-4214",
"https://security-tracker.debian.org/tracker/CVE-2021-4214"
],
"PublishedDate": "2022-08-24T16:15:00Z",
"LastModifiedDate": "2022-08-30T18:36:00Z"
},
{
"VulnerabilityID": "CVE-2019-6129",
"PkgName": "libpng16-16",
"InstalledVersion": "1.6.37-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6129",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libpng: memory leak of png_info struct in pngcp.c",
"Description": "** DISPUTED ** png_create_info_struct in png.c in libpng 1.6.36 has a memory leak, as demonstrated by pngcp. NOTE: a third party has stated \"I don't think it is libpng's job to free this buffer.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-6129",
"https://github.com/glennrp/libpng/issues/269",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
],
"PublishedDate": "2019-01-11T05:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2021-4214",
"PkgName": "libpng16-16",
"InstalledVersion": "1.6.37-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4214",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libpng: hardcoded value leads to heap-overflow",
"Description": "A heap overflow flaw was found in libpngs' pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4214",
"https://bugzilla.redhat.com/show_bug.cgi?id=2043393",
"https://github.com/glennrp/libpng/issues/302",
"https://nvd.nist.gov/vuln/detail/CVE-2021-4214",
"https://security-tracker.debian.org/tracker/CVE-2021-4214"
],
"PublishedDate": "2022-08-24T16:15:00Z",
"LastModifiedDate": "2022-08-30T18:36:00Z"
},
{
"VulnerabilityID": "CVE-2022-2625",
"PkgName": "libpq-dev",
"InstalledVersion": "13.8-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2625",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "postgresql: Extension scripts replace objects not belonging to the extension.",
"Description": "A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.",
"Severity": "HIGH",
"CweIDs": [
"CWE-913"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2625",
"https://bugzilla.redhat.com/show_bug.cgi?id=2113825",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2625",
"https://ubuntu.com/security/notices/USN-5571-1",
"https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/",
"https://www.postgresql.org/support/security/CVE-2022-2625/"
],
"PublishedDate": "2022-08-18T19:15:00Z",
"LastModifiedDate": "2022-08-31T16:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-2625",
"PkgName": "libpq5",
"InstalledVersion": "13.8-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2625",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "postgresql: Extension scripts replace objects not belonging to the extension.",
"Description": "A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.",
"Severity": "HIGH",
"CweIDs": [
"CWE-913"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2625",
"https://bugzilla.redhat.com/show_bug.cgi?id=2113825",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2625",
"https://ubuntu.com/security/notices/USN-5571-1",
"https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/",
"https://www.postgresql.org/support/security/CVE-2022-2625/"
],
"PublishedDate": "2022-08-18T19:15:00Z",
"LastModifiedDate": "2022-08-31T16:15:00Z"
},
{
"VulnerabilityID": "CVE-2015-20107",
"PkgName": "libpython3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2015-20107",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python(mailcap): findmatch() function does not sanitise the second argument",
"Description": "In Python (aka CPython) through 3.10.4, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments).",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-77"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 10,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"V3Score": 7.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2015-20107",
"https://bugs.python.org/issue24778",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107",
"https://github.com/python/cpython/issues/68966",
"https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80",
"https://github.com/python/cpython/pull/91993",
"https://linux.oracle.com/cve/CVE-2015-20107.html",
"https://linux.oracle.com/errata/ELSA-2022-6457.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/53TQZFLS6O3FLIMVSXFEEPZSWLDZLBOX/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57NECACX333A3BBZM2TR2VZ4ZE3UG3SN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DBVY4YC2P6EPZZ2DROOXHDOWZ4BJFLW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIKVSW3H6W2GQGDE5DTIWLGFNH6KKEW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKGMYDVKI3XNM27B6I6RQ6QV3TVJAUCG/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3LNY2NHM6J22O6Q5ANOE3SZRK3OACKR/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPCLGZZJPVXFWUWVV5WCD5FNUAFLKBDN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAI2GBC7WKH7J5NH6J2IW5RT3VF2SF5M/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTTZGLD2YBMMG6U6F5HOTPOGGPBIURMA/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/",
"https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/",
"https://nvd.nist.gov/vuln/detail/CVE-2015-20107",
"https://security.netapp.com/advisory/ntap-20220616-0001/",
"https://ubuntu.com/security/notices/USN-5519-1"
],
"PublishedDate": "2022-04-13T16:15:00Z",
"LastModifiedDate": "2022-07-08T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-29921",
"PkgName": "libpython3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-29921",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python-ipaddress: Improper input validation of octal strings",
"Description": "In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.",
"Severity": "CRITICAL",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"V3Score": 9.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-29921",
"https://bugs.python.org/issue36384",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921",
"https://docs.python.org/3/library/ipaddress.html",
"https://errata.almalinux.org/8/ALSA-2021-4162.html",
"https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst",
"https://github.com/python/cpython/pull/12577",
"https://github.com/python/cpython/pull/25099",
"https://github.com/sickcodes",
"https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md",
"https://linux.oracle.com/cve/CVE-2021-29921.html",
"https://linux.oracle.com/errata/ELSA-2021-4162.html",
"https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html",
"https://security.netapp.com/advisory/ntap-20210622-0003/",
"https://sick.codes/sick-2021-014",
"https://ubuntu.com/security/notices/USN-4973-1",
"https://ubuntu.com/security/notices/USN-4973-2",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-05-06T13:15:00Z",
"LastModifiedDate": "2022-07-25T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-10735",
"PkgName": "libpython3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-10735",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS",
"Description": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2022/09/21/1",
"http://www.openwall.com/lists/oss-security/2022/09/21/4",
"https://access.redhat.com/security/cve/CVE-2020-10735",
"https://bugzilla.redhat.com/show_bug.cgi?id=1834423",
"https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y",
"https://github.com/python/cpython/issues/95778",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/"
],
"PublishedDate": "2022-09-09T14:15:00Z",
"LastModifiedDate": "2022-09-23T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3737",
"PkgName": "libpython3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3737",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib: HTTP client possible infinite loop on a 100 Continue response",
"Description": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-400",
"CWE-835"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3737.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4189.json",
"https://access.redhat.com/security/cve/CVE-2021-3737",
"https://bugs.python.org/issue44022",
"https://bugzilla.redhat.com/show_bug.cgi?id=1995162",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737",
"https://errata.almalinux.org/8/ALSA-2022-1986.html",
"https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)",
"https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)",
"https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14",
"https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)",
"https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)",
"https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)",
"https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)",
"https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)",
"https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)",
"https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)",
"https://github.com/python/cpython/pull/25916",
"https://github.com/python/cpython/pull/26503",
"https://linux.oracle.com/cve/CVE-2021-3737.html",
"https://linux.oracle.com/errata/ELSA-2022-1986.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3737",
"https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html",
"https://security.netapp.com/advisory/ntap-20220407-0009/",
"https://ubuntu.com/security/CVE-2021-3737",
"https://ubuntu.com/security/notices/USN-5083-1",
"https://ubuntu.com/security/notices/USN-5199-1",
"https://ubuntu.com/security/notices/USN-5200-1",
"https://ubuntu.com/security/notices/USN-5201-1",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2022-03-04T19:15:00Z",
"LastModifiedDate": "2022-07-25T18:16:00Z"
},
{
"VulnerabilityID": "CVE-2022-0391",
"PkgName": "libpython3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0391",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib.parse does not sanitize URLs containing ASCII newline and tabs",
"Description": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\\r' and '\\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.",
"Severity": "HIGH",
"CweIDs": [
"CWE-74"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0391",
"https://bugs.python.org/issue43882",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391",
"https://errata.almalinux.org/8/ALSA-2022-1821.html",
"https://linux.oracle.com/cve/CVE-2022-0391.html",
"https://linux.oracle.com/errata/ELSA-2022-6457.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0391",
"https://security.netapp.com/advisory/ntap-20220225-0009/",
"https://ubuntu.com/security/notices/USN-5342-1",
"https://www.oracle.com/security-alerts/cpuapr2022.html"
],
"PublishedDate": "2022-02-09T23:15:00Z",
"LastModifiedDate": "2022-06-16T21:23:00Z"
},
{
"VulnerabilityID": "CVE-2021-3426",
"PkgName": "libpython3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3426",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: Information disclosure via pydoc",
"Description": "There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-200",
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 2.7,
"V3Score": 5.7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3426",
"https://bugzilla.redhat.com/show_bug.cgi?id=1935913",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426",
"https://github.com/python/cpython/pull/24285",
"https://github.com/python/cpython/pull/24337",
"https://linux.oracle.com/cve/CVE-2021-3426.html",
"https://linux.oracle.com/errata/ELSA-2021-9562.html",
"https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/",
"https://python-security.readthedocs.io/vuln/pydoc-getfile.html",
"https://security.gentoo.org/glsa/202104-04",
"https://security.netapp.com/advisory/ntap-20210629-0003/",
"https://ubuntu.com/security/notices/USN-5342-1",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-05-20T13:15:00Z",
"LastModifiedDate": "2022-03-01T15:29:00Z"
},
{
"VulnerabilityID": "CVE-2021-3733",
"PkgName": "libpython3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3733",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib: Regular expression DoS in AbstractBasicAuthHandler",
"Description": "There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3733",
"https://bugs.python.org/issue43075",
"https://bugzilla.redhat.com/show_bug.cgi?id=1995234",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733",
"https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final",
"https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final",
"https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final",
"https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final",
"https://errata.almalinux.org/8/ALSA-2022-1821.html",
"https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)",
"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb",
"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)",
"https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)",
"https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)",
"https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)",
"https://github.com/python/cpython/pull/24391",
"https://linux.oracle.com/cve/CVE-2021-3733.html",
"https://linux.oracle.com/errata/ELSA-2022-1821.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3733",
"https://security.netapp.com/advisory/ntap-20220407-0001/",
"https://ubuntu.com/security/CVE-2021-3733",
"https://ubuntu.com/security/notices/USN-5083-1",
"https://ubuntu.com/security/notices/USN-5199-1",
"https://ubuntu.com/security/notices/USN-5200-1"
],
"PublishedDate": "2022-03-10T17:42:00Z",
"LastModifiedDate": "2022-06-14T14:38:00Z"
},
{
"VulnerabilityID": "CVE-2021-4189",
"PkgName": "libpython3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4189",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: ftplib should not use the host from the PASV response",
"Description": "A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-252"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3737.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4189.json",
"https://access.redhat.com/security/cve/CVE-2021-4189",
"https://bugs.python.org/issue43285",
"https://bugzilla.redhat.com/show_bug.cgi?id=2036020",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189",
"https://errata.almalinux.org/8/ALSA-2022-1986.html",
"https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e",
"https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)",
"https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)",
"https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)",
"https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)",
"https://linux.oracle.com/cve/CVE-2021-4189.html",
"https://linux.oracle.com/errata/ELSA-2022-1986.html",
"https://python-security.readthedocs.io/vuln/ftplib-pasv.html",
"https://security-tracker.debian.org/tracker/CVE-2021-4189",
"https://ubuntu.com/security/notices/USN-5342-1"
],
"PublishedDate": "2022-08-24T16:15:00Z",
"LastModifiedDate": "2022-08-29T13:31:00Z"
},
{
"VulnerabilityID": "CVE-2020-27619",
"PkgName": "libpython3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-27619",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: Unsafe use of eval() on data retrieved via HTTP in the test suite",
"Description": "In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-27619",
"https://bugs.python.org/issue41944",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619",
"https://errata.almalinux.org/8/ALSA-2021-4162.html",
"https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8",
"https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9",
"https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33",
"https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794",
"https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b",
"https://linux.oracle.com/cve/CVE-2020-27619.html",
"https://linux.oracle.com/errata/ELSA-2021-4151.html",
"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
"https://nvd.nist.gov/vuln/detail/CVE-2020-27619",
"https://security.netapp.com/advisory/ntap-20201123-0004/",
"https://ubuntu.com/security/notices/USN-4754-1",
"https://ubuntu.com/security/notices/USN-4754-3",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2020-10-22T03:16:00Z",
"LastModifiedDate": "2022-07-25T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-28861",
"PkgName": "libpython3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-28861",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: an open redirection vulnerability in lib/http/server.py may lead to information disclosure",
"Description": "** DISPUTED ** Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-601"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"V3Score": 7.4
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"V3Score": 7.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-28861",
"https://bugs.python.org/issue43223",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861",
"https://github.com/python/cpython/pull/24848",
"https://github.com/python/cpython/pull/93879",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-28861",
"https://ubuntu.com/security/notices/USN-5629-1"
],
"PublishedDate": "2022-08-23T01:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2015-20107",
"PkgName": "libpython3.9-stdlib",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2015-20107",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python(mailcap): findmatch() function does not sanitise the second argument",
"Description": "In Python (aka CPython) through 3.10.4, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments).",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-77"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 10,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"V3Score": 7.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2015-20107",
"https://bugs.python.org/issue24778",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107",
"https://github.com/python/cpython/issues/68966",
"https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80",
"https://github.com/python/cpython/pull/91993",
"https://linux.oracle.com/cve/CVE-2015-20107.html",
"https://linux.oracle.com/errata/ELSA-2022-6457.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/53TQZFLS6O3FLIMVSXFEEPZSWLDZLBOX/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57NECACX333A3BBZM2TR2VZ4ZE3UG3SN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DBVY4YC2P6EPZZ2DROOXHDOWZ4BJFLW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIKVSW3H6W2GQGDE5DTIWLGFNH6KKEW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKGMYDVKI3XNM27B6I6RQ6QV3TVJAUCG/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3LNY2NHM6J22O6Q5ANOE3SZRK3OACKR/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPCLGZZJPVXFWUWVV5WCD5FNUAFLKBDN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAI2GBC7WKH7J5NH6J2IW5RT3VF2SF5M/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTTZGLD2YBMMG6U6F5HOTPOGGPBIURMA/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/",
"https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/",
"https://nvd.nist.gov/vuln/detail/CVE-2015-20107",
"https://security.netapp.com/advisory/ntap-20220616-0001/",
"https://ubuntu.com/security/notices/USN-5519-1"
],
"PublishedDate": "2022-04-13T16:15:00Z",
"LastModifiedDate": "2022-07-08T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-29921",
"PkgName": "libpython3.9-stdlib",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-29921",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python-ipaddress: Improper input validation of octal strings",
"Description": "In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.",
"Severity": "CRITICAL",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"V3Score": 9.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-29921",
"https://bugs.python.org/issue36384",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921",
"https://docs.python.org/3/library/ipaddress.html",
"https://errata.almalinux.org/8/ALSA-2021-4162.html",
"https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst",
"https://github.com/python/cpython/pull/12577",
"https://github.com/python/cpython/pull/25099",
"https://github.com/sickcodes",
"https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md",
"https://linux.oracle.com/cve/CVE-2021-29921.html",
"https://linux.oracle.com/errata/ELSA-2021-4162.html",
"https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html",
"https://security.netapp.com/advisory/ntap-20210622-0003/",
"https://sick.codes/sick-2021-014",
"https://ubuntu.com/security/notices/USN-4973-1",
"https://ubuntu.com/security/notices/USN-4973-2",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-05-06T13:15:00Z",
"LastModifiedDate": "2022-07-25T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-10735",
"PkgName": "libpython3.9-stdlib",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-10735",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS",
"Description": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2022/09/21/1",
"http://www.openwall.com/lists/oss-security/2022/09/21/4",
"https://access.redhat.com/security/cve/CVE-2020-10735",
"https://bugzilla.redhat.com/show_bug.cgi?id=1834423",
"https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y",
"https://github.com/python/cpython/issues/95778",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/"
],
"PublishedDate": "2022-09-09T14:15:00Z",
"LastModifiedDate": "2022-09-23T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3737",
"PkgName": "libpython3.9-stdlib",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3737",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib: HTTP client possible infinite loop on a 100 Continue response",
"Description": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-400",
"CWE-835"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3737.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4189.json",
"https://access.redhat.com/security/cve/CVE-2021-3737",
"https://bugs.python.org/issue44022",
"https://bugzilla.redhat.com/show_bug.cgi?id=1995162",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737",
"https://errata.almalinux.org/8/ALSA-2022-1986.html",
"https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)",
"https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)",
"https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14",
"https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)",
"https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)",
"https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)",
"https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)",
"https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)",
"https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)",
"https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)",
"https://github.com/python/cpython/pull/25916",
"https://github.com/python/cpython/pull/26503",
"https://linux.oracle.com/cve/CVE-2021-3737.html",
"https://linux.oracle.com/errata/ELSA-2022-1986.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3737",
"https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html",
"https://security.netapp.com/advisory/ntap-20220407-0009/",
"https://ubuntu.com/security/CVE-2021-3737",
"https://ubuntu.com/security/notices/USN-5083-1",
"https://ubuntu.com/security/notices/USN-5199-1",
"https://ubuntu.com/security/notices/USN-5200-1",
"https://ubuntu.com/security/notices/USN-5201-1",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2022-03-04T19:15:00Z",
"LastModifiedDate": "2022-07-25T18:16:00Z"
},
{
"VulnerabilityID": "CVE-2022-0391",
"PkgName": "libpython3.9-stdlib",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0391",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib.parse does not sanitize URLs containing ASCII newline and tabs",
"Description": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\\r' and '\\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.",
"Severity": "HIGH",
"CweIDs": [
"CWE-74"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0391",
"https://bugs.python.org/issue43882",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391",
"https://errata.almalinux.org/8/ALSA-2022-1821.html",
"https://linux.oracle.com/cve/CVE-2022-0391.html",
"https://linux.oracle.com/errata/ELSA-2022-6457.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0391",
"https://security.netapp.com/advisory/ntap-20220225-0009/",
"https://ubuntu.com/security/notices/USN-5342-1",
"https://www.oracle.com/security-alerts/cpuapr2022.html"
],
"PublishedDate": "2022-02-09T23:15:00Z",
"LastModifiedDate": "2022-06-16T21:23:00Z"
},
{
"VulnerabilityID": "CVE-2021-3426",
"PkgName": "libpython3.9-stdlib",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3426",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: Information disclosure via pydoc",
"Description": "There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-200",
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 2.7,
"V3Score": 5.7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3426",
"https://bugzilla.redhat.com/show_bug.cgi?id=1935913",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426",
"https://github.com/python/cpython/pull/24285",
"https://github.com/python/cpython/pull/24337",
"https://linux.oracle.com/cve/CVE-2021-3426.html",
"https://linux.oracle.com/errata/ELSA-2021-9562.html",
"https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/",
"https://python-security.readthedocs.io/vuln/pydoc-getfile.html",
"https://security.gentoo.org/glsa/202104-04",
"https://security.netapp.com/advisory/ntap-20210629-0003/",
"https://ubuntu.com/security/notices/USN-5342-1",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-05-20T13:15:00Z",
"LastModifiedDate": "2022-03-01T15:29:00Z"
},
{
"VulnerabilityID": "CVE-2021-3733",
"PkgName": "libpython3.9-stdlib",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3733",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib: Regular expression DoS in AbstractBasicAuthHandler",
"Description": "There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3733",
"https://bugs.python.org/issue43075",
"https://bugzilla.redhat.com/show_bug.cgi?id=1995234",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733",
"https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final",
"https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final",
"https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final",
"https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final",
"https://errata.almalinux.org/8/ALSA-2022-1821.html",
"https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)",
"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb",
"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)",
"https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)",
"https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)",
"https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)",
"https://github.com/python/cpython/pull/24391",
"https://linux.oracle.com/cve/CVE-2021-3733.html",
"https://linux.oracle.com/errata/ELSA-2022-1821.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3733",
"https://security.netapp.com/advisory/ntap-20220407-0001/",
"https://ubuntu.com/security/CVE-2021-3733",
"https://ubuntu.com/security/notices/USN-5083-1",
"https://ubuntu.com/security/notices/USN-5199-1",
"https://ubuntu.com/security/notices/USN-5200-1"
],
"PublishedDate": "2022-03-10T17:42:00Z",
"LastModifiedDate": "2022-06-14T14:38:00Z"
},
{
"VulnerabilityID": "CVE-2021-4189",
"PkgName": "libpython3.9-stdlib",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4189",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: ftplib should not use the host from the PASV response",
"Description": "A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-252"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3737.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4189.json",
"https://access.redhat.com/security/cve/CVE-2021-4189",
"https://bugs.python.org/issue43285",
"https://bugzilla.redhat.com/show_bug.cgi?id=2036020",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189",
"https://errata.almalinux.org/8/ALSA-2022-1986.html",
"https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e",
"https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)",
"https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)",
"https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)",
"https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)",
"https://linux.oracle.com/cve/CVE-2021-4189.html",
"https://linux.oracle.com/errata/ELSA-2022-1986.html",
"https://python-security.readthedocs.io/vuln/ftplib-pasv.html",
"https://security-tracker.debian.org/tracker/CVE-2021-4189",
"https://ubuntu.com/security/notices/USN-5342-1"
],
"PublishedDate": "2022-08-24T16:15:00Z",
"LastModifiedDate": "2022-08-29T13:31:00Z"
},
{
"VulnerabilityID": "CVE-2020-27619",
"PkgName": "libpython3.9-stdlib",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-27619",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: Unsafe use of eval() on data retrieved via HTTP in the test suite",
"Description": "In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-27619",
"https://bugs.python.org/issue41944",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619",
"https://errata.almalinux.org/8/ALSA-2021-4162.html",
"https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8",
"https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9",
"https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33",
"https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794",
"https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b",
"https://linux.oracle.com/cve/CVE-2020-27619.html",
"https://linux.oracle.com/errata/ELSA-2021-4151.html",
"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
"https://nvd.nist.gov/vuln/detail/CVE-2020-27619",
"https://security.netapp.com/advisory/ntap-20201123-0004/",
"https://ubuntu.com/security/notices/USN-4754-1",
"https://ubuntu.com/security/notices/USN-4754-3",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2020-10-22T03:16:00Z",
"LastModifiedDate": "2022-07-25T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-28861",
"PkgName": "libpython3.9-stdlib",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-28861",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: an open redirection vulnerability in lib/http/server.py may lead to information disclosure",
"Description": "** DISPUTED ** Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-601"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"V3Score": 7.4
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"V3Score": 7.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-28861",
"https://bugs.python.org/issue43223",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861",
"https://github.com/python/cpython/pull/24848",
"https://github.com/python/cpython/pull/93879",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-28861",
"https://ubuntu.com/security/notices/USN-5629-1"
],
"PublishedDate": "2022-08-23T01:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-36084",
"PkgName": "libsepol1",
"InstalledVersion": "3.1-1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36084",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libsepol: use-after-free in __cil_verify_classperms()",
"Description": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36084.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36085.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36086.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36087.json",
"https://access.redhat.com/security/cve/CVE-2021-36084",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084",
"https://errata.almalinux.org/8/ALSA-2021-4513.html",
"https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml",
"https://linux.oracle.com/cve/CVE-2021-36084.html",
"https://linux.oracle.com/errata/ELSA-2021-4513.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/",
"https://ubuntu.com/security/notices/USN-5391-1"
],
"PublishedDate": "2021-07-01T03:15:00Z",
"LastModifiedDate": "2021-11-17T03:16:00Z"
},
{
"VulnerabilityID": "CVE-2021-36085",
"PkgName": "libsepol1",
"InstalledVersion": "3.1-1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36085",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libsepol: use-after-free in __cil_verify_classperms()",
"Description": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36084.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36085.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36086.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36087.json",
"https://access.redhat.com/security/cve/CVE-2021-36085",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085",
"https://errata.almalinux.org/8/ALSA-2021-4513.html",
"https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml",
"https://linux.oracle.com/cve/CVE-2021-36085.html",
"https://linux.oracle.com/errata/ELSA-2021-4513.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/",
"https://ubuntu.com/security/notices/USN-5391-1"
],
"PublishedDate": "2021-07-01T03:15:00Z",
"LastModifiedDate": "2021-11-17T03:26:00Z"
},
{
"VulnerabilityID": "CVE-2021-36086",
"PkgName": "libsepol1",
"InstalledVersion": "3.1-1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36086",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libsepol: use-after-free in cil_reset_classpermission()",
"Description": "The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36084.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36085.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36086.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36087.json",
"https://access.redhat.com/security/cve/CVE-2021-36086",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086",
"https://errata.almalinux.org/8/ALSA-2021-4513.html",
"https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml",
"https://linux.oracle.com/cve/CVE-2021-36086.html",
"https://linux.oracle.com/errata/ELSA-2021-4513.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/",
"https://ubuntu.com/security/notices/USN-5391-1"
],
"PublishedDate": "2021-07-01T03:15:00Z",
"LastModifiedDate": "2021-11-17T03:27:00Z"
},
{
"VulnerabilityID": "CVE-2021-36087",
"PkgName": "libsepol1",
"InstalledVersion": "3.1-1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36087",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libsepol: heap-based buffer overflow in ebitmap_match_any()",
"Description": "The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36084.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36085.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36086.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36087.json",
"https://access.redhat.com/security/cve/CVE-2021-36087",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087",
"https://errata.almalinux.org/8/ALSA-2021-4513.html",
"https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml",
"https://linux.oracle.com/cve/CVE-2021-36087.html",
"https://linux.oracle.com/errata/ELSA-2021-4513.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/",
"https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/",
"https://ubuntu.com/security/notices/USN-5391-1"
],
"PublishedDate": "2021-07-01T03:15:00Z",
"LastModifiedDate": "2021-11-17T14:05:00Z"
},
{
"VulnerabilityID": "CVE-2021-36084",
"PkgName": "libsepol1-dev",
"InstalledVersion": "3.1-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36084",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libsepol: use-after-free in __cil_verify_classperms()",
"Description": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36084.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36085.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36086.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36087.json",
"https://access.redhat.com/security/cve/CVE-2021-36084",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084",
"https://errata.almalinux.org/8/ALSA-2021-4513.html",
"https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml",
"https://linux.oracle.com/cve/CVE-2021-36084.html",
"https://linux.oracle.com/errata/ELSA-2021-4513.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/",
"https://ubuntu.com/security/notices/USN-5391-1"
],
"PublishedDate": "2021-07-01T03:15:00Z",
"LastModifiedDate": "2021-11-17T03:16:00Z"
},
{
"VulnerabilityID": "CVE-2021-36085",
"PkgName": "libsepol1-dev",
"InstalledVersion": "3.1-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36085",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libsepol: use-after-free in __cil_verify_classperms()",
"Description": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36084.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36085.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36086.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36087.json",
"https://access.redhat.com/security/cve/CVE-2021-36085",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085",
"https://errata.almalinux.org/8/ALSA-2021-4513.html",
"https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml",
"https://linux.oracle.com/cve/CVE-2021-36085.html",
"https://linux.oracle.com/errata/ELSA-2021-4513.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/",
"https://ubuntu.com/security/notices/USN-5391-1"
],
"PublishedDate": "2021-07-01T03:15:00Z",
"LastModifiedDate": "2021-11-17T03:26:00Z"
},
{
"VulnerabilityID": "CVE-2021-36086",
"PkgName": "libsepol1-dev",
"InstalledVersion": "3.1-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36086",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libsepol: use-after-free in cil_reset_classpermission()",
"Description": "The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36084.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36085.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36086.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36087.json",
"https://access.redhat.com/security/cve/CVE-2021-36086",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086",
"https://errata.almalinux.org/8/ALSA-2021-4513.html",
"https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml",
"https://linux.oracle.com/cve/CVE-2021-36086.html",
"https://linux.oracle.com/errata/ELSA-2021-4513.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/",
"https://ubuntu.com/security/notices/USN-5391-1"
],
"PublishedDate": "2021-07-01T03:15:00Z",
"LastModifiedDate": "2021-11-17T03:27:00Z"
},
{
"VulnerabilityID": "CVE-2021-36087",
"PkgName": "libsepol1-dev",
"InstalledVersion": "3.1-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36087",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libsepol: heap-based buffer overflow in ebitmap_match_any()",
"Description": "The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36084.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36085.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36086.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36087.json",
"https://access.redhat.com/security/cve/CVE-2021-36087",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087",
"https://errata.almalinux.org/8/ALSA-2021-4513.html",
"https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml",
"https://linux.oracle.com/cve/CVE-2021-36087.html",
"https://linux.oracle.com/errata/ELSA-2021-4513.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/",
"https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/",
"https://ubuntu.com/security/notices/USN-5391-1"
],
"PublishedDate": "2021-07-01T03:15:00Z",
"LastModifiedDate": "2021-11-17T14:05:00Z"
},
{
"VulnerabilityID": "CVE-2022-0563",
"PkgName": "libsmartcols1",
"InstalledVersion": "2.36.1-8+deb11u1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
"Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
"Severity": "LOW",
"CweIDs": [
"CWE-209"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0563",
"https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
"https://security.netapp.com/advisory/ntap-20220331-0002/"
],
"PublishedDate": "2022-02-21T19:15:00Z",
"LastModifiedDate": "2022-06-03T14:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-45346",
"PkgName": "libsqlite3-0",
"InstalledVersion": "3.34.1-3",
"Layer": {
"Digest": "sha256:a42821cd14fb31c4aa253203e7f8e34fc3b15d69ce370f1223fbbe4252a64202",
"DiffID": "sha256:a24f9e96a54c5be9dbb04a4438aa9462f29387c9735c560a80f4df6ae2e7d7f0"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45346",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "sqlite: crafted SQL query allows a malicious user to obtain sensitive information",
"Description": "A Memory Leak vulnerabilty exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicous user obtain sensitive information..",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 4,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 4.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-45346",
"https://github.com/guyinatuxedo/sqlite3_record_leaking",
"https://security.netapp.com/advisory/ntap-20220303-0001/",
"https://sqlite.org/forum/forumpost/53de8864ba114bf6"
],
"PublishedDate": "2022-02-14T19:15:00Z",
"LastModifiedDate": "2022-07-01T11:48:00Z"
},
{
"VulnerabilityID": "CVE-2021-36690",
"PkgName": "libsqlite3-0",
"InstalledVersion": "3.34.1-3",
"Layer": {
"Digest": "sha256:a42821cd14fb31c4aa253203e7f8e34fc3b15d69ce370f1223fbbe4252a64202",
"DiffID": "sha256:a24f9e96a54c5be9dbb04a4438aa9462f29387c9735c560a80f4df6ae2e7d7f0"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36690",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "** DISPUTED ** A segmentation fault can occur in the sqlite3.exe comma ...",
"Description": "** DISPUTED ** A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
}
},
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690",
"https://nvd.nist.gov/vuln/detail/CVE-2021-36690",
"https://ubuntu.com/security/notices/USN-5403-1",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.sqlite.org/forum/forumpost/718c0a8d17"
],
"PublishedDate": "2021-08-24T14:15:00Z",
"LastModifiedDate": "2022-05-03T16:04:00Z"
},
{
"VulnerabilityID": "CVE-2022-35737",
"PkgName": "libsqlite3-0",
"InstalledVersion": "3.34.1-3",
"Layer": {
"Digest": "sha256:a42821cd14fb31c4aa253203e7f8e34fc3b15d69ce370f1223fbbe4252a64202",
"DiffID": "sha256:a24f9e96a54c5be9dbb04a4438aa9462f29387c9735c560a80f4df6ae2e7d7f0"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-35737",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "sqlite: assertion failure via query when compiled with -DSQLITE_ENABLE_STAT4",
"Description": "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.",
"Severity": "LOW",
"CweIDs": [
"CWE-129"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"V3Score": 6.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-35737",
"https://kb.cert.org/vuls/id/720344",
"https://nvd.nist.gov/vuln/detail/CVE-2022-35737",
"https://security.netapp.com/advisory/ntap-20220915-0009/",
"https://sqlite.org/forum/forumpost/3607259d3c",
"https://sqlite.org/releaselog/3_39_2.html",
"https://www.sqlite.org/cves.html"
],
"PublishedDate": "2022-08-03T06:15:00Z",
"LastModifiedDate": "2022-09-15T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-45346",
"PkgName": "libsqlite3-dev",
"InstalledVersion": "3.34.1-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45346",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "sqlite: crafted SQL query allows a malicious user to obtain sensitive information",
"Description": "A Memory Leak vulnerabilty exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicous user obtain sensitive information..",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 4,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 4.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-45346",
"https://github.com/guyinatuxedo/sqlite3_record_leaking",
"https://security.netapp.com/advisory/ntap-20220303-0001/",
"https://sqlite.org/forum/forumpost/53de8864ba114bf6"
],
"PublishedDate": "2022-02-14T19:15:00Z",
"LastModifiedDate": "2022-07-01T11:48:00Z"
},
{
"VulnerabilityID": "CVE-2021-36690",
"PkgName": "libsqlite3-dev",
"InstalledVersion": "3.34.1-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36690",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "** DISPUTED ** A segmentation fault can occur in the sqlite3.exe comma ...",
"Description": "** DISPUTED ** A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
}
},
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690",
"https://nvd.nist.gov/vuln/detail/CVE-2021-36690",
"https://ubuntu.com/security/notices/USN-5403-1",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.sqlite.org/forum/forumpost/718c0a8d17"
],
"PublishedDate": "2021-08-24T14:15:00Z",
"LastModifiedDate": "2022-05-03T16:04:00Z"
},
{
"VulnerabilityID": "CVE-2022-35737",
"PkgName": "libsqlite3-dev",
"InstalledVersion": "3.34.1-3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-35737",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "sqlite: assertion failure via query when compiled with -DSQLITE_ENABLE_STAT4",
"Description": "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.",
"Severity": "LOW",
"CweIDs": [
"CWE-129"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"V3Score": 6.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-35737",
"https://kb.cert.org/vuls/id/720344",
"https://nvd.nist.gov/vuln/detail/CVE-2022-35737",
"https://security.netapp.com/advisory/ntap-20220915-0009/",
"https://sqlite.org/forum/forumpost/3607259d3c",
"https://sqlite.org/releaselog/3_39_2.html",
"https://www.sqlite.org/cves.html"
],
"PublishedDate": "2022-08-03T06:15:00Z",
"LastModifiedDate": "2022-09-15T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-1304",
"PkgName": "libss2",
"InstalledVersion": "1.46.2-2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1304",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "e2fsprogs: out-of-bounds read/write via crafted filesystem",
"Description": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"V3Score": 5.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1304",
"https://bugzilla.redhat.com/show_bug.cgi?id=2069726",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304",
"https://marc.info/?l=linux-ext4&m=165056234501732&w=2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1304",
"https://ubuntu.com/security/notices/USN-5464-1"
],
"PublishedDate": "2022-04-14T21:15:00Z",
"LastModifiedDate": "2022-04-21T15:36:00Z"
},
{
"VulnerabilityID": "CVE-2022-2097",
"PkgName": "libssl-dev",
"InstalledVersion": "1.1.1n-0+deb11u3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2097",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssl: AES OCB fails to encrypt some bytes",
"Description": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-326"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:6224",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1292.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2068.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2097.json",
"https://access.redhat.com/security/cve/CVE-2022-2097",
"https://bugzilla.redhat.com/2081494",
"https://bugzilla.redhat.com/2087911",
"https://bugzilla.redhat.com/2087913",
"https://bugzilla.redhat.com/2097310",
"https://bugzilla.redhat.com/2104905",
"https://crates.io/crates/openssl-src",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097",
"https://errata.almalinux.org/9/ALSA-2022-6224.html",
"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431",
"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93",
"https://linux.oracle.com/cve/CVE-2022-2097.html",
"https://linux.oracle.com/errata/ELSA-2022-9751.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2097",
"https://rustsec.org/advisories/RUSTSEC-2022-0032.html",
"https://security.netapp.com/advisory/ntap-20220715-0011/",
"https://ubuntu.com/security/notices/USN-5502-1",
"https://www.openssl.org/news/secadv/20220705.txt"
],
"PublishedDate": "2022-07-05T11:15:00Z",
"LastModifiedDate": "2022-08-26T18:03:00Z"
},
{
"VulnerabilityID": "CVE-2007-6755",
"PkgName": "libssl-dev",
"InstalledVersion": "1.1.1n-0+deb11u3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-6755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Dual_EC_DRBG: weak pseudo random number generator",
"Description": "The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain \"skeleton key\" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE.",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"V2Score": 5.8
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"V2Score": 5.8
}
},
"References": [
"http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/",
"http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html",
"http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html",
"http://rump2007.cr.yp.to/15-shumow.pdf",
"http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/",
"http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect",
"http://www.securityfocus.com/bid/63657",
"https://access.redhat.com/security/cve/CVE-2007-6755",
"https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html"
],
"PublishedDate": "2013-10-11T22:55:00Z",
"LastModifiedDate": "2021-11-30T18:57:00Z"
},
{
"VulnerabilityID": "CVE-2010-0928",
"PkgName": "libssl-dev",
"InstalledVersion": "1.1.1n-0+deb11u3",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-0928",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssl: RSA authentication weakness",
"Description": "OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a \"fault-based attack.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:H/Au:N/C:C/I:N/A:N",
"V2Score": 4
}
},
"References": [
"http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/",
"http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf",
"http://www.networkworld.com/news/2010/030410-rsa-security-attack.html",
"http://www.osvdb.org/62808",
"http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/",
"https://access.redhat.com/security/cve/CVE-2010-0928",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/56750"
],
"PublishedDate": "2010-03-05T19:30:00Z",
"LastModifiedDate": "2017-08-17T01:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-2097",
"PkgName": "libssl1.1",
"InstalledVersion": "1.1.1n-0+deb11u3",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2097",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssl: AES OCB fails to encrypt some bytes",
"Description": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-326"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:6224",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1292.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2068.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2097.json",
"https://access.redhat.com/security/cve/CVE-2022-2097",
"https://bugzilla.redhat.com/2081494",
"https://bugzilla.redhat.com/2087911",
"https://bugzilla.redhat.com/2087913",
"https://bugzilla.redhat.com/2097310",
"https://bugzilla.redhat.com/2104905",
"https://crates.io/crates/openssl-src",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097",
"https://errata.almalinux.org/9/ALSA-2022-6224.html",
"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431",
"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93",
"https://linux.oracle.com/cve/CVE-2022-2097.html",
"https://linux.oracle.com/errata/ELSA-2022-9751.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2097",
"https://rustsec.org/advisories/RUSTSEC-2022-0032.html",
"https://security.netapp.com/advisory/ntap-20220715-0011/",
"https://ubuntu.com/security/notices/USN-5502-1",
"https://www.openssl.org/news/secadv/20220705.txt"
],
"PublishedDate": "2022-07-05T11:15:00Z",
"LastModifiedDate": "2022-08-26T18:03:00Z"
},
{
"VulnerabilityID": "CVE-2007-6755",
"PkgName": "libssl1.1",
"InstalledVersion": "1.1.1n-0+deb11u3",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-6755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Dual_EC_DRBG: weak pseudo random number generator",
"Description": "The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain \"skeleton key\" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE.",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"V2Score": 5.8
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"V2Score": 5.8
}
},
"References": [
"http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/",
"http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html",
"http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html",
"http://rump2007.cr.yp.to/15-shumow.pdf",
"http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/",
"http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect",
"http://www.securityfocus.com/bid/63657",
"https://access.redhat.com/security/cve/CVE-2007-6755",
"https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html"
],
"PublishedDate": "2013-10-11T22:55:00Z",
"LastModifiedDate": "2021-11-30T18:57:00Z"
},
{
"VulnerabilityID": "CVE-2010-0928",
"PkgName": "libssl1.1",
"InstalledVersion": "1.1.1n-0+deb11u3",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-0928",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssl: RSA authentication weakness",
"Description": "OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a \"fault-based attack.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:H/Au:N/C:C/I:N/A:N",
"V2Score": 4
}
},
"References": [
"http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/",
"http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf",
"http://www.networkworld.com/news/2010/030410-rsa-security-attack.html",
"http://www.osvdb.org/62808",
"http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/",
"https://access.redhat.com/security/cve/CVE-2010-0928",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/56750"
],
"PublishedDate": "2010-03-05T19:30:00Z",
"LastModifiedDate": "2017-08-17T01:32:00Z"
},
{
"VulnerabilityID": "CVE-2013-4392",
"PkgName": "libsystemd0",
"InstalledVersion": "247.3-7+deb11u1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4392",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "systemd: TOCTOU race condition when updating file permissions and SELinux security contexts",
"Description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"V2Score": 3.3
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"V2Score": 3.3
}
},
"References": [
"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
"http://www.openwall.com/lists/oss-security/2013/10/01/9",
"https://access.redhat.com/security/cve/CVE-2013-4392",
"https://bugzilla.redhat.com/show_bug.cgi?id=859060"
],
"PublishedDate": "2013-10-28T22:55:00Z",
"LastModifiedDate": "2022-01-31T17:49:00Z"
},
{
"VulnerabilityID": "CVE-2020-13529",
"PkgName": "libsystemd0",
"InstalledVersion": "247.3-7+deb11u1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-13529",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured",
"Description": "An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.",
"Severity": "LOW",
"CweIDs": [
"CWE-290"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"V2Score": 2.9,
"V3Score": 6.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2021/08/04/2",
"http://www.openwall.com/lists/oss-security/2021/08/17/3",
"http://www.openwall.com/lists/oss-security/2021/09/07/3",
"https://access.redhat.com/security/cve/CVE-2020-13529",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529",
"https://linux.oracle.com/cve/CVE-2020-13529.html",
"https://linux.oracle.com/errata/ELSA-2021-4361.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/",
"https://security.gentoo.org/glsa/202107-48",
"https://security.netapp.com/advisory/ntap-20210625-0005/",
"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142",
"https://ubuntu.com/security/notices/USN-5013-1",
"https://ubuntu.com/security/notices/USN-5013-2"
],
"PublishedDate": "2021-05-10T16:15:00Z",
"LastModifiedDate": "2022-04-28T19:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-2867",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2867",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c",
"Description": "libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"V3Score": 7.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2867",
"https://bugzilla.redhat.com/show_bug.cgi?id=2118847",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2867",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2867",
"https://ubuntu.com/security/notices/USN-5604-1"
],
"PublishedDate": "2022-08-17T22:15:00Z",
"LastModifiedDate": "2022-08-24T14:28:00Z"
},
{
"VulnerabilityID": "CVE-2022-2868",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2868",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits()",
"Description": "libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop.",
"Severity": "HIGH",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V3Score": 8.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2868",
"https://bugzilla.redhat.com/show_bug.cgi?id=2118863",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2868",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2868",
"https://ubuntu.com/security/notices/USN-5604-1"
],
"PublishedDate": "2022-08-17T22:15:00Z",
"LastModifiedDate": "2022-08-24T14:28:00Z"
},
{
"VulnerabilityID": "CVE-2022-2869",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2869",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits()",
"Description": "libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"V3Score": 7.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2869",
"https://bugzilla.redhat.com/show_bug.cgi?id=2118869",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2869",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2869",
"https://ubuntu.com/security/notices/USN-5604-1"
],
"PublishedDate": "2022-08-17T22:15:00Z",
"LastModifiedDate": "2022-08-24T14:28:00Z"
},
{
"VulnerabilityID": "CVE-2022-1354",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1354",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c",
"Description": "A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1354",
"https://bugzilla.redhat.com/show_bug.cgi?id=2074404",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354",
"https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798",
"https://gitlab.com/libtiff/libtiff/-/issues/319",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-20T15:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-1355",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1355",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
"Description": "A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
"V3Score": 6.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"V3Score": 6.6
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1355",
"https://bugzilla.redhat.com/show_bug.cgi?id=2074415",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1355",
"https://gitlab.com/libtiff/libtiff/-/issues/400",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/323",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-20T15:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-1622",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1622",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: out-of-bounds read in LZWDecode",
"Description": "LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1622",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json",
"https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a",
"https://gitlab.com/libtiff/libtiff/-/issues/410",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1622",
"https://security.netapp.com/advisory/ntap-20220616-0005/"
],
"PublishedDate": "2022-05-11T15:15:00Z",
"LastModifiedDate": "2022-06-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-1623",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1623",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: out-of-bounds read in LZWDecode",
"Description": "LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1623",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json",
"https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a",
"https://gitlab.com/libtiff/libtiff/-/issues/410",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1623",
"https://security.netapp.com/advisory/ntap-20220616-0005/"
],
"PublishedDate": "2022-05-11T15:15:00Z",
"LastModifiedDate": "2022-06-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-2056",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2056",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTiff: DoS from Divide By Zero Error",
"Description": "Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2056",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2056",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2056.json",
"https://gitlab.com/libtiff/libtiff/-/issues/415",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/346",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2056",
"https://security.netapp.com/advisory/ntap-20220826-0001/",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-06-30T16:15:00Z",
"LastModifiedDate": "2022-09-09T21:01:00Z"
},
{
"VulnerabilityID": "CVE-2022-2057",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2057",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTiff: DoS from Divide By Zero Error",
"Description": "Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2057",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2057",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2057.json",
"https://gitlab.com/libtiff/libtiff/-/issues/427",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/346",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2057",
"https://security.netapp.com/advisory/ntap-20220826-0001/",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-06-30T16:15:00Z",
"LastModifiedDate": "2022-09-09T20:59:00Z"
},
{
"VulnerabilityID": "CVE-2022-2058",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2058",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTiff: DoS from Divide By Zero Error",
"Description": "Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2058",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2058",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json",
"https://gitlab.com/libtiff/libtiff/-/issues/428",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/346",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2058",
"https://security.netapp.com/advisory/ntap-20220826-0001/",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-06-30T16:15:00Z",
"LastModifiedDate": "2022-08-29T18:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-34526",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-34526",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit",
"Description": "A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-34526",
"https://gitlab.com/libtiff/libtiff/-/issues/433",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FC6LWPAEKYJ57LSHX4SBFMLRMLOZTHIJ/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-34526"
],
"PublishedDate": "2022-07-29T23:15:00Z",
"LastModifiedDate": "2022-08-06T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2014-8130",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2014-8130",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: divide by zero in the tiffdither tool",
"Description": "The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2483",
"http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html",
"http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html",
"http://openwall.com/lists/oss-security/2015/01/24/15",
"http://rhn.redhat.com/errata/RHSA-2016-1546.html",
"http://rhn.redhat.com/errata/RHSA-2016-1547.html",
"http://support.apple.com/kb/HT204941",
"http://support.apple.com/kb/HT204942",
"http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt",
"http://www.securityfocus.com/bid/72353",
"http://www.securitytracker.com/id/1032760",
"https://access.redhat.com/security/cve/CVE-2014-8130",
"https://bugzilla.redhat.com/show_bug.cgi?id=1185817",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130",
"https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543",
"https://linux.oracle.com/cve/CVE-2014-8130.html",
"https://linux.oracle.com/errata/ELSA-2016-1547.html",
"https://security.gentoo.org/glsa/201701-16",
"https://ubuntu.com/security/notices/USN-2553-1"
],
"PublishedDate": "2018-03-12T02:29:00Z",
"LastModifiedDate": "2018-04-05T21:07:00Z"
},
{
"VulnerabilityID": "CVE-2017-16232",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-16232",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c",
"Description": "** DISPUTED ** LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html",
"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html",
"http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html",
"http://seclists.org/fulldisclosure/2018/Dec/32",
"http://seclists.org/fulldisclosure/2018/Dec/47",
"http://www.openwall.com/lists/oss-security/2017/11/01/11",
"http://www.openwall.com/lists/oss-security/2017/11/01/3",
"http://www.openwall.com/lists/oss-security/2017/11/01/7",
"http://www.openwall.com/lists/oss-security/2017/11/01/8",
"http://www.securityfocus.com/bid/101696",
"https://access.redhat.com/security/cve/CVE-2017-16232"
],
"PublishedDate": "2019-03-21T15:59:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-17973",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-17973",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc",
"Description": "** DISPUTED ** In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue.",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2769",
"http://www.securityfocus.com/bid/102331",
"https://access.redhat.com/security/cve/CVE-2017-17973",
"https://bugzilla.novell.com/show_bug.cgi?id=1074318",
"https://bugzilla.redhat.com/show_bug.cgi?id=1530912"
],
"PublishedDate": "2017-12-29T21:29:00Z",
"LastModifiedDate": "2018-02-12T02:29:00Z"
},
{
"VulnerabilityID": "CVE-2017-5563",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-5563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c",
"Description": "LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools/bmp2tiff.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2664",
"http://www.securityfocus.com/bid/95705",
"https://access.redhat.com/security/cve/CVE-2017-5563",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563",
"https://security.gentoo.org/glsa/201709-27",
"https://ubuntu.com/security/notices/USN-3606-1",
"https://usn.ubuntu.com/3606-1/"
],
"PublishedDate": "2017-01-23T07:59:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-9117",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-9117",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Heap-based buffer over-read in bmp2tiff",
"Description": "In LibTIFF 4.0.7, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, leading to a heap-based buffer over-read in bmp2tiff.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2690",
"http://www.securityfocus.com/bid/98581",
"https://access.redhat.com/security/cve/CVE-2017-9117",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117",
"https://ubuntu.com/security/notices/USN-3606-1",
"https://usn.ubuntu.com/3606-1/"
],
"PublishedDate": "2017-05-21T19:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-10126",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-10126",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c",
"Description": "LibTIFF 4.0.9 has a NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2786",
"https://access.redhat.com/security/cve/CVE-2018-10126",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-04-21T21:29:00Z",
"LastModifiedDate": "2021-03-15T22:31:00Z"
},
{
"VulnerabilityID": "CVE-2022-1056",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1056",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers ...",
"Description": "Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
}
},
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1056",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json",
"https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c",
"https://gitlab.com/libtiff/libtiff/-/issues/391",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/307",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1056"
],
"PublishedDate": "2022-03-28T19:15:00Z",
"LastModifiedDate": "2022-04-04T18:12:00Z"
},
{
"VulnerabilityID": "CVE-2022-1210",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1210",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "tiff: Malicious file leads to a denial of service in TIFF File Handler",
"Description": "A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 4.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1210",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1210",
"https://gitlab.com/libtiff/libtiff/-/issues/402",
"https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1210",
"https://security.netapp.com/advisory/ntap-20220513-0005/",
"https://vuldb.com/?id.196363"
],
"PublishedDate": "2022-04-03T09:15:00Z",
"LastModifiedDate": "2022-07-22T13:39:00Z"
},
{
"VulnerabilityID": "CVE-2022-2519",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2519",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Double free or corruption in rotateImage() function at tiffcrop.c",
"Description": "There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1",
"Severity": "LOW",
"CweIDs": [
"CWE-415"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2519",
"https://gitlab.com/libtiff/libtiff/-/issues/423",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/378"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-06T21:10:00Z"
},
{
"VulnerabilityID": "CVE-2022-2520",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2520",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Assertion fail in rotateImage() function at tiffcrop.c",
"Description": "A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2520",
"https://gitlab.com/libtiff/libtiff/-/issues/424",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/378"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-06T21:01:00Z"
},
{
"VulnerabilityID": "CVE-2022-2521",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2521",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c",
"Description": "It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.",
"Severity": "LOW",
"CweIDs": [
"CWE-763"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2521",
"https://gitlab.com/libtiff/libtiff/-/issues/422",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/378"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-08T03:16:00Z"
},
{
"VulnerabilityID": "CVE-2022-2953",
"PkgName": "libtiff-dev",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2953",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tool ...",
"Description": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json",
"https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3",
"https://gitlab.com/libtiff/libtiff/-/issues/414",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2953"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-02T19:36:00Z"
},
{
"VulnerabilityID": "CVE-2022-2867",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2867",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c",
"Description": "libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"V3Score": 7.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2867",
"https://bugzilla.redhat.com/show_bug.cgi?id=2118847",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2867",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2867",
"https://ubuntu.com/security/notices/USN-5604-1"
],
"PublishedDate": "2022-08-17T22:15:00Z",
"LastModifiedDate": "2022-08-24T14:28:00Z"
},
{
"VulnerabilityID": "CVE-2022-2868",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2868",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits()",
"Description": "libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop.",
"Severity": "HIGH",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V3Score": 8.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2868",
"https://bugzilla.redhat.com/show_bug.cgi?id=2118863",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2868",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2868",
"https://ubuntu.com/security/notices/USN-5604-1"
],
"PublishedDate": "2022-08-17T22:15:00Z",
"LastModifiedDate": "2022-08-24T14:28:00Z"
},
{
"VulnerabilityID": "CVE-2022-2869",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2869",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits()",
"Description": "libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"V3Score": 7.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2869",
"https://bugzilla.redhat.com/show_bug.cgi?id=2118869",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2869",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2869",
"https://ubuntu.com/security/notices/USN-5604-1"
],
"PublishedDate": "2022-08-17T22:15:00Z",
"LastModifiedDate": "2022-08-24T14:28:00Z"
},
{
"VulnerabilityID": "CVE-2022-1354",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1354",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c",
"Description": "A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1354",
"https://bugzilla.redhat.com/show_bug.cgi?id=2074404",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354",
"https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798",
"https://gitlab.com/libtiff/libtiff/-/issues/319",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-20T15:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-1355",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1355",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
"Description": "A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
"V3Score": 6.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"V3Score": 6.6
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1355",
"https://bugzilla.redhat.com/show_bug.cgi?id=2074415",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1355",
"https://gitlab.com/libtiff/libtiff/-/issues/400",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/323",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-20T15:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-1622",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1622",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: out-of-bounds read in LZWDecode",
"Description": "LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1622",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json",
"https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a",
"https://gitlab.com/libtiff/libtiff/-/issues/410",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1622",
"https://security.netapp.com/advisory/ntap-20220616-0005/"
],
"PublishedDate": "2022-05-11T15:15:00Z",
"LastModifiedDate": "2022-06-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-1623",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1623",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: out-of-bounds read in LZWDecode",
"Description": "LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1623",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json",
"https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a",
"https://gitlab.com/libtiff/libtiff/-/issues/410",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1623",
"https://security.netapp.com/advisory/ntap-20220616-0005/"
],
"PublishedDate": "2022-05-11T15:15:00Z",
"LastModifiedDate": "2022-06-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-2056",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2056",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTiff: DoS from Divide By Zero Error",
"Description": "Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2056",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2056",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2056.json",
"https://gitlab.com/libtiff/libtiff/-/issues/415",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/346",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2056",
"https://security.netapp.com/advisory/ntap-20220826-0001/",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-06-30T16:15:00Z",
"LastModifiedDate": "2022-09-09T21:01:00Z"
},
{
"VulnerabilityID": "CVE-2022-2057",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2057",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTiff: DoS from Divide By Zero Error",
"Description": "Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2057",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2057",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2057.json",
"https://gitlab.com/libtiff/libtiff/-/issues/427",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/346",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2057",
"https://security.netapp.com/advisory/ntap-20220826-0001/",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-06-30T16:15:00Z",
"LastModifiedDate": "2022-09-09T20:59:00Z"
},
{
"VulnerabilityID": "CVE-2022-2058",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2058",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTiff: DoS from Divide By Zero Error",
"Description": "Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2058",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2058",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json",
"https://gitlab.com/libtiff/libtiff/-/issues/428",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/346",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2058",
"https://security.netapp.com/advisory/ntap-20220826-0001/",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-06-30T16:15:00Z",
"LastModifiedDate": "2022-08-29T18:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-34526",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-34526",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit",
"Description": "A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-34526",
"https://gitlab.com/libtiff/libtiff/-/issues/433",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FC6LWPAEKYJ57LSHX4SBFMLRMLOZTHIJ/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-34526"
],
"PublishedDate": "2022-07-29T23:15:00Z",
"LastModifiedDate": "2022-08-06T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2014-8130",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2014-8130",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: divide by zero in the tiffdither tool",
"Description": "The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2483",
"http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html",
"http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html",
"http://openwall.com/lists/oss-security/2015/01/24/15",
"http://rhn.redhat.com/errata/RHSA-2016-1546.html",
"http://rhn.redhat.com/errata/RHSA-2016-1547.html",
"http://support.apple.com/kb/HT204941",
"http://support.apple.com/kb/HT204942",
"http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt",
"http://www.securityfocus.com/bid/72353",
"http://www.securitytracker.com/id/1032760",
"https://access.redhat.com/security/cve/CVE-2014-8130",
"https://bugzilla.redhat.com/show_bug.cgi?id=1185817",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130",
"https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543",
"https://linux.oracle.com/cve/CVE-2014-8130.html",
"https://linux.oracle.com/errata/ELSA-2016-1547.html",
"https://security.gentoo.org/glsa/201701-16",
"https://ubuntu.com/security/notices/USN-2553-1"
],
"PublishedDate": "2018-03-12T02:29:00Z",
"LastModifiedDate": "2018-04-05T21:07:00Z"
},
{
"VulnerabilityID": "CVE-2017-16232",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-16232",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c",
"Description": "** DISPUTED ** LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html",
"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html",
"http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html",
"http://seclists.org/fulldisclosure/2018/Dec/32",
"http://seclists.org/fulldisclosure/2018/Dec/47",
"http://www.openwall.com/lists/oss-security/2017/11/01/11",
"http://www.openwall.com/lists/oss-security/2017/11/01/3",
"http://www.openwall.com/lists/oss-security/2017/11/01/7",
"http://www.openwall.com/lists/oss-security/2017/11/01/8",
"http://www.securityfocus.com/bid/101696",
"https://access.redhat.com/security/cve/CVE-2017-16232"
],
"PublishedDate": "2019-03-21T15:59:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-17973",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-17973",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc",
"Description": "** DISPUTED ** In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue.",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2769",
"http://www.securityfocus.com/bid/102331",
"https://access.redhat.com/security/cve/CVE-2017-17973",
"https://bugzilla.novell.com/show_bug.cgi?id=1074318",
"https://bugzilla.redhat.com/show_bug.cgi?id=1530912"
],
"PublishedDate": "2017-12-29T21:29:00Z",
"LastModifiedDate": "2018-02-12T02:29:00Z"
},
{
"VulnerabilityID": "CVE-2017-5563",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-5563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c",
"Description": "LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools/bmp2tiff.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2664",
"http://www.securityfocus.com/bid/95705",
"https://access.redhat.com/security/cve/CVE-2017-5563",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563",
"https://security.gentoo.org/glsa/201709-27",
"https://ubuntu.com/security/notices/USN-3606-1",
"https://usn.ubuntu.com/3606-1/"
],
"PublishedDate": "2017-01-23T07:59:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-9117",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-9117",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Heap-based buffer over-read in bmp2tiff",
"Description": "In LibTIFF 4.0.7, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, leading to a heap-based buffer over-read in bmp2tiff.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2690",
"http://www.securityfocus.com/bid/98581",
"https://access.redhat.com/security/cve/CVE-2017-9117",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117",
"https://ubuntu.com/security/notices/USN-3606-1",
"https://usn.ubuntu.com/3606-1/"
],
"PublishedDate": "2017-05-21T19:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-10126",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-10126",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c",
"Description": "LibTIFF 4.0.9 has a NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2786",
"https://access.redhat.com/security/cve/CVE-2018-10126",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-04-21T21:29:00Z",
"LastModifiedDate": "2021-03-15T22:31:00Z"
},
{
"VulnerabilityID": "CVE-2022-1056",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1056",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers ...",
"Description": "Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
}
},
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1056",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json",
"https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c",
"https://gitlab.com/libtiff/libtiff/-/issues/391",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/307",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1056"
],
"PublishedDate": "2022-03-28T19:15:00Z",
"LastModifiedDate": "2022-04-04T18:12:00Z"
},
{
"VulnerabilityID": "CVE-2022-1210",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1210",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "tiff: Malicious file leads to a denial of service in TIFF File Handler",
"Description": "A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 4.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1210",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1210",
"https://gitlab.com/libtiff/libtiff/-/issues/402",
"https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1210",
"https://security.netapp.com/advisory/ntap-20220513-0005/",
"https://vuldb.com/?id.196363"
],
"PublishedDate": "2022-04-03T09:15:00Z",
"LastModifiedDate": "2022-07-22T13:39:00Z"
},
{
"VulnerabilityID": "CVE-2022-2519",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2519",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Double free or corruption in rotateImage() function at tiffcrop.c",
"Description": "There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1",
"Severity": "LOW",
"CweIDs": [
"CWE-415"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2519",
"https://gitlab.com/libtiff/libtiff/-/issues/423",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/378"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-06T21:10:00Z"
},
{
"VulnerabilityID": "CVE-2022-2520",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2520",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Assertion fail in rotateImage() function at tiffcrop.c",
"Description": "A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2520",
"https://gitlab.com/libtiff/libtiff/-/issues/424",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/378"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-06T21:01:00Z"
},
{
"VulnerabilityID": "CVE-2022-2521",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2521",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c",
"Description": "It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.",
"Severity": "LOW",
"CweIDs": [
"CWE-763"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2521",
"https://gitlab.com/libtiff/libtiff/-/issues/422",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/378"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-08T03:16:00Z"
},
{
"VulnerabilityID": "CVE-2022-2953",
"PkgName": "libtiff5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2953",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tool ...",
"Description": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json",
"https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3",
"https://gitlab.com/libtiff/libtiff/-/issues/414",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2953"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-02T19:36:00Z"
},
{
"VulnerabilityID": "CVE-2022-2867",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2867",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c",
"Description": "libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"V3Score": 7.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2867",
"https://bugzilla.redhat.com/show_bug.cgi?id=2118847",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2867",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2867",
"https://ubuntu.com/security/notices/USN-5604-1"
],
"PublishedDate": "2022-08-17T22:15:00Z",
"LastModifiedDate": "2022-08-24T14:28:00Z"
},
{
"VulnerabilityID": "CVE-2022-2868",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2868",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits()",
"Description": "libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop.",
"Severity": "HIGH",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V3Score": 8.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2868",
"https://bugzilla.redhat.com/show_bug.cgi?id=2118863",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2868",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2868",
"https://ubuntu.com/security/notices/USN-5604-1"
],
"PublishedDate": "2022-08-17T22:15:00Z",
"LastModifiedDate": "2022-08-24T14:28:00Z"
},
{
"VulnerabilityID": "CVE-2022-2869",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2869",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits()",
"Description": "libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"V3Score": 7.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2869",
"https://bugzilla.redhat.com/show_bug.cgi?id=2118869",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2869",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2869",
"https://ubuntu.com/security/notices/USN-5604-1"
],
"PublishedDate": "2022-08-17T22:15:00Z",
"LastModifiedDate": "2022-08-24T14:28:00Z"
},
{
"VulnerabilityID": "CVE-2022-1354",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1354",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c",
"Description": "A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1354",
"https://bugzilla.redhat.com/show_bug.cgi?id=2074404",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354",
"https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798",
"https://gitlab.com/libtiff/libtiff/-/issues/319",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-20T15:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-1355",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1355",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
"Description": "A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
"V3Score": 6.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"V3Score": 6.6
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1355",
"https://bugzilla.redhat.com/show_bug.cgi?id=2074415",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1355",
"https://gitlab.com/libtiff/libtiff/-/issues/400",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/323",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-20T15:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-1622",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1622",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: out-of-bounds read in LZWDecode",
"Description": "LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1622",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json",
"https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a",
"https://gitlab.com/libtiff/libtiff/-/issues/410",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1622",
"https://security.netapp.com/advisory/ntap-20220616-0005/"
],
"PublishedDate": "2022-05-11T15:15:00Z",
"LastModifiedDate": "2022-06-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-1623",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1623",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: out-of-bounds read in LZWDecode",
"Description": "LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1623",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json",
"https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a",
"https://gitlab.com/libtiff/libtiff/-/issues/410",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1623",
"https://security.netapp.com/advisory/ntap-20220616-0005/"
],
"PublishedDate": "2022-05-11T15:15:00Z",
"LastModifiedDate": "2022-06-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-2056",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2056",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTiff: DoS from Divide By Zero Error",
"Description": "Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2056",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2056",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2056.json",
"https://gitlab.com/libtiff/libtiff/-/issues/415",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/346",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2056",
"https://security.netapp.com/advisory/ntap-20220826-0001/",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-06-30T16:15:00Z",
"LastModifiedDate": "2022-09-09T21:01:00Z"
},
{
"VulnerabilityID": "CVE-2022-2057",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2057",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTiff: DoS from Divide By Zero Error",
"Description": "Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2057",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2057",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2057.json",
"https://gitlab.com/libtiff/libtiff/-/issues/427",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/346",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2057",
"https://security.netapp.com/advisory/ntap-20220826-0001/",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-06-30T16:15:00Z",
"LastModifiedDate": "2022-09-09T20:59:00Z"
},
{
"VulnerabilityID": "CVE-2022-2058",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2058",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTiff: DoS from Divide By Zero Error",
"Description": "Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2058",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2058",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json",
"https://gitlab.com/libtiff/libtiff/-/issues/428",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/346",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2058",
"https://security.netapp.com/advisory/ntap-20220826-0001/",
"https://ubuntu.com/security/notices/USN-5619-1"
],
"PublishedDate": "2022-06-30T16:15:00Z",
"LastModifiedDate": "2022-08-29T18:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-34526",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-34526",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit",
"Description": "A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-34526",
"https://gitlab.com/libtiff/libtiff/-/issues/433",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FC6LWPAEKYJ57LSHX4SBFMLRMLOZTHIJ/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-34526"
],
"PublishedDate": "2022-07-29T23:15:00Z",
"LastModifiedDate": "2022-08-06T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2014-8130",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2014-8130",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: divide by zero in the tiffdither tool",
"Description": "The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.",
"Severity": "LOW",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2483",
"http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html",
"http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html",
"http://openwall.com/lists/oss-security/2015/01/24/15",
"http://rhn.redhat.com/errata/RHSA-2016-1546.html",
"http://rhn.redhat.com/errata/RHSA-2016-1547.html",
"http://support.apple.com/kb/HT204941",
"http://support.apple.com/kb/HT204942",
"http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt",
"http://www.securityfocus.com/bid/72353",
"http://www.securitytracker.com/id/1032760",
"https://access.redhat.com/security/cve/CVE-2014-8130",
"https://bugzilla.redhat.com/show_bug.cgi?id=1185817",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130",
"https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543",
"https://linux.oracle.com/cve/CVE-2014-8130.html",
"https://linux.oracle.com/errata/ELSA-2016-1547.html",
"https://security.gentoo.org/glsa/201701-16",
"https://ubuntu.com/security/notices/USN-2553-1"
],
"PublishedDate": "2018-03-12T02:29:00Z",
"LastModifiedDate": "2018-04-05T21:07:00Z"
},
{
"VulnerabilityID": "CVE-2017-16232",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-16232",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c",
"Description": "** DISPUTED ** LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html",
"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html",
"http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html",
"http://seclists.org/fulldisclosure/2018/Dec/32",
"http://seclists.org/fulldisclosure/2018/Dec/47",
"http://www.openwall.com/lists/oss-security/2017/11/01/11",
"http://www.openwall.com/lists/oss-security/2017/11/01/3",
"http://www.openwall.com/lists/oss-security/2017/11/01/7",
"http://www.openwall.com/lists/oss-security/2017/11/01/8",
"http://www.securityfocus.com/bid/101696",
"https://access.redhat.com/security/cve/CVE-2017-16232"
],
"PublishedDate": "2019-03-21T15:59:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-17973",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-17973",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc",
"Description": "** DISPUTED ** In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue.",
"Severity": "LOW",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2769",
"http://www.securityfocus.com/bid/102331",
"https://access.redhat.com/security/cve/CVE-2017-17973",
"https://bugzilla.novell.com/show_bug.cgi?id=1074318",
"https://bugzilla.redhat.com/show_bug.cgi?id=1530912"
],
"PublishedDate": "2017-12-29T21:29:00Z",
"LastModifiedDate": "2018-02-12T02:29:00Z"
},
{
"VulnerabilityID": "CVE-2017-5563",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-5563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c",
"Description": "LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools/bmp2tiff.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2664",
"http://www.securityfocus.com/bid/95705",
"https://access.redhat.com/security/cve/CVE-2017-5563",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563",
"https://security.gentoo.org/glsa/201709-27",
"https://ubuntu.com/security/notices/USN-3606-1",
"https://usn.ubuntu.com/3606-1/"
],
"PublishedDate": "2017-01-23T07:59:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2017-9117",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-9117",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Heap-based buffer over-read in bmp2tiff",
"Description": "In LibTIFF 4.0.7, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, leading to a heap-based buffer over-read in bmp2tiff.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2690",
"http://www.securityfocus.com/bid/98581",
"https://access.redhat.com/security/cve/CVE-2017-9117",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117",
"https://ubuntu.com/security/notices/USN-3606-1",
"https://usn.ubuntu.com/3606-1/"
],
"PublishedDate": "2017-05-21T19:29:00Z",
"LastModifiedDate": "2019-10-03T00:03:00Z"
},
{
"VulnerabilityID": "CVE-2018-10126",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-10126",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c",
"Description": "LibTIFF 4.0.9 has a NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://bugzilla.maptools.org/show_bug.cgi?id=2786",
"https://access.redhat.com/security/cve/CVE-2018-10126",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2018-04-21T21:29:00Z",
"LastModifiedDate": "2021-03-15T22:31:00Z"
},
{
"VulnerabilityID": "CVE-2022-1056",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1056",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers ...",
"Description": "Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
}
},
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1056",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json",
"https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c",
"https://gitlab.com/libtiff/libtiff/-/issues/391",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/307",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1056"
],
"PublishedDate": "2022-03-28T19:15:00Z",
"LastModifiedDate": "2022-04-04T18:12:00Z"
},
{
"VulnerabilityID": "CVE-2022-1210",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1210",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "tiff: Malicious file leads to a denial of service in TIFF File Handler",
"Description": "A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 4.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1210",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1210",
"https://gitlab.com/libtiff/libtiff/-/issues/402",
"https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1210",
"https://security.netapp.com/advisory/ntap-20220513-0005/",
"https://vuldb.com/?id.196363"
],
"PublishedDate": "2022-04-03T09:15:00Z",
"LastModifiedDate": "2022-07-22T13:39:00Z"
},
{
"VulnerabilityID": "CVE-2022-2519",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2519",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Double free or corruption in rotateImage() function at tiffcrop.c",
"Description": "There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1",
"Severity": "LOW",
"CweIDs": [
"CWE-415"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2519",
"https://gitlab.com/libtiff/libtiff/-/issues/423",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/378"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-06T21:10:00Z"
},
{
"VulnerabilityID": "CVE-2022-2520",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2520",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Assertion fail in rotateImage() function at tiffcrop.c",
"Description": "A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.",
"Severity": "LOW",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2520",
"https://gitlab.com/libtiff/libtiff/-/issues/424",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/378"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-06T21:01:00Z"
},
{
"VulnerabilityID": "CVE-2022-2521",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2521",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c",
"Description": "It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.",
"Severity": "LOW",
"CweIDs": [
"CWE-763"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2521",
"https://gitlab.com/libtiff/libtiff/-/issues/422",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/378"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-08T03:16:00Z"
},
{
"VulnerabilityID": "CVE-2022-2953",
"PkgName": "libtiffxx5",
"InstalledVersion": "4.2.0-1+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2953",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tool ...",
"Description": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json",
"https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3",
"https://gitlab.com/libtiff/libtiff/-/issues/414",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2953"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-02T19:36:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgName": "libtinfo6",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-04-27T13:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgName": "libtinfo6",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2021-11-30T22:42:00Z"
},
{
"VulnerabilityID": "CVE-2013-4392",
"PkgName": "libudev1",
"InstalledVersion": "247.3-7+deb11u1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4392",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "systemd: TOCTOU race condition when updating file permissions and SELinux security contexts",
"Description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"V2Score": 3.3
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"V2Score": 3.3
}
},
"References": [
"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
"http://www.openwall.com/lists/oss-security/2013/10/01/9",
"https://access.redhat.com/security/cve/CVE-2013-4392",
"https://bugzilla.redhat.com/show_bug.cgi?id=859060"
],
"PublishedDate": "2013-10-28T22:55:00Z",
"LastModifiedDate": "2022-01-31T17:49:00Z"
},
{
"VulnerabilityID": "CVE-2020-13529",
"PkgName": "libudev1",
"InstalledVersion": "247.3-7+deb11u1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-13529",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured",
"Description": "An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.",
"Severity": "LOW",
"CweIDs": [
"CWE-290"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"V2Score": 2.9,
"V3Score": 6.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2021/08/04/2",
"http://www.openwall.com/lists/oss-security/2021/08/17/3",
"http://www.openwall.com/lists/oss-security/2021/09/07/3",
"https://access.redhat.com/security/cve/CVE-2020-13529",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529",
"https://linux.oracle.com/cve/CVE-2020-13529.html",
"https://linux.oracle.com/errata/ELSA-2021-4361.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/",
"https://security.gentoo.org/glsa/202107-48",
"https://security.netapp.com/advisory/ntap-20210625-0005/",
"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142",
"https://ubuntu.com/security/notices/USN-5013-1",
"https://ubuntu.com/security/notices/USN-5013-2"
],
"PublishedDate": "2021-05-10T16:15:00Z",
"LastModifiedDate": "2022-04-28T19:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-0563",
"PkgName": "libuuid1",
"InstalledVersion": "2.36.1-8+deb11u1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
"Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
"Severity": "LOW",
"CweIDs": [
"CWE-209"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0563",
"https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
"https://security.netapp.com/advisory/ntap-20220331-0002/"
],
"PublishedDate": "2022-02-21T19:15:00Z",
"LastModifiedDate": "2022-06-03T14:15:00Z"
},
{
"VulnerabilityID": "CVE-2016-9085",
"PkgName": "libwebp-dev",
"InstalledVersion": "0.6.1-2.1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9085",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libwebp: Several integer overflows",
"Description": "Multiple integer overflows in libwebp allows attackers to have unspecified impact via unknown vectors.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/27/3",
"http://www.securityfocus.com/bid/93928",
"https://access.redhat.com/security/cve/CVE-2016-9085",
"https://bugzilla.redhat.com/show_bug.cgi?id=1389338",
"https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/",
"https://security.gentoo.org/glsa/201701-61"
],
"PublishedDate": "2017-02-03T15:59:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2016-9085",
"PkgName": "libwebp6",
"InstalledVersion": "0.6.1-2.1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9085",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libwebp: Several integer overflows",
"Description": "Multiple integer overflows in libwebp allows attackers to have unspecified impact via unknown vectors.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/27/3",
"http://www.securityfocus.com/bid/93928",
"https://access.redhat.com/security/cve/CVE-2016-9085",
"https://bugzilla.redhat.com/show_bug.cgi?id=1389338",
"https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/",
"https://security.gentoo.org/glsa/201701-61"
],
"PublishedDate": "2017-02-03T15:59:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2016-9085",
"PkgName": "libwebpdemux2",
"InstalledVersion": "0.6.1-2.1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9085",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libwebp: Several integer overflows",
"Description": "Multiple integer overflows in libwebp allows attackers to have unspecified impact via unknown vectors.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/27/3",
"http://www.securityfocus.com/bid/93928",
"https://access.redhat.com/security/cve/CVE-2016-9085",
"https://bugzilla.redhat.com/show_bug.cgi?id=1389338",
"https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/",
"https://security.gentoo.org/glsa/201701-61"
],
"PublishedDate": "2017-02-03T15:59:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2016-9085",
"PkgName": "libwebpmux3",
"InstalledVersion": "0.6.1-2.1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-9085",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libwebp: Several integer overflows",
"Description": "Multiple integer overflows in libwebp allows attackers to have unspecified impact via unknown vectors.",
"Severity": "LOW",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V2Score": 4.3,
"V3Score": 3.3
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/27/3",
"http://www.securityfocus.com/bid/93928",
"https://access.redhat.com/security/cve/CVE-2016-9085",
"https://bugzilla.redhat.com/show_bug.cgi?id=1389338",
"https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/",
"https://security.gentoo.org/glsa/201701-61"
],
"PublishedDate": "2017-02-03T15:59:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2007-3476",
"PkgName": "libwmf-dev",
"InstalledVersion": "0.2.8.4-17",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-3476",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libgd Denial of service by corrupted GIF images",
"Description": "Array index error in gd_gif_in.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash and heap corruption) via large color index values in crafted image data, which results in a segmentation fault.",
"Severity": "LOW",
"CweIDs": [
"CWE-189"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 4.3
}
},
"References": [
"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
"http://bugs.libgd.org/?do=details&task_id=87",
"http://fedoranews.org/updates/FEDORA-2007-205.shtml",
"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html",
"http://osvdb.org/37741",
"http://secunia.com/advisories/25860",
"http://secunia.com/advisories/26272",
"http://secunia.com/advisories/26390",
"http://secunia.com/advisories/26415",
"http://secunia.com/advisories/26467",
"http://secunia.com/advisories/26663",
"http://secunia.com/advisories/26766",
"http://secunia.com/advisories/26856",
"http://secunia.com/advisories/29157",
"http://secunia.com/advisories/30168",
"http://secunia.com/advisories/31168",
"http://secunia.com/advisories/42813",
"http://security.gentoo.org/glsa/glsa-200708-05.xml",
"http://security.gentoo.org/glsa/glsa-200711-34.xml",
"http://security.gentoo.org/glsa/glsa-200805-13.xml",
"http://www.debian.org/security/2008/dsa-1613",
"http://www.libgd.org/ReleaseNote020035",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164",
"http://www.novell.com/linux/security/advisories/2007_15_sr.html",
"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html",
"http://www.redhat.com/support/errata/RHSA-2008-0146.html",
"http://www.securityfocus.com/archive/1/478796/100/0/threaded",
"http://www.securityfocus.com/bid/24651",
"http://www.trustix.org/errata/2007/0024/",
"http://www.vupen.com/english/advisories/2011/0022",
"https://access.redhat.com/security/cve/CVE-2007-3476",
"https://bugzilla.redhat.com/show_bug.cgi?id=277421",
"https://issues.rpath.com/browse/RPL-1643",
"https://linux.oracle.com/cve/CVE-2007-3476.html",
"https://linux.oracle.com/errata/ELSA-2008-0146.html",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348"
],
"PublishedDate": "2007-06-28T18:30:00Z",
"LastModifiedDate": "2018-10-16T16:50:00Z"
},
{
"VulnerabilityID": "CVE-2007-3477",
"PkgName": "libwmf-dev",
"InstalledVersion": "0.2.8.4-17",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-3477",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "gd: arc drawing functions can consume large amount of CPU time",
"Description": "The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
"http://bugs.libgd.org/?do=details&task_id=74",
"http://bugs.libgd.org/?do=details&task_id=92",
"http://fedoranews.org/updates/FEDORA-2007-205.shtml",
"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html",
"http://osvdb.org/42062",
"http://secunia.com/advisories/25860",
"http://secunia.com/advisories/26272",
"http://secunia.com/advisories/26390",
"http://secunia.com/advisories/26415",
"http://secunia.com/advisories/26467",
"http://secunia.com/advisories/26663",
"http://secunia.com/advisories/26766",
"http://secunia.com/advisories/26856",
"http://secunia.com/advisories/30168",
"http://secunia.com/advisories/31168",
"http://secunia.com/advisories/42813",
"http://security.gentoo.org/glsa/glsa-200708-05.xml",
"http://security.gentoo.org/glsa/glsa-200711-34.xml",
"http://security.gentoo.org/glsa/glsa-200805-13.xml",
"http://www.debian.org/security/2008/dsa-1613",
"http://www.libgd.org/ReleaseNote020035",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164",
"http://www.novell.com/linux/security/advisories/2007_15_sr.html",
"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html",
"http://www.securityfocus.com/archive/1/478796/100/0/threaded",
"http://www.securityfocus.com/bid/24651",
"http://www.trustix.org/errata/2007/0024/",
"http://www.vupen.com/english/advisories/2011/0022",
"https://access.redhat.com/security/cve/CVE-2007-3477",
"https://bugzilla.redhat.com/show_bug.cgi?id=277421",
"https://issues.rpath.com/browse/RPL-1643"
],
"PublishedDate": "2007-06-28T18:30:00Z",
"LastModifiedDate": "2018-10-16T16:50:00Z"
},
{
"VulnerabilityID": "CVE-2007-3996",
"PkgName": "libwmf-dev",
"InstalledVersion": "0.2.8.4-17",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-3996",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "php multiple integer overflows in gd",
"Description": "Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.",
"Severity": "LOW",
"CweIDs": [
"CWE-189"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V2Score": 6.8
}
},
"References": [
"http://bugs.gentoo.org/show_bug.cgi?id=201546",
"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html",
"http://rhn.redhat.com/errata/RHSA-2007-0889.html",
"http://secunia.com/advisories/26642",
"http://secunia.com/advisories/26822",
"http://secunia.com/advisories/26838",
"http://secunia.com/advisories/26871",
"http://secunia.com/advisories/26895",
"http://secunia.com/advisories/26930",
"http://secunia.com/advisories/26967",
"http://secunia.com/advisories/27102",
"http://secunia.com/advisories/27351",
"http://secunia.com/advisories/27377",
"http://secunia.com/advisories/27545",
"http://secunia.com/advisories/28009",
"http://secunia.com/advisories/28147",
"http://secunia.com/advisories/28658",
"http://secunia.com/advisories/31168",
"http://security.gentoo.org/glsa/glsa-200712-13.xml",
"http://securityreason.com/securityalert/3103",
"http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/",
"http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/",
"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm",
"http://www.debian.org/security/2008/dsa-1613",
"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187",
"http://www.php.net/ChangeLog-5.php#5.2.4",
"http://www.php.net/releases/5_2_4.php",
"http://www.redhat.com/support/errata/RHSA-2007-0888.html",
"http://www.redhat.com/support/errata/RHSA-2007-0890.html",
"http://www.redhat.com/support/errata/RHSA-2007-0891.html",
"http://www.trustix.org/errata/2007/0026/",
"http://www.ubuntu.com/usn/usn-557-1",
"http://www.vupen.com/english/advisories/2007/3023",
"https://access.redhat.com/security/cve/CVE-2007-3996",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/36382",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/36383",
"https://issues.rpath.com/browse/RPL-1693",
"https://issues.rpath.com/browse/RPL-1702",
"https://linux.oracle.com/cve/CVE-2007-3996.html",
"https://linux.oracle.com/errata/ELSA-2007-0890.html",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147",
"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"
],
"PublishedDate": "2007-09-04T18:17:00Z",
"LastModifiedDate": "2017-09-29T01:29:00Z"
},
{
"VulnerabilityID": "CVE-2009-3546",
"PkgName": "libwmf-dev",
"InstalledVersion": "0.2.8.4-17",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2009-3546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "gd: insufficient input validation in _gdGetColors()",
"Description": "The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"V2Score": 9.3
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"V2Score": 4.4
}
},
"References": [
"http://marc.info/?l=oss-security&m=125562113503923&w=2",
"http://secunia.com/advisories/37069",
"http://secunia.com/advisories/37080",
"http://secunia.com/advisories/38055",
"http://svn.php.net/viewvc?view=revision&revision=289557",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:285",
"http://www.openwall.com/lists/oss-security/2009/11/20/5",
"http://www.redhat.com/support/errata/RHSA-2010-0003.html",
"http://www.securityfocus.com/bid/36712",
"http://www.vupen.com/english/advisories/2009/2929",
"http://www.vupen.com/english/advisories/2009/2930",
"https://access.redhat.com/security/cve/CVE-2009-3546",
"https://linux.oracle.com/cve/CVE-2009-3546.html",
"https://linux.oracle.com/errata/ELSA-2010-0040.html",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199"
],
"PublishedDate": "2009-10-19T20:00:00Z",
"LastModifiedDate": "2017-09-19T01:29:00Z"
},
{
"VulnerabilityID": "CVE-2007-3476",
"PkgName": "libwmf0.2-7",
"InstalledVersion": "0.2.8.4-17",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-3476",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libgd Denial of service by corrupted GIF images",
"Description": "Array index error in gd_gif_in.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash and heap corruption) via large color index values in crafted image data, which results in a segmentation fault.",
"Severity": "LOW",
"CweIDs": [
"CWE-189"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 4.3
}
},
"References": [
"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
"http://bugs.libgd.org/?do=details&task_id=87",
"http://fedoranews.org/updates/FEDORA-2007-205.shtml",
"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html",
"http://osvdb.org/37741",
"http://secunia.com/advisories/25860",
"http://secunia.com/advisories/26272",
"http://secunia.com/advisories/26390",
"http://secunia.com/advisories/26415",
"http://secunia.com/advisories/26467",
"http://secunia.com/advisories/26663",
"http://secunia.com/advisories/26766",
"http://secunia.com/advisories/26856",
"http://secunia.com/advisories/29157",
"http://secunia.com/advisories/30168",
"http://secunia.com/advisories/31168",
"http://secunia.com/advisories/42813",
"http://security.gentoo.org/glsa/glsa-200708-05.xml",
"http://security.gentoo.org/glsa/glsa-200711-34.xml",
"http://security.gentoo.org/glsa/glsa-200805-13.xml",
"http://www.debian.org/security/2008/dsa-1613",
"http://www.libgd.org/ReleaseNote020035",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164",
"http://www.novell.com/linux/security/advisories/2007_15_sr.html",
"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html",
"http://www.redhat.com/support/errata/RHSA-2008-0146.html",
"http://www.securityfocus.com/archive/1/478796/100/0/threaded",
"http://www.securityfocus.com/bid/24651",
"http://www.trustix.org/errata/2007/0024/",
"http://www.vupen.com/english/advisories/2011/0022",
"https://access.redhat.com/security/cve/CVE-2007-3476",
"https://bugzilla.redhat.com/show_bug.cgi?id=277421",
"https://issues.rpath.com/browse/RPL-1643",
"https://linux.oracle.com/cve/CVE-2007-3476.html",
"https://linux.oracle.com/errata/ELSA-2008-0146.html",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348"
],
"PublishedDate": "2007-06-28T18:30:00Z",
"LastModifiedDate": "2018-10-16T16:50:00Z"
},
{
"VulnerabilityID": "CVE-2007-3477",
"PkgName": "libwmf0.2-7",
"InstalledVersion": "0.2.8.4-17",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-3477",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "gd: arc drawing functions can consume large amount of CPU time",
"Description": "The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
"http://bugs.libgd.org/?do=details&task_id=74",
"http://bugs.libgd.org/?do=details&task_id=92",
"http://fedoranews.org/updates/FEDORA-2007-205.shtml",
"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html",
"http://osvdb.org/42062",
"http://secunia.com/advisories/25860",
"http://secunia.com/advisories/26272",
"http://secunia.com/advisories/26390",
"http://secunia.com/advisories/26415",
"http://secunia.com/advisories/26467",
"http://secunia.com/advisories/26663",
"http://secunia.com/advisories/26766",
"http://secunia.com/advisories/26856",
"http://secunia.com/advisories/30168",
"http://secunia.com/advisories/31168",
"http://secunia.com/advisories/42813",
"http://security.gentoo.org/glsa/glsa-200708-05.xml",
"http://security.gentoo.org/glsa/glsa-200711-34.xml",
"http://security.gentoo.org/glsa/glsa-200805-13.xml",
"http://www.debian.org/security/2008/dsa-1613",
"http://www.libgd.org/ReleaseNote020035",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164",
"http://www.novell.com/linux/security/advisories/2007_15_sr.html",
"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html",
"http://www.securityfocus.com/archive/1/478796/100/0/threaded",
"http://www.securityfocus.com/bid/24651",
"http://www.trustix.org/errata/2007/0024/",
"http://www.vupen.com/english/advisories/2011/0022",
"https://access.redhat.com/security/cve/CVE-2007-3477",
"https://bugzilla.redhat.com/show_bug.cgi?id=277421",
"https://issues.rpath.com/browse/RPL-1643"
],
"PublishedDate": "2007-06-28T18:30:00Z",
"LastModifiedDate": "2018-10-16T16:50:00Z"
},
{
"VulnerabilityID": "CVE-2007-3996",
"PkgName": "libwmf0.2-7",
"InstalledVersion": "0.2.8.4-17",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-3996",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "php multiple integer overflows in gd",
"Description": "Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.",
"Severity": "LOW",
"CweIDs": [
"CWE-189"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V2Score": 6.8
}
},
"References": [
"http://bugs.gentoo.org/show_bug.cgi?id=201546",
"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html",
"http://rhn.redhat.com/errata/RHSA-2007-0889.html",
"http://secunia.com/advisories/26642",
"http://secunia.com/advisories/26822",
"http://secunia.com/advisories/26838",
"http://secunia.com/advisories/26871",
"http://secunia.com/advisories/26895",
"http://secunia.com/advisories/26930",
"http://secunia.com/advisories/26967",
"http://secunia.com/advisories/27102",
"http://secunia.com/advisories/27351",
"http://secunia.com/advisories/27377",
"http://secunia.com/advisories/27545",
"http://secunia.com/advisories/28009",
"http://secunia.com/advisories/28147",
"http://secunia.com/advisories/28658",
"http://secunia.com/advisories/31168",
"http://security.gentoo.org/glsa/glsa-200712-13.xml",
"http://securityreason.com/securityalert/3103",
"http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/",
"http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/",
"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm",
"http://www.debian.org/security/2008/dsa-1613",
"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187",
"http://www.php.net/ChangeLog-5.php#5.2.4",
"http://www.php.net/releases/5_2_4.php",
"http://www.redhat.com/support/errata/RHSA-2007-0888.html",
"http://www.redhat.com/support/errata/RHSA-2007-0890.html",
"http://www.redhat.com/support/errata/RHSA-2007-0891.html",
"http://www.trustix.org/errata/2007/0026/",
"http://www.ubuntu.com/usn/usn-557-1",
"http://www.vupen.com/english/advisories/2007/3023",
"https://access.redhat.com/security/cve/CVE-2007-3996",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/36382",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/36383",
"https://issues.rpath.com/browse/RPL-1693",
"https://issues.rpath.com/browse/RPL-1702",
"https://linux.oracle.com/cve/CVE-2007-3996.html",
"https://linux.oracle.com/errata/ELSA-2007-0890.html",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147",
"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"
],
"PublishedDate": "2007-09-04T18:17:00Z",
"LastModifiedDate": "2017-09-29T01:29:00Z"
},
{
"VulnerabilityID": "CVE-2009-3546",
"PkgName": "libwmf0.2-7",
"InstalledVersion": "0.2.8.4-17",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2009-3546",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "gd: insufficient input validation in _gdGetColors()",
"Description": "The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.",
"Severity": "LOW",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"V2Score": 9.3
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"V2Score": 4.4
}
},
"References": [
"http://marc.info/?l=oss-security&m=125562113503923&w=2",
"http://secunia.com/advisories/37069",
"http://secunia.com/advisories/37080",
"http://secunia.com/advisories/38055",
"http://svn.php.net/viewvc?view=revision&revision=289557",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:285",
"http://www.openwall.com/lists/oss-security/2009/11/20/5",
"http://www.redhat.com/support/errata/RHSA-2010-0003.html",
"http://www.securityfocus.com/bid/36712",
"http://www.vupen.com/english/advisories/2009/2929",
"http://www.vupen.com/english/advisories/2009/2930",
"https://access.redhat.com/security/cve/CVE-2009-3546",
"https://linux.oracle.com/cve/CVE-2009-3546.html",
"https://linux.oracle.com/errata/ELSA-2010-0040.html",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199"
],
"PublishedDate": "2009-10-19T20:00:00Z",
"LastModifiedDate": "2017-09-19T01:29:00Z"
},
{
"VulnerabilityID": "CVE-2016-3709",
"PkgName": "libxml2",
"InstalledVersion": "2.9.10+dfsg-6.7+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-3709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libxml2: Incorrect server side include parsing can lead to XSS",
"Description": "Possible cross-site scripting vulnerability in libxml after commit 960f0e2.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-79"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"V3Score": 6.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2016-3709",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3709",
"https://mail.gnome.org/archives/xml/2018-January/msg00010.html",
"https://nvd.nist.gov/vuln/detail/CVE-2016-3709",
"https://ubuntu.com/security/notices/USN-5548-1"
],
"PublishedDate": "2022-07-28T17:15:00Z",
"LastModifiedDate": "2022-08-04T15:50:00Z"
},
{
"VulnerabilityID": "CVE-2016-3709",
"PkgName": "libxml2-dev",
"InstalledVersion": "2.9.10+dfsg-6.7+deb11u2",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-3709",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libxml2: Incorrect server side include parsing can lead to XSS",
"Description": "Possible cross-site scripting vulnerability in libxml after commit 960f0e2.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-79"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"V3Score": 6.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2016-3709",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3709",
"https://mail.gnome.org/archives/xml/2018-January/msg00010.html",
"https://nvd.nist.gov/vuln/detail/CVE-2016-3709",
"https://ubuntu.com/security/notices/USN-5548-1"
],
"PublishedDate": "2022-07-28T17:15:00Z",
"LastModifiedDate": "2022-08-04T15:50:00Z"
},
{
"VulnerabilityID": "CVE-2015-9019",
"PkgName": "libxslt1-dev",
"InstalledVersion": "1.1.34-4+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2015-9019",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libxslt: math.random() in xslt uses unseeded randomness",
"Description": "In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs.",
"Severity": "LOW",
"CweIDs": [
"CWE-330"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2015-9019",
"https://bugzilla.gnome.org/show_bug.cgi?id=758400",
"https://bugzilla.suse.com/show_bug.cgi?id=934119"
],
"PublishedDate": "2017-04-05T21:59:00Z",
"LastModifiedDate": "2017-04-11T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2015-9019",
"PkgName": "libxslt1.1",
"InstalledVersion": "1.1.34-4+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2015-9019",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "libxslt: math.random() in xslt uses unseeded randomness",
"Description": "In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs.",
"Severity": "LOW",
"CweIDs": [
"CWE-330"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2015-9019",
"https://bugzilla.gnome.org/show_bug.cgi?id=758400",
"https://bugzilla.suse.com/show_bug.cgi?id=934119"
],
"PublishedDate": "2017-04-05T21:59:00Z",
"LastModifiedDate": "2017-04-11T19:57:00Z"
},
{
"VulnerabilityID": "CVE-2013-7445",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-7445",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: memory exhaustion via crafted Graphics Execution Manager (GEM) objects",
"Description": "The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated by JavaScript code that creates many CANVAS elements for rendering by Chrome or Firefox.",
"Severity": "HIGH",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V2Score": 7.8
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V2Score": 4.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2013-7445",
"https://bugzilla.kernel.org/show_bug.cgi?id=60533",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445",
"https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)"
],
"PublishedDate": "2015-10-16T01:59:00Z",
"LastModifiedDate": "2015-10-16T16:22:00Z"
},
{
"VulnerabilityID": "CVE-2019-19378",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-19378",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: out-of-bounds write in index_rbio_pages in fs/btrfs/raid56.c",
"Description": "In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image can lead to slab-out-of-bounds write access in index_rbio_pages in fs/btrfs/raid56.c.",
"Severity": "HIGH",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-19378",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378",
"https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378",
"https://security.netapp.com/advisory/ntap-20200103-0001/"
],
"PublishedDate": "2019-11-29T17:15:00Z",
"LastModifiedDate": "2020-01-03T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-19449",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-19449",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c",
"Description": "In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated).",
"Severity": "HIGH",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
"V3Score": 7.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-19449",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449",
"https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449",
"https://security.netapp.com/advisory/ntap-20200103-0001/",
"https://ubuntu.com/security/notices/USN-5120-1",
"https://ubuntu.com/security/notices/USN-5136-1",
"https://ubuntu.com/security/notices/USN-5137-1",
"https://ubuntu.com/security/notices/USN-5137-2",
"https://ubuntu.com/security/notices/USN-5343-1"
],
"PublishedDate": "2019-12-08T02:15:00Z",
"LastModifiedDate": "2020-01-03T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-19814",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-19814",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: out-of-bounds write in __remove_dirty_segment in fs/f2fs/segment.c",
"Description": "In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.",
"Severity": "HIGH",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 9.3,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H",
"V3Score": 7.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-19814",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814",
"https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814",
"https://security.netapp.com/advisory/ntap-20200103-0001/"
],
"PublishedDate": "2019-12-17T06:15:00Z",
"LastModifiedDate": "2020-01-03T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-12362",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-12362",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Integer overflow in Intel(R) Graphics Drivers",
"Description": "Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 4.6,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-12362",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362",
"https://linux.oracle.com/cve/CVE-2020-12362.html",
"https://linux.oracle.com/errata/ELSA-2021-9434.html",
"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
],
"PublishedDate": "2021-02-17T14:15:00Z",
"LastModifiedDate": "2021-02-22T18:07:00Z"
},
{
"VulnerabilityID": "CVE-2021-3714",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3714",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Remote Page Deduplication Attacks",
"Description": "A flaw was found in the Linux kernels memory deduplication mechanism. Previous work has shown that memory deduplication can be attacked via a local exploitation mechanism. The same technique can be used if an attacker can upload page sized files and detect the change in access time from a networked service to determine if the page has been merged.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"V3Score": 5.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3714",
"https://arxiv.org/abs/2111.08553",
"https://arxiv.org/pdf/2111.08553.pdf",
"https://bugzilla.redhat.com/show_bug.cgi?id=1931327"
],
"PublishedDate": "2022-08-23T16:15:00Z",
"LastModifiedDate": "2022-08-29T18:21:00Z"
},
{
"VulnerabilityID": "CVE-2021-3847",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3847",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: low-privileged user privileges escalation",
"Description": "An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system.",
"Severity": "HIGH",
"CweIDs": [
"CWE-281"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.2,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 6.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3847",
"https://bugzilla.redhat.com/show_bug.cgi?id=2009704",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3847",
"https://www.openwall.com/lists/oss-security/2021/10/14/3"
],
"PublishedDate": "2022-04-01T23:15:00Z",
"LastModifiedDate": "2022-04-11T20:31:00Z"
},
{
"VulnerabilityID": "CVE-2021-3864",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3864",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: descendant's dumpable setting with certain SUID binaries",
"Description": "A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3864",
"https://bugzilla.redhat.com/show_bug.cgi?id=2015046",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864",
"https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com",
"https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com/",
"https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/",
"https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com",
"https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com/",
"https://security-tracker.debian.org/tracker/CVE-2021-3864",
"https://www.openwall.com/lists/oss-security/2021/10/20/2"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-09-01T15:56:00Z"
},
{
"VulnerabilityID": "CVE-2021-39686",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39686",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: race condition in the Android binder driver could lead to incorrect security checks",
"Description": "In several functions of binder.c, there is a possible way to represent the wrong domain to SELinux due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-200688826References: Upstream kernel",
"Severity": "HIGH",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 6.9,
"V3Score": 7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 8.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-39686",
"https://android.googlesource.com/kernel/common/+/11db2de0af2a",
"https://android.googlesource.com/kernel/common/+/3af7a2f61023",
"https://android.googlesource.com/kernel/common/+/a4eacf3227bd",
"https://android.googlesource.com/kernel/common/+/d49297739550",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686",
"https://source.android.com/security/bulletin/2022-03-01"
],
"PublishedDate": "2022-03-16T15:15:00Z",
"LastModifiedDate": "2022-07-12T17:42:00Z"
},
{
"VulnerabilityID": "CVE-2021-4037",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4037",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: security regression for CVE-2018-13405",
"Description": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json",
"https://access.redhat.com/security/cve/CVE-2021-4037",
"https://bugzilla.redhat.com/show_bug.cgi?id=2004810",
"https://bugzilla.redhat.com/show_bug.cgi?id=2027239",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037",
"https://errata.almalinux.org/8/ALSA-2022-1988.html",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848",
"https://linux.oracle.com/cve/CVE-2021-4037.html",
"https://linux.oracle.com/errata/ELSA-2022-1988.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-4037"
],
"PublishedDate": "2022-08-24T16:15:00Z",
"LastModifiedDate": "2022-08-29T16:21:00Z"
},
{
"VulnerabilityID": "CVE-2021-4204",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4204",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: improper input validation may lead to privilege escalation",
"Description": "An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.",
"Severity": "HIGH",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4204",
"https://bugzilla.redhat.com/show_bug.cgi?id=2039178",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204",
"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/impish/commit/?id=53fb7741ff9d546174dbb585957b4f8b6afbdb83",
"https://security-tracker.debian.org/tracker/CVE-2021-4204",
"https://ubuntu.com/security/notices/USN-5217-1",
"https://ubuntu.com/security/notices/USN-5218-1",
"https://ubuntu.com/security/notices/USN-5219-1",
"https://www.openwall.com/lists/oss-security/2022/01/11/4"
],
"PublishedDate": "2022-08-24T16:15:00Z",
"LastModifiedDate": "2022-08-29T13:22:00Z"
},
{
"VulnerabilityID": "CVE-2022-0400",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0400",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Out of bounds read in the smc protocol stack",
"Description": "An out-of-bounds read vulnerability was discovered in linux kernel in the smc protocol stack, causing remote dos.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.9
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0400",
"https://bugzilla.redhat.com/show_bug.cgi?id=2040604",
"https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)",
"https://bugzilla.redhat.com/show_bug.cgi?id=2044575",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-01T20:18:00Z"
},
{
"VulnerabilityID": "CVE-2022-0500",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0500",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges",
"Description": "A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.",
"Severity": "HIGH",
"CweIDs": [
"CWE-119"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.2,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0500",
"https://bugzilla.redhat.com/show_bug.cgi?id=2044578",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0500",
"https://security.netapp.com/advisory/ntap-20220519-0001/",
"https://ubuntu.com/security/notices/USN-5518-1",
"https://ubuntu.com/security/notices/USN-5564-1"
],
"PublishedDate": "2022-03-25T19:15:00Z",
"LastModifiedDate": "2022-07-21T12:34:00Z"
},
{
"VulnerabilityID": "CVE-2022-1247",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1247",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: A race condition bug in rose_connect()",
"Description": "An issue found in linux-kernel that leads to a race condition in rose_connect(). The rose driver uses rose_neigh->use to represent how many objects are using the rose_neigh. When a user wants to delete a rose_route via rose_ioctl(), the rose driver calls rose_del_node() and removes neighbours only if their “count” and “use” are zero.",
"Severity": "HIGH",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1247",
"https://bugzilla.redhat.com/show_bug.cgi?id=2066799"
],
"PublishedDate": "2022-08-31T16:15:00Z",
"LastModifiedDate": "2022-09-06T19:24:00Z"
},
{
"VulnerabilityID": "CVE-2022-2961",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2961",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: race condition in rose_bind()",
"Description": "A use-after-free flaw was found in the Linux kernel’s PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2961",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2961"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-02T19:41:00Z"
},
{
"VulnerabilityID": "CVE-2022-2978",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2978",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: use-after-free in nilfs_mdt_destroy",
"Description": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2978",
"https://lore.kernel.org/linux-fsdevel/20220816040859.659129-1-dzm91@hust.edu.cn/T/#u"
],
"PublishedDate": "2022-08-24T16:15:00Z",
"LastModifiedDate": "2022-08-30T19:19:00Z"
},
{
"VulnerabilityID": "CVE-2022-3176",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3176",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: use-after-free in io_uring for POLLFREE notification with Signalfd_poll() and binder_poll()",
"Description": "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3176",
"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit?h=linux-5.4.y&id=fc78b2fc21f10c4c9c4d5d659a685710ffa63659",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc78b2fc21f10c4c9c4d5d659a685710ffa63659",
"https://kernel.dance/#fc78b2fc21f10c4c9c4d5d659a685710ffa63659"
],
"PublishedDate": "2022-09-16T14:15:00Z",
"LastModifiedDate": "2022-09-17T02:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-39189",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-39189",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning",
"Description": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-39189",
"https://bugs.chromium.org/p/project-zero/issues/detail?id=2309",
"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189",
"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736",
"https://git.kernel.org/linus/6cd88243c7e03845a450795e134b488fc2afb736 (5.19-rc2)",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736",
"https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736",
"https://nvd.nist.gov/vuln/detail/CVE-2022-39189"
],
"PublishedDate": "2022-09-02T05:15:00Z",
"LastModifiedDate": "2022-09-08T18:37:00Z"
},
{
"VulnerabilityID": "CVE-2022-39842",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-39842",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write",
"Description": "An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur.",
"Severity": "HIGH",
"CweIDs": [
"CWE-190"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-39842",
"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842",
"https://git.kernel.org/linus/a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7 (5.19-rc4)",
"https://github.com/torvalds/linux/commit/a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7",
"https://nvd.nist.gov/vuln/detail/CVE-2022-39842"
],
"PublishedDate": "2022-09-05T07:15:00Z",
"LastModifiedDate": "2022-09-09T03:38:00Z"
},
{
"VulnerabilityID": "CVE-2019-15213",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-15213",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: use-after-free caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c",
"Description": "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 4.6
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.3
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html",
"http://www.openwall.com/lists/oss-security/2019/08/20/2",
"https://access.redhat.com/security/cve/CVE-2019-15213",
"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7",
"https://linux.oracle.com/cve/CVE-2019-15213.html",
"https://linux.oracle.com/errata/ELSA-2019-4872.html",
"https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/",
"https://security.netapp.com/advisory/ntap-20190905-0002/",
"https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced"
],
"PublishedDate": "2019-08-19T22:15:00Z",
"LastModifiedDate": "2019-09-06T00:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-15794",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-15794",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow",
"Description": "Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma->vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-672"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.2,
"V3Score": 6.7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 6.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-15794",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794",
"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635",
"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3",
"https://ubuntu.com/security/notices/USN-4208-1",
"https://ubuntu.com/security/notices/USN-4209-1",
"https://usn.ubuntu.com/usn/usn-4208-1",
"https://usn.ubuntu.com/usn/usn-4209-1"
],
"PublishedDate": "2020-04-24T00:15:00Z",
"LastModifiedDate": "2020-05-26T15:18:00Z"
},
{
"VulnerabilityID": "CVE-2019-16089",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-16089",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Improper return check in nbd_genl_status function in drivers/block/nbd.c",
"Description": "An issue was discovered in the Linux kernel through 5.2.13. nbd_genl_status in drivers/block/nbd.c does not check the nla_nest_start_noflag return value.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.7,
"V3Score": 4.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-16089",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089",
"https://linux.oracle.com/cve/CVE-2019-16089.html",
"https://linux.oracle.com/errata/ELSA-2020-5913.html",
"https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/",
"https://lore.kernel.org/patchwork/patch/1106884/",
"https://lore.kernel.org/patchwork/patch/1126650/",
"https://security.netapp.com/advisory/ntap-20191004-0001/",
"https://support.f5.com/csp/article/K03814795?utm_source=f5support&utm_medium=RSS",
"https://ubuntu.com/security/notices/USN-4414-1",
"https://ubuntu.com/security/notices/USN-4425-1",
"https://ubuntu.com/security/notices/USN-4439-1",
"https://ubuntu.com/security/notices/USN-4440-1",
"https://usn.ubuntu.com/4414-1/",
"https://usn.ubuntu.com/4425-1/",
"https://usn.ubuntu.com/4439-1/",
"https://usn.ubuntu.com/4440-1/"
],
"PublishedDate": "2019-09-06T23:15:00Z",
"LastModifiedDate": "2020-08-04T21:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-20794",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-20794",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: task processes not being properly ended could lead to resource exhaustion",
"Description": "An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.7,
"V3Score": 4.7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2020/08/24/1",
"https://access.redhat.com/security/cve/CVE-2019-20794",
"https://github.com/sargun/fuse-example",
"https://nvd.nist.gov/vuln/detail/CVE-2019-20794",
"https://security.netapp.com/advisory/ntap-20200608-0001/",
"https://sourceforge.net/p/fuse/mailman/message/36598753/"
],
"PublishedDate": "2020-05-09T18:15:00Z",
"LastModifiedDate": "2021-07-21T11:39:00Z"
},
{
"VulnerabilityID": "CVE-2020-12363",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-12363",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Improper input validation in some Intel(R) Graphics Drivers",
"Description": "Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-12363",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363",
"https://linux.oracle.com/cve/CVE-2020-12363.html",
"https://linux.oracle.com/errata/ELSA-2021-2314.html",
"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
],
"PublishedDate": "2021-02-17T14:15:00Z",
"LastModifiedDate": "2021-02-22T19:01:00Z"
},
{
"VulnerabilityID": "CVE-2020-12364",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-12364",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers",
"Description": "Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-12364",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364",
"https://linux.oracle.com/cve/CVE-2020-12364.html",
"https://linux.oracle.com/errata/ELSA-2021-2314.html",
"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
],
"PublishedDate": "2021-02-17T14:15:00Z",
"LastModifiedDate": "2021-02-22T19:09:00Z"
},
{
"VulnerabilityID": "CVE-2020-14304",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-14304",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: ethtool when reading eeprom of device could lead to memory leak",
"Description": "A memory disclosure flaw was found in the Linux kernel's ethernet drivers, in the way it read data from the EEPROM of the device. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-755"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 2.1,
"V3Score": 4.4
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-14304",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304",
"https://linux.oracle.com/cve/CVE-2020-14304.html",
"https://linux.oracle.com/errata/ELSA-2021-9410.html",
"https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/"
],
"PublishedDate": "2020-09-15T20:15:00Z",
"LastModifiedDate": "2022-07-25T11:46:00Z"
},
{
"VulnerabilityID": "CVE-2020-15802",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-15802",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "hardware: BLURtooth: \"Dual mode\" hardware using CTKD are vulnerable to key overwrite",
"Description": "Devices supporting Bluetooth before 5.1 may allow man-in-the-middle attacks, aka BLURtooth. Cross Transport Key Derivation in Bluetooth Core Specification v4.2 and v5.0 may permit an unauthenticated user to establish a bonding with one transport, either LE or BR/EDR, and replace a bonding already established on the opposing transport, BR/EDR or LE, potentially overwriting an authenticated key with an unauthenticated key, or a key with greater entropy with one with less.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-287"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 4.3,
"V3Score": 5.9
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-15802",
"https://arxiv.org/abs/2009.11776",
"https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709",
"https://hexhive.epfl.ch/BLURtooth/",
"https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html",
"https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/",
"https://www.kb.cert.org/vuls/id/589825",
"https://www.kb.cert.org/vuls/id/589825/"
],
"PublishedDate": "2020-09-11T14:15:00Z",
"LastModifiedDate": "2020-11-13T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-24504",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-24504",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"Description": "Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux before version 1.0.4 may allow an authenticated user to potentially enable denial of service via local access.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-24504",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504",
"https://linux.oracle.com/cve/CVE-2020-24504.html",
"https://linux.oracle.com/errata/ELSA-2022-9368.html",
"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
],
"PublishedDate": "2021-02-17T14:15:00Z",
"LastModifiedDate": "2021-02-22T15:28:00Z"
},
{
"VulnerabilityID": "CVE-2020-26555",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-26555",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack",
"Description": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-863"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:A/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 4.8,
"V3Score": 5.4
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 5.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-26555",
"https://bugzilla.redhat.com/show_bug.cgi?id=1918601",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555",
"https://kb.cert.org/vuls/id/799380",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/",
"https://ubuntu.com/security/notices/USN-5343-1",
"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/",
"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/",
"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html"
],
"PublishedDate": "2021-05-24T18:15:00Z",
"LastModifiedDate": "2021-06-08T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-36516",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-36516",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: an off-path attacker may inject data or terminate a victim's TCP session",
"Description": "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-327"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L",
"V2Score": 4.9,
"V3Score": 5.9
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L",
"V3Score": 5.9
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-36516",
"https://dl.acm.org/doi/10.1145/3372297.3417884",
"https://linux.oracle.com/cve/CVE-2020-36516.html",
"https://linux.oracle.com/errata/ELSA-2022-9761.html",
"https://security.netapp.com/advisory/ntap-20220331-0003/",
"https://www.spinics.net/lists/netdev/msg795642.html"
],
"PublishedDate": "2022-02-26T04:15:00Z",
"LastModifiedDate": "2022-03-31T09:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-33061",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-33061",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may lead to DoS",
"Description": "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.",
"Severity": "MEDIUM",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-33061",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33061",
"https://security.netapp.com/advisory/ntap-20220210-0010/",
"https://ubuntu.com/security/notices/USN-5577-1",
"https://ubuntu.com/security/notices/USN-5589-1",
"https://ubuntu.com/security/notices/USN-5592-1",
"https://ubuntu.com/security/notices/USN-5594-1",
"https://ubuntu.com/security/notices/USN-5595-1",
"https://ubuntu.com/security/notices/USN-5596-1",
"https://ubuntu.com/security/notices/USN-5599-1",
"https://ubuntu.com/security/notices/USN-5600-1",
"https://ubuntu.com/security/notices/USN-5602-1",
"https://ubuntu.com/security/notices/USN-5603-1",
"https://ubuntu.com/security/notices/USN-5605-1",
"https://ubuntu.com/security/notices/USN-5616-1",
"https://ubuntu.com/security/notices/USN-5623-1",
"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html"
],
"PublishedDate": "2022-02-09T23:15:00Z",
"LastModifiedDate": "2022-02-15T20:48:00Z"
},
{
"VulnerabilityID": "CVE-2021-3669",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3669",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts",
"Description": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json",
"https://access.redhat.com/security/cve/CVE-2021-3669",
"https://bugzilla.redhat.com/show_bug.cgi?id=1980619",
"https://bugzilla.redhat.com/show_bug.cgi?id=1986473",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669",
"https://errata.almalinux.org/8/ALSA-2022-1988.html",
"https://linux.oracle.com/cve/CVE-2021-3669.html",
"https://linux.oracle.com/errata/ELSA-2022-9829.html",
"https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3669",
"https://security-tracker.debian.org/tracker/CVE-2021-3669"
],
"PublishedDate": "2022-08-26T16:15:00Z",
"LastModifiedDate": "2022-08-29T17:38:00Z"
},
{
"VulnerabilityID": "CVE-2021-3759",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3759",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks",
"Description": "A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json",
"https://access.redhat.com/security/cve/CVE-2021-3759",
"https://bugzilla.redhat.com/show_bug.cgi?id=1999675",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759",
"https://errata.almalinux.org/8/ALSA-2022-1988.html",
"https://linux.oracle.com/cve/CVE-2021-3759.html",
"https://linux.oracle.com/errata/ELSA-2022-1988.html",
"https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/",
"https://ubuntu.com/security/notices/USN-5115-1",
"https://ubuntu.com/security/notices/USN-5117-1",
"https://ubuntu.com/security/notices/USN-5120-1",
"https://ubuntu.com/security/notices/USN-5135-1",
"https://ubuntu.com/security/notices/USN-5136-1",
"https://ubuntu.com/security/notices/USN-5137-1",
"https://ubuntu.com/security/notices/USN-5137-2"
],
"PublishedDate": "2022-08-23T16:15:00Z",
"LastModifiedDate": "2022-08-25T12:52:00Z"
},
{
"VulnerabilityID": "CVE-2021-4023",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4023",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Improper IO-uring request cancellation operation allows local users to cause a crash",
"Description": "A flaw was found in the io-workqueue implementation in the Linux kernel versions prior to 5.15-rc1. The kernel can panic when an improper cancellation operation triggers the submission of new io-uring operations during a shortage of free space. This flaw allows a local user with permissions to execute io-uring requests to possibly crash the system.",
"Severity": "MEDIUM",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4023",
"https://bugzilla.redhat.com/show_bug.cgi?id=2026484",
"https://nvd.nist.gov/vuln/detail/CVE-2021-4023"
],
"PublishedDate": "2022-03-10T17:44:00Z",
"LastModifiedDate": "2022-03-15T17:10:00Z"
},
{
"VulnerabilityID": "CVE-2021-4149",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4149",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Improper lock operation in btrfs",
"Description": "A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-667"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4149",
"https://bugzilla.redhat.com/show_bug.cgi?id=2026485",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149",
"https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)",
"https://linux.oracle.com/cve/CVE-2021-4149.html",
"https://linux.oracle.com/errata/ELSA-2022-9348.html",
"https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html",
"https://lkml.org/lkml/2021/10/18/885",
"https://lkml.org/lkml/2021/9/13/2565",
"https://nvd.nist.gov/vuln/detail/CVE-2021-4149",
"https://ubuntu.com/security/notices/USN-5466-1"
],
"PublishedDate": "2022-03-23T20:15:00Z",
"LastModifiedDate": "2022-07-01T14:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-44879",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-44879",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: NULL pointer dereference in folio_mark_dirty() via a crafted f2fs image",
"Description": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-44879",
"https://bugzilla.kernel.org/show_bug.cgi?id=215231",
"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f",
"https://lkml.org/lkml/2022/1/24/4067",
"https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-44879",
"https://ubuntu.com/security/notices/USN-5302-1",
"https://ubuntu.com/security/notices/USN-5383-1",
"https://www.openwall.com/lists/oss-security/2022/02/12/1"
],
"PublishedDate": "2022-02-14T12:15:00Z",
"LastModifiedDate": "2022-02-22T18:26:00Z"
},
{
"VulnerabilityID": "CVE-2022-0171",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0171",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: KVM: cache incoherence issue in SEV API may lead to kernel crash",
"Description": "A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-459"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0171",
"https://bugzilla.redhat.com/show_bug.cgi?id=2038940",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=683412ccf61294d727ead4a73d97397396e69a6b",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0171"
],
"PublishedDate": "2022-08-26T18:15:00Z",
"LastModifiedDate": "2022-09-01T15:27:00Z"
},
{
"VulnerabilityID": "CVE-2022-0480",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0480",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion",
"Description": "A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0480",
"https://bugzilla.redhat.com/show_bug.cgi?id=2049700",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480",
"https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f12156dff2862ac54235fc72703f18770769042",
"https://github.com/kata-containers/kata-containers/issues/3373",
"https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/",
"https://ubuntu.com/security/CVE-2022-0480"
],
"PublishedDate": "2022-08-29T15:15:00Z",
"LastModifiedDate": "2022-09-01T20:19:00Z"
},
{
"VulnerabilityID": "CVE-2022-1280",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1280",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources",
"Description": "A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"V2Score": 3.3,
"V3Score": 6.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1280",
"https://bugzilla.redhat.com/show_bug.cgi?id=2071022",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1280",
"https://linux.oracle.com/cve/CVE-2022-1280.html",
"https://linux.oracle.com/errata/ELSA-2022-9829.html",
"https://twitter.com/spendergrsec/status/1513866037791440896",
"https://www.openwall.com/lists/oss-security/2022/04/12/3",
"https://www.openwall.com/lists/oss-security/2022/04/13/1"
],
"PublishedDate": "2022-04-13T18:15:00Z",
"LastModifiedDate": "2022-04-20T19:46:00Z"
},
{
"VulnerabilityID": "CVE-2022-23825",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-23825",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)",
"Description": "Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-668"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"V2Score": 2.1,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"V3Score": 5.6
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-23825",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLSRW4LLTAT3CZMOYVNTC7YIYGX3KLED/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/",
"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"https://www.debian.org/security/2022/dsa-5184"
],
"PublishedDate": "2022-07-14T20:15:00Z",
"LastModifiedDate": "2022-08-12T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-2663",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2663",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel/netfilter: nf_conntrack_irc message handling issue",
"Description": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"Severity": "MEDIUM",
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V3Score": 5.9
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2663",
"https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/",
"https://www.openwall.com/lists/oss-security/2022/08/30/1"
],
"PublishedDate": "2022-09-01T21:15:00Z",
"LastModifiedDate": "2022-09-07T19:39:00Z"
},
{
"VulnerabilityID": "CVE-2022-2873",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2873",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: an out-of-bounds vulnerability in i2c-ismt driver",
"Description": "An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-131"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.2
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-2873",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873",
"https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2873",
"https://ubuntu.com/security/notices/USN-5594-1",
"https://ubuntu.com/security/notices/USN-5599-1",
"https://ubuntu.com/security/notices/USN-5602-1",
"https://ubuntu.com/security/notices/USN-5616-1",
"https://ubuntu.com/security/notices/USN-5623-1"
],
"PublishedDate": "2022-08-22T15:15:00Z",
"LastModifiedDate": "2022-08-25T02:58:00Z"
},
{
"VulnerabilityID": "CVE-2022-3061",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3061",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: fbdev: i740fb: divide-by-zero in drivers/video/fbdev/i740fb.c could lead to DoS",
"Description": "Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn't check the value of 'pixclock', so it may cause a divide by zero error.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-369"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.2
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3061",
"https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev.git/commit/?id=15cf0b82271b1823fb02ab8c377badba614d95d5"
],
"PublishedDate": "2022-09-01T18:15:00Z",
"LastModifiedDate": "2022-09-07T19:58:00Z"
},
{
"VulnerabilityID": "CVE-2022-3169",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3169",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Kernel: Request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET may cause a DOS.",
"Description": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3169",
"https://bugzilla.kernel.org/show_bug.cgi?id=214771"
],
"PublishedDate": "2022-09-09T15:15:00Z",
"LastModifiedDate": "2022-09-14T17:45:00Z"
},
{
"VulnerabilityID": "CVE-2022-40307",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-40307",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: use-after-free in efi_capsule_write in capsule-loader.c",
"Description": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-40307",
"https://github.com/torvalds/linux/commit/9cb636b5f6a8cc6d1b50809ec8f8d33ae0c84c95",
"https://nvd.nist.gov/vuln/detail/CVE-2022-40307"
],
"PublishedDate": "2022-09-09T05:15:00Z",
"LastModifiedDate": "2022-09-13T20:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-40768",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-40768",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: leak of sensitive information due to uninitialized data in stex_queuecommand_lck() in drivers/scsi/stex.c",
"Description": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-668"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 4
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2022/09/19/1",
"https://access.redhat.com/security/cve/CVE-2022-40768",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/scsi/stex.c",
"https://lore.kernel.org/all/20220908145154.2284098-1-gregkh@linuxfoundation.org/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-40768",
"https://www.openwall.com/lists/oss-security/2022/09/09/1"
],
"PublishedDate": "2022-09-18T05:15:00Z",
"LastModifiedDate": "2022-09-21T15:07:00Z"
},
{
"VulnerabilityID": "CVE-2022-41218",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-41218",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10 ...",
"Description": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2022/09/23/4",
"http://www.openwall.com/lists/oss-security/2022/09/24/1",
"http://www.openwall.com/lists/oss-security/2022/09/24/2",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c",
"https://lore.kernel.org/all/20220908132754.30532-1-tiwai@suse.de/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-41218"
],
"PublishedDate": "2022-09-21T07:15:00Z",
"LastModifiedDate": "2022-09-24T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2004-0230",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2004-0230",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "TCP, when using a large Window Size, makes it easier for remote attack ...",
"Description": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 5
}
},
"References": [
"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc",
"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt",
"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt",
"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt",
"ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc",
"http://kb.juniper.net/JSA10638",
"http://marc.info/?l=bugtraq&m=108302060014745&w=2",
"http://marc.info/?l=bugtraq&m=108506952116653&w=2",
"http://secunia.com/advisories/11440",
"http://secunia.com/advisories/11458",
"http://secunia.com/advisories/22341",
"http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml",
"http://www.kb.cert.org/vuls/id/415294",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.osvdb.org/4030",
"http://www.securityfocus.com/archive/1/449179/100/0/threaded",
"http://www.securityfocus.com/bid/10183",
"http://www.uniras.gov.uk/vuls/2004/236929/index.htm",
"http://www.us-cert.gov/cas/techalerts/TA04-111A.html",
"http://www.vupen.com/english/advisories/2006/3983",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/15886",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10053",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711"
],
"PublishedDate": "2004-08-18T04:00:00Z",
"LastModifiedDate": "2018-10-19T15:30:00Z"
},
{
"VulnerabilityID": "CVE-2005-3660",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-3660",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service ...",
"Description": "Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V2Score": 4.9
}
},
"References": [
"http://secunia.com/advisories/18205",
"http://securityreason.com/securityalert/291",
"http://securitytracker.com/id?1015402",
"http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362",
"http://www.securityfocus.com/bid/16041",
"http://www.vupen.com/english/advisories/2005/3076",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/23835"
],
"PublishedDate": "2005-12-22T23:03:00Z",
"LastModifiedDate": "2017-07-11T01:33:00Z"
},
{
"VulnerabilityID": "CVE-2007-3719",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-3719",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: secretly Monopolizing the CPU Without Superuser Privileges",
"Description": "The process scheduler in the Linux kernel 2.6.16 gives preference to \"interactive\" processes that perform voluntary sleeps, which allows local users to cause a denial of service (CPU consumption), as described in \"Secretly Monopolizing the CPU Without Superuser Privileges.\"",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V2Score": 2.1
}
},
"References": [
"http://osvdb.org/37127",
"http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf",
"https://access.redhat.com/security/cve/CVE-2007-3719"
],
"PublishedDate": "2007-07-12T16:30:00Z",
"LastModifiedDate": "2008-11-15T06:53:00Z"
},
{
"VulnerabilityID": "CVE-2008-2544",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-2544",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: mounting proc readonly on a different mount point silently mounts it rw if the /proc mount is rw",
"Description": "Mounting /proc filesystem via chroot command silently mounts it in read-write mode. The user could bypass the chroot environment and gain write access to files, he would never have otherwise.",
"Severity": "LOW",
"CweIDs": [
"CWE-668"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 2.1,
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2008-2544",
"https://bugzilla.redhat.com/show_bug.cgi?id=213135"
],
"PublishedDate": "2021-05-27T13:15:00Z",
"LastModifiedDate": "2021-06-07T17:39:00Z"
},
{
"VulnerabilityID": "CVE-2008-4609",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-4609",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: TCP protocol vulnerabilities from Outpost24",
"Description": "The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.",
"Severity": "LOW",
"CweIDs": [
"CWE-16"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V2Score": 7.1
}
},
"References": [
"http://blog.robertlee.name/2008/10/conjecture-speculation.html",
"http://insecure.org/stf/tcp-dos-attack-explained.html",
"http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html",
"http://marc.info/?l=bugtraq&m=125856010926699&w=2",
"http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked",
"http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml",
"http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html",
"http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.outpost24.com/news/news-2008-10-02.html",
"http://www.us-cert.gov/cas/techalerts/TA09-251A.html",
"https://access.redhat.com/security/cve/CVE-2008-4609",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048",
"https://nvd.nist.gov/vuln/detail/CVE-2008-4609",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340",
"https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html"
],
"PublishedDate": "2008-10-20T17:59:00Z",
"LastModifiedDate": "2021-07-07T16:08:00Z"
},
{
"VulnerabilityID": "CVE-2010-4563",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: ipv6: sniffer detection",
"Description": "The Linux kernel, when using IPv6, allows remote attackers to determine whether a host is sniffing the network by sending an ICMPv6 Echo Request to a multicast address and determining whether an Echo Reply is sent, as demonstrated by thcping.",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 5
},
"redhat": {
"V2Vector": "AV:A/AC:M/Au:N/C:P/I:N/A:N",
"V2Score": 2.9
}
},
"References": [
"http://seclists.org/dailydave/2011/q2/25",
"http://seclists.org/fulldisclosure/2011/Apr/254",
"https://access.redhat.com/security/cve/CVE-2010-4563",
"https://nvd.nist.gov/vuln/detail/CVE-2010-4563"
],
"PublishedDate": "2012-02-02T17:55:00Z",
"LastModifiedDate": "2012-02-03T05:00:00Z"
},
{
"VulnerabilityID": "CVE-2010-5321",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-5321",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: v4l: videobuf: hotfix a bug on multiple calls to mmap()",
"Description": "Memory leak in drivers/media/video/videobuf-core.c in the videobuf subsystem in the Linux kernel 2.6.x through 4.x allows local users to cause a denial of service (memory consumption) by leveraging /dev/video access for a series of mmap calls that require new allocations, a different vulnerability than CVE-2007-6761. NOTE: as of 2016-06-18, this affects only 11 drivers that have not been updated to use videobuf2 instead of videobuf.",
"Severity": "LOW",
"CweIDs": [
"CWE-772"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 4.3
},
"redhat": {
"V2Vector": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"V2Score": 3.8
}
},
"References": [
"http://linuxtv.org/irc/v4l/index.php?date=2010-07-29",
"http://www.openwall.com/lists/oss-security/2015/02/08/4",
"https://access.redhat.com/security/cve/CVE-2010-5321",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340",
"https://bugzilla.kernel.org/show_bug.cgi?id=120571",
"https://bugzilla.redhat.com/show_bug.cgi?id=620629"
],
"PublishedDate": "2017-04-24T06:59:00Z",
"LastModifiedDate": "2020-05-11T17:11:00Z"
},
{
"VulnerabilityID": "CVE-2011-4915",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-4915",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "fs/proc/base.c in the Linux kernel through 3.1 allows local users to o ...",
"Description": "fs/proc/base.c in the Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /proc/interrupts.",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 2.1,
"V3Score": 5.5
}
},
"References": [
"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201",
"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497",
"http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html",
"http://www.openwall.com/lists/oss-security/2011/11/07/9",
"https://lkml.org/lkml/2011/11/7/340",
"https://seclists.org/oss-sec/2011/q4/571",
"https://security-tracker.debian.org/tracker/CVE-2011-4915",
"https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131"
],
"PublishedDate": "2020-02-20T18:15:00Z",
"LastModifiedDate": "2020-02-25T15:14:00Z"
},
{
"VulnerabilityID": "CVE-2011-4916",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-4916",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Linux kernel through 3.1 allows local users to obtain sensitive keystr ...",
"Description": "Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /dev/pts/ and /dev/tty*.",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 2.1,
"V3Score": 5.5
}
},
"References": [
"https://lkml.org/lkml/2011/11/7/355",
"https://www.openwall.com/lists/oss-security/2011/12/28/3"
],
"PublishedDate": "2022-07-12T21:15:00Z",
"LastModifiedDate": "2022-07-20T09:02:00Z"
},
{
"VulnerabilityID": "CVE-2011-4917",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-4917",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "In the Linux kernel through 3.1 there is an information disclosure iss ...",
"Description": "In the Linux kernel through 3.1 there is an information disclosure issue via /proc/stat.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 2.1,
"V3Score": 5.5
}
},
"References": [
"https://lkml.org/lkml/2011/11/7/340",
"https://www.openwall.com/lists/oss-security/2011/12/28/4"
],
"PublishedDate": "2022-04-18T17:15:00Z",
"LastModifiedDate": "2022-04-26T18:33:00Z"
},
{
"VulnerabilityID": "CVE-2012-4542",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2012-4542",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes",
"Description": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.",
"Severity": "LOW",
"CweIDs": [
"CWE-264"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"V2Score": 4.6
},
"redhat": {
"V2Vector": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"V2Score": 4.9
}
},
"References": [
"http://marc.info/?l=linux-kernel&m=135903967015813&w=2",
"http://marc.info/?l=linux-kernel&m=135904012416042&w=2",
"http://rhn.redhat.com/errata/RHSA-2013-0496.html",
"http://rhn.redhat.com/errata/RHSA-2013-0579.html",
"http://rhn.redhat.com/errata/RHSA-2013-0882.html",
"http://rhn.redhat.com/errata/RHSA-2013-0928.html",
"https://access.redhat.com/security/cve/CVE-2012-4542",
"https://bugzilla.redhat.com/show_bug.cgi?id=875360",
"https://linux.oracle.com/cve/CVE-2012-4542.html",
"https://linux.oracle.com/errata/ELSA-2013-2534.html",
"https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8"
],
"PublishedDate": "2013-02-28T19:55:00Z",
"LastModifiedDate": "2013-06-21T03:13:00Z"
},
{
"VulnerabilityID": "CVE-2014-9892",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2014-9892",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "The snd_compr_tstamp function in sound/core/compress_offload.c in the ...",
"Description": "The snd_compr_tstamp function in sound/core/compress_offload.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly initialize a timestamp data structure, which allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28770164 and Qualcomm internal bug CR568717.",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"V2Score": 4.3,
"V3Score": 5.5
}
},
"References": [
"http://source.android.com/security/bulletin/2016-08-01.html",
"http://www.securityfocus.com/bid/92222",
"https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e"
],
"PublishedDate": "2016-08-06T10:59:00Z",
"LastModifiedDate": "2016-11-28T19:15:00Z"
},
{
"VulnerabilityID": "CVE-2014-9900",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2014-9900",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Info leak in uninitialized structure ethtool_wolinfo in ethtool_get_wol()",
"Description": "The ethtool_get_wol function in net/core/ethtool.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not initialize a certain data structure, which allows local users to obtain sensitive information via a crafted application, aka Android internal bug 28803952 and Qualcomm internal bug CR570754.",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 7.5
}
},
"References": [
"http://source.android.com/security/bulletin/2016-08-01.html",
"http://www.securityfocus.com/bid/92222",
"https://access.redhat.com/security/cve/CVE-2014-9900",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900",
"https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071",
"https://ubuntu.com/security/notices/USN-3358-1",
"https://ubuntu.com/security/notices/USN-3359-1",
"https://ubuntu.com/security/notices/USN-3360-1",
"https://ubuntu.com/security/notices/USN-3360-2",
"https://ubuntu.com/security/notices/USN-3364-1",
"https://ubuntu.com/security/notices/USN-3364-2",
"https://ubuntu.com/security/notices/USN-3364-3",
"https://ubuntu.com/security/notices/USN-3371-1"
],
"PublishedDate": "2016-08-06T10:59:00Z",
"LastModifiedDate": "2016-11-28T19:15:00Z"
},
{
"VulnerabilityID": "CVE-2015-2877",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2015-2877",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Kernel: Cross-VM ASL INtrospection (CAIN)",
"Description": "** DISPUTED ** Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states \"Basically if you care about this attack vector, disable deduplication.\" Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities.",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 2.1
}
},
"References": [
"http://www.antoniobarresi.com/files/cain_advisory.txt",
"http://www.kb.cert.org/vuls/id/935424",
"http://www.securityfocus.com/bid/76256",
"https://access.redhat.com/security/cve/CVE-2015-2877",
"https://bugzilla.redhat.com/show_bug.cgi?id=1252096",
"https://www.kb.cert.org/vuls/id/BGAR-A2CNKG",
"https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH",
"https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf"
],
"PublishedDate": "2017-03-03T11:59:00Z",
"LastModifiedDate": "2020-06-04T19:29:00Z"
},
{
"VulnerabilityID": "CVE-2016-10723",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-10723",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "** DISPUTED ** An issue was discovered in the Linux kernel through 4.1 ...",
"Description": "** DISPUTED ** An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the page allocator (e.g., via concurrent page fault events) when the global OOM killer is invoked. NOTE: the software maintainer has not accepted certain proposed patches, in part because of a viewpoint that \"the underlying problem is non-trivial to handle.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-399"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 5.5
}
},
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723",
"https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/",
"https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/",
"https://patchwork.kernel.org/patch/10395909/",
"https://patchwork.kernel.org/patch/9842889/",
"https://www.spinics.net/lists/linux-mm/msg117896.html"
],
"PublishedDate": "2018-06-21T13:29:00Z",
"LastModifiedDate": "2018-08-21T15:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-8660",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-8660",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: xfs: local DoS due to a page lock order bug in the XFS seek hole/data implementation",
"Description": "The XFS subsystem in the Linux kernel through 4.8.2 allows local users to cause a denial of service (fdatasync failure and system hang) by using the vfs syscall group in the trinity program, related to a \"page lock order bug in the XFS seek hole/data implementation.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-19"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 5.5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.7,
"V3Score": 5.5
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2016/10/13/8",
"http://www.securityfocus.com/bid/93558",
"https://access.redhat.com/security/cve/CVE-2016-8660",
"https://bugzilla.redhat.com/show_bug.cgi?id=1384851",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660",
"https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/",
"https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2",
"https://marc.info/?l=linux-xfs&m=149498118228320&w=2"
],
"PublishedDate": "2016-10-16T21:59:00Z",
"LastModifiedDate": "2016-11-28T20:41:00Z"
},
{
"VulnerabilityID": "CVE-2017-0630",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-0630",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Information disclosure vulnerability in kernel trace subsystem",
"Description": "An information disclosure vulnerability in the kernel trace subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34277115.",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"V2Score": 2.6,
"V3Score": 4.7
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 4.4
}
},
"References": [
"http://www.securityfocus.com/bid/98213",
"https://access.redhat.com/security/cve/CVE-2017-0630",
"https://source.android.com/security/bulletin/2017-05-01",
"https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem"
],
"PublishedDate": "2017-05-12T15:29:00Z",
"LastModifiedDate": "2017-05-19T12:41:00Z"
},
{
"VulnerabilityID": "CVE-2017-13693",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-13693",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: ACPI operand cache leak in dsutils.c",
"Description": "The acpi_ds_create_operands() function in drivers/acpi/acpica/dsutils.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 4.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/100502",
"https://access.redhat.com/security/cve/CVE-2017-13693",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693",
"https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732",
"https://patchwork.kernel.org/patch/9919053/"
],
"PublishedDate": "2017-08-25T08:29:00Z",
"LastModifiedDate": "2017-09-20T14:51:00Z"
},
{
"VulnerabilityID": "CVE-2017-13694",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-13694",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: ACPI node and node_ext cache leak",
"Description": "The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/100500",
"https://access.redhat.com/security/cve/CVE-2017-13694",
"https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0",
"https://patchwork.kernel.org/patch/9806085/"
],
"PublishedDate": "2017-08-25T08:29:00Z",
"LastModifiedDate": "2017-09-20T14:50:00Z"
},
{
"VulnerabilityID": "CVE-2018-1121",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-1121",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "procps-ng, procps: process hiding through race condition enumerating /proc",
"Description": "procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. This vulnerability affects procps and procps-ng up to version 3.3.15, newer versions might be affected also.",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 4.3,
"V3Score": 5.9
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
"V3Score": 3.9
}
},
"References": [
"http://seclists.org/oss-sec/2018/q2/122",
"http://www.securityfocus.com/bid/104214",
"https://access.redhat.com/security/cve/CVE-2018-1121",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121",
"https://www.exploit-db.com/exploits/44806/",
"https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt"
],
"PublishedDate": "2018-06-13T20:29:00Z",
"LastModifiedDate": "2020-06-30T16:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-12928",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-12928",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: NULL pointer dereference in hfs_ext_read_extent in hfs.ko",
"Description": "In the Linux kernel 4.15.0, a NULL pointer dereference was discovered in hfs_ext_read_extent in hfs.ko. This can occur during a mount of a crafted hfs filesystem.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5
}
},
"References": [
"http://www.securityfocus.com/bid/104593",
"https://access.redhat.com/security/cve/CVE-2018-12928",
"https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928",
"https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ",
"https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/",
"https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2"
],
"PublishedDate": "2018-06-28T14:29:00Z",
"LastModifiedDate": "2018-08-21T11:55:00Z"
},
{
"VulnerabilityID": "CVE-2018-17977",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-17977",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Mishandled interactions among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets resulting in a denial of service",
"Description": "The Linux kernel 4.14.67 mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang) by leveraging root access to execute crafted applications, as demonstrated on CentOS 7.",
"Severity": "LOW",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 4.4
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.9
}
},
"References": [
"http://www.securityfocus.com/bid/105539",
"https://access.redhat.com/security/cve/CVE-2018-17977",
"https://bugzilla.suse.com/show_bug.cgi?id=1111609",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977",
"https://www.openwall.com/lists/oss-security/2018/10/05/5"
],
"PublishedDate": "2018-10-08T17:29:00Z",
"LastModifiedDate": "2018-11-26T15:51:00Z"
},
{
"VulnerabilityID": "CVE-2019-11191",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-11191",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: race condition in load_aout_binary() allows local users to bypass ASLR on setuid a.out programs",
"Description": "** DISPUTED ** The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported.",
"Severity": "LOW",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 1.9,
"V3Score": 2.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 2.5
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html",
"http://www.openwall.com/lists/oss-security/2019/04/18/5",
"http://www.openwall.com/lists/oss-security/2019/05/22/7",
"http://www.securityfocus.com/bid/107887",
"https://access.redhat.com/security/cve/CVE-2019-11191",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191",
"https://ubuntu.com/security/notices/USN-4006-1",
"https://ubuntu.com/security/notices/USN-4006-2",
"https://ubuntu.com/security/notices/USN-4007-1",
"https://ubuntu.com/security/notices/USN-4007-2",
"https://ubuntu.com/security/notices/USN-4008-1",
"https://ubuntu.com/security/notices/USN-4008-3",
"https://usn.ubuntu.com/4006-1/",
"https://usn.ubuntu.com/4006-2/",
"https://usn.ubuntu.com/4007-1/",
"https://usn.ubuntu.com/4007-2/",
"https://usn.ubuntu.com/4008-1/",
"https://usn.ubuntu.com/4008-3/",
"https://www.openwall.com/lists/oss-security/2019/04/03/4",
"https://www.openwall.com/lists/oss-security/2019/04/03/4/1"
],
"PublishedDate": "2019-04-12T00:29:00Z",
"LastModifiedDate": "2019-06-17T16:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-12378",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-12378",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: unchecked kmalloc of new_ra in ip6_ra_control leads to denial of service",
"Description": "** DISPUTED ** An issue was discovered in ip6_ra_control in net/ipv6/ipv6_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This has been disputed as not an issue.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.7
}
},
"References": [
"http://www.securityfocus.com/bid/108475",
"https://access.redhat.com/security/cve/CVE-2019-12378",
"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825",
"https://linux.oracle.com/cve/CVE-2019-12378.html",
"https://linux.oracle.com/errata/ELSA-2019-4746.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/",
"https://lkml.org/lkml/2019/5/25/229"
],
"PublishedDate": "2019-05-28T03:29:00Z",
"LastModifiedDate": "2019-06-10T03:29:00Z"
},
{
"VulnerabilityID": "CVE-2019-12379",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-12379",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: memory leak in con_insert_unipair in drivers/tty/vt/consolemap.c",
"Description": "** DISPUTED ** An issue was discovered in con_insert_unipair in drivers/tty/vt/consolemap.c in the Linux kernel through 5.1.5. There is a memory leak in a certain case of an ENOMEM outcome of kmalloc. NOTE: This id is disputed as not being an issue.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.3
}
},
"References": [
"http://www.securityfocus.com/bid/108478",
"https://access.redhat.com/security/cve/CVE-2019-12379",
"https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac",
"https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/",
"https://security.netapp.com/advisory/ntap-20190710-0002/"
],
"PublishedDate": "2019-05-28T03:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2019-12380",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-12380",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: memory allocation failure in the efi subsystem leads to denial of service",
"Description": "**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”.",
"Severity": "LOW",
"CweIDs": [
"CWE-388"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 2.1,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.2
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html",
"http://www.securityfocus.com/bid/108477",
"https://access.redhat.com/security/cve/CVE-2019-12380",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380",
"https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e",
"https://linux.oracle.com/cve/CVE-2019-12380.html",
"https://linux.oracle.com/errata/ELSA-2020-5913.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/",
"https://security.netapp.com/advisory/ntap-20190710-0002/",
"https://ubuntu.com/security/notices/USN-4414-1",
"https://ubuntu.com/security/notices/USN-4427-1",
"https://ubuntu.com/security/notices/USN-4439-1",
"https://usn.ubuntu.com/4414-1/",
"https://usn.ubuntu.com/4427-1/",
"https://usn.ubuntu.com/4439-1/"
],
"PublishedDate": "2019-05-28T03:29:00Z",
"LastModifiedDate": "2020-08-03T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-12381",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-12381",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: unchecked kmalloc of new_ra in ip_ra_control leads to denial of service",
"Description": "** DISPUTED ** An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: this is disputed because new_ra is never used if it is NULL.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://www.securityfocus.com/bid/108473",
"https://access.redhat.com/security/cve/CVE-2019-12381",
"https://bugzilla.redhat.com/show_bug.cgi?id=1715501",
"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515",
"https://linux.oracle.com/cve/CVE-2019-12381.html",
"https://linux.oracle.com/errata/ELSA-2019-4746.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/",
"https://lkml.org/lkml/2019/5/25/230"
],
"PublishedDate": "2019-05-28T03:29:00Z",
"LastModifiedDate": "2019-06-20T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-12382",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-12382",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service",
"Description": "** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html",
"http://www.securityfocus.com/bid/108474",
"https://access.redhat.com/security/cve/CVE-2019-12382",
"https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f",
"https://linux.oracle.com/cve/CVE-2019-12382.html",
"https://linux.oracle.com/errata/ELSA-2020-1016.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/",
"https://lkml.org/lkml/2019/5/24/843",
"https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/",
"https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382"
],
"PublishedDate": "2019-05-28T03:29:00Z",
"LastModifiedDate": "2019-06-19T19:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-12455",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-12455",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: null pointer dereference in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c causing denial of service",
"Description": "** DISPUTED ** An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This id is disputed as not being an issue because “The memory allocation that was not checked is part of a code that only runs at boot time, before user processes are started. Therefore, there is no possibility for an unprivileged user to control it, and no denial of service.”.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-12455",
"https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/",
"https://security.netapp.com/advisory/ntap-20190710-0002/",
"https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html"
],
"PublishedDate": "2019-05-30T04:29:00Z",
"LastModifiedDate": "2020-02-10T21:49:00Z"
},
{
"VulnerabilityID": "CVE-2019-12456",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-12456",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: double fetch in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c",
"Description": "** DISPUTED ** An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.2,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.2
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html",
"https://access.redhat.com/security/cve/CVE-2019-12456",
"https://bugzilla.redhat.com/show_bug.cgi?id=1717182",
"https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/",
"https://lkml.org/lkml/2019/5/29/1164",
"https://support.f5.com/csp/article/K84310302",
"https://support.f5.com/csp/article/K84310302?utm_source=f5support&utm_medium=RSS"
],
"PublishedDate": "2019-05-30T14:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2019-16229",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-16229",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: null pointer dereference in drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c",
"Description": "** DISPUTED ** drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: The security community disputes this issues as not being serious enough to be deserving a CVE id.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.7,
"V3Score": 4.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-16229",
"https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229",
"https://lkml.org/lkml/2019/9/9/487",
"https://security.netapp.com/advisory/ntap-20191004-0001/",
"https://ubuntu.com/security/notices/USN-4284-1",
"https://ubuntu.com/security/notices/USN-4285-1",
"https://ubuntu.com/security/notices/USN-4287-1",
"https://ubuntu.com/security/notices/USN-4287-2",
"https://usn.ubuntu.com/4284-1/",
"https://usn.ubuntu.com/4285-1/",
"https://usn.ubuntu.com/4287-1/",
"https://usn.ubuntu.com/4287-2/"
],
"PublishedDate": "2019-09-11T16:15:00Z",
"LastModifiedDate": "2020-05-04T17:41:00Z"
},
{
"VulnerabilityID": "CVE-2019-16230",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-16230",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: null pointer dereference in drivers/gpu/drm/radeon/radeon_display.c",
"Description": "** DISPUTED ** drivers/gpu/drm/radeon/radeon_display.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: A third-party software maintainer states that the work queue allocation is happening during device initialization, which for a graphics card occurs during boot. It is not attacker controllable and OOM at that time is highly unlikely.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.7,
"V3Score": 4.7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-16230",
"https://bugzilla.suse.com/show_bug.cgi?id=1150468",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230",
"https://lkml.org/lkml/2019/9/9/487",
"https://security.netapp.com/advisory/ntap-20191004-0001/"
],
"PublishedDate": "2019-09-11T16:15:00Z",
"LastModifiedDate": "2020-05-04T19:09:00Z"
},
{
"VulnerabilityID": "CVE-2019-16231",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-16231",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c",
"Description": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.7,
"V3Score": 4.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.1
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html",
"https://access.redhat.com/security/cve/CVE-2019-16231",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d",
"https://linux.oracle.com/cve/CVE-2019-16231.html",
"https://linux.oracle.com/errata/ELSA-2020-5533.html",
"https://lkml.org/lkml/2019/9/9/487",
"https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/",
"https://security.netapp.com/advisory/ntap-20191004-0001/",
"https://ubuntu.com/security/notices/USN-4225-1",
"https://ubuntu.com/security/notices/USN-4225-2",
"https://ubuntu.com/security/notices/USN-4226-1",
"https://ubuntu.com/security/notices/USN-4227-1",
"https://ubuntu.com/security/notices/USN-4227-2",
"https://ubuntu.com/security/notices/USN-4904-1",
"https://usn.ubuntu.com/4225-1/",
"https://usn.ubuntu.com/4225-2/",
"https://usn.ubuntu.com/4226-1/",
"https://usn.ubuntu.com/4227-1/",
"https://usn.ubuntu.com/4227-2/"
],
"PublishedDate": "2019-09-11T16:15:00Z",
"LastModifiedDate": "2020-05-04T20:22:00Z"
},
{
"VulnerabilityID": "CVE-2019-16232",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-16232",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: null-pointer dereference in drivers/net/wireless/marvell/libertas/if_sdio.c",
"Description": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.7,
"V3Score": 4.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.1
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html",
"https://access.redhat.com/security/cve/CVE-2019-16232",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232",
"https://linux.oracle.com/cve/CVE-2019-16232.html",
"https://linux.oracle.com/errata/ELSA-2020-5804.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/",
"https://lkml.org/lkml/2019/9/9/487",
"https://security.netapp.com/advisory/ntap-20191004-0001/",
"https://ubuntu.com/security/notices/USN-4284-1",
"https://ubuntu.com/security/notices/USN-4285-1",
"https://ubuntu.com/security/notices/USN-4287-1",
"https://ubuntu.com/security/notices/USN-4287-2",
"https://ubuntu.com/security/notices/USN-4904-1",
"https://usn.ubuntu.com/4284-1/",
"https://usn.ubuntu.com/4285-1/",
"https://usn.ubuntu.com/4287-1/",
"https://usn.ubuntu.com/4287-2/"
],
"PublishedDate": "2019-09-11T16:15:00Z",
"LastModifiedDate": "2020-05-04T20:18:00Z"
},
{
"VulnerabilityID": "CVE-2019-16233",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-16233",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c",
"Description": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.7,
"V3Score": 4.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.1
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html",
"https://access.redhat.com/security/cve/CVE-2019-16233",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233",
"https://linux.oracle.com/cve/CVE-2019-16233.html",
"https://linux.oracle.com/errata/ELSA-2020-5508.html",
"https://lkml.org/lkml/2019/9/9/487",
"https://security.netapp.com/advisory/ntap-20191004-0001/",
"https://ubuntu.com/security/notices/USN-4226-1",
"https://ubuntu.com/security/notices/USN-4227-1",
"https://ubuntu.com/security/notices/USN-4227-2",
"https://ubuntu.com/security/notices/USN-4346-1",
"https://usn.ubuntu.com/4226-1/",
"https://usn.ubuntu.com/4227-1/",
"https://usn.ubuntu.com/4227-2/",
"https://usn.ubuntu.com/4346-1/"
],
"PublishedDate": "2019-09-11T16:15:00Z",
"LastModifiedDate": "2020-05-06T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-16234",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-16234",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c",
"Description": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.7,
"V3Score": 4.7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html",
"https://access.redhat.com/security/cve/CVE-2019-16234",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234",
"https://linux.oracle.com/cve/CVE-2019-16234.html",
"https://linux.oracle.com/errata/ELSA-2020-5804.html",
"https://lkml.org/lkml/2019/9/9/487",
"https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/",
"https://security.netapp.com/advisory/ntap-20191004-0001/",
"https://ubuntu.com/security/notices/USN-4342-1",
"https://ubuntu.com/security/notices/USN-4344-1",
"https://ubuntu.com/security/notices/USN-4345-1",
"https://ubuntu.com/security/notices/USN-4346-1",
"https://usn.ubuntu.com/4342-1/",
"https://usn.ubuntu.com/4344-1/",
"https://usn.ubuntu.com/4345-1/",
"https://usn.ubuntu.com/4346-1/"
],
"PublishedDate": "2019-09-11T16:15:00Z",
"LastModifiedDate": "2020-05-05T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-19070",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-19070",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c allows for a DoS",
"Description": "** DISPUTED ** A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. NOTE: third parties dispute the relevance of this because the system must have already been out of memory before the probe began.",
"Severity": "LOW",
"CweIDs": [
"CWE-401"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-19070",
"https://bugzilla.suse.com/show_bug.cgi?id=1157294",
"https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/"
],
"PublishedDate": "2019-11-18T06:15:00Z",
"LastModifiedDate": "2021-06-02T15:38:00Z"
},
{
"VulnerabilityID": "CVE-2020-11725",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-11725",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: improper handling of private_size*count multiplication due to count=info->owner typo",
"Description": "** DISPUTED ** snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line, which later affects a private_size*count multiplication for unspecified \"interesting side effects.\" NOTE: kernel engineers dispute this finding, because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the \"owner\" concept. The existing callers, SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE, have been designed to misuse the info->owner field in a safe way.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 4.6,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-11725",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725",
"https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474",
"https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/",
"https://nvd.nist.gov/vuln/detail/CVE-2020-11725",
"https://twitter.com/yabbadabbadrew/status/1248632267028582400"
],
"PublishedDate": "2020-04-12T22:15:00Z",
"LastModifiedDate": "2020-04-14T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-35501",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-35501",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability",
"Description": "A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"V2Score": 3.6,
"V3Score": 3.4
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 3.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-35501",
"https://bugzilla.redhat.com/show_bug.cgi?id=1908577",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501",
"https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html",
"https://nvd.nist.gov/vuln/detail/CVE-2020-35501",
"https://www.openwall.com/lists/oss-security/2021/02/18/1"
],
"PublishedDate": "2022-03-30T16:15:00Z",
"LastModifiedDate": "2022-07-08T18:19:00Z"
},
{
"VulnerabilityID": "CVE-2021-26934",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-26934",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "An issue was discovered in the Linux kernel 4.18 through 5.10.16, as u ...",
"Description": "An issue was discovered in the Linux kernel 4.18 through 5.10.16, as used by Xen. The backend allocation (aka be-alloc) mode of the drm_xen_front drivers was not meant to be a supported configuration, but this wasn't stated accordingly in its support status entry.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 4.6,
"V3Score": 7.8
}
},
"References": [
"http://xenbits.xen.org/xsa/advisory-363.html",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-26934",
"https://security.netapp.com/advisory/ntap-20210326-0001/",
"https://www.openwall.com/lists/oss-security/2021/02/16/2",
"https://xenbits.xen.org/xsa/advisory-363.html"
],
"PublishedDate": "2021-02-17T02:15:00Z",
"LastModifiedDate": "2021-03-30T15:17:00Z"
},
{
"VulnerabilityID": "CVE-2021-32078",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-32078",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: out-of-bounds read in arch/arm/mach-footbridge/personal-pci.c due to improper input validation",
"Description": "An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"V2Score": 6.6,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 8.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-32078",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078",
"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f",
"https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)",
"https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f",
"https://kirtikumarar.com/CVE-2021-32078.txt",
"https://nvd.nist.gov/vuln/detail/CVE-2021-32078",
"https://security.netapp.com/advisory/ntap-20210813-0002/"
],
"PublishedDate": "2021-06-17T15:15:00Z",
"LastModifiedDate": "2021-09-20T17:08:00Z"
},
{
"VulnerabilityID": "CVE-2022-25265",
"PkgName": "linux-libc-dev",
"InstalledVersion": "5.10.140-1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-25265",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "kernel: Executable Space Protection Bypass",
"Description": "In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.",
"Severity": "LOW",
"CweIDs": [
"CWE-913"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 4.4,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-25265",
"https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294",
"https://github.com/x0reaxeax/exec-prot-bypass",
"https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
"https://security.netapp.com/advisory/ntap-20220318-0005/"
],
"PublishedDate": "2022-02-16T21:15:00Z",
"LastModifiedDate": "2022-05-11T14:08:00Z"
},
{
"VulnerabilityID": "CVE-2007-5686",
"PkgName": "login",
"InstalledVersion": "1:4.8.1-1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-5686",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...",
"Description": "initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts. NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.",
"Severity": "LOW",
"CweIDs": [
"CWE-264"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"V2Score": 4.9
}
},
"References": [
"http://secunia.com/advisories/27215",
"http://www.securityfocus.com/archive/1/482129/100/100/threaded",
"http://www.securityfocus.com/archive/1/482857/100/0/threaded",
"http://www.securityfocus.com/bid/26048",
"http://www.vupen.com/english/advisories/2007/3474",
"https://issues.rpath.com/browse/RPL-1825"
],
"PublishedDate": "2007-10-28T17:08:00Z",
"LastModifiedDate": "2018-10-15T21:45:00Z"
},
{
"VulnerabilityID": "CVE-2013-4235",
"PkgName": "login",
"InstalledVersion": "1:4.8.1-1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4235",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "shadow-utils: TOCTOU race conditions by copying and removing directory trees",
"Description": "shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees",
"Severity": "LOW",
"CweIDs": [
"CWE-367"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 3.3,
"V3Score": 4.7
},
"redhat": {
"V2Vector": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
"V2Score": 3.7,
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2013-4235",
"https://access.redhat.com/security/cve/cve-2013-4235",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://security-tracker.debian.org/tracker/CVE-2013-4235"
],
"PublishedDate": "2019-12-03T15:15:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-19882",
"PkgName": "login",
"InstalledVersion": "1:4.8.1-1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-19882",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "shadow-utils: local users can obtain root access because setuid programs are misconfigured",
"Description": "shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable for use with setuid account management tools. This combination leads to account management tools (groupadd, groupdel, groupmod, useradd, userdel, usermod) that can easily be used by unprivileged local users to escalate privileges to root in multiple ways. This issue became much more relevant in approximately December 2019 when an unrelated bug was fixed (i.e., the chmod calls to suidusbins were fixed in the upstream Makefile which is now included in the release version 4.8).",
"Severity": "LOW",
"CweIDs": [
"CWE-732"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 6.9,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-19882",
"https://bugs.archlinux.org/task/64836",
"https://bugs.gentoo.org/702252",
"https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75",
"https://github.com/shadow-maint/shadow/pull/199",
"https://github.com/void-linux/void-packages/pull/17580",
"https://security.gentoo.org/glsa/202008-09"
],
"PublishedDate": "2019-12-18T16:15:00Z",
"LastModifiedDate": "2020-08-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-1304",
"PkgName": "logsave",
"InstalledVersion": "1.46.2-2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1304",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "e2fsprogs: out-of-bounds read/write via crafted filesystem",
"Description": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125",
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"V3Score": 5.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-1304",
"https://bugzilla.redhat.com/show_bug.cgi?id=2069726",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304",
"https://marc.info/?l=linux-ext4&m=165056234501732&w=2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-1304",
"https://ubuntu.com/security/notices/USN-5464-1"
],
"PublishedDate": "2022-04-14T21:15:00Z",
"LastModifiedDate": "2022-04-21T15:36:00Z"
},
{
"VulnerabilityID": "CVE-2008-1687",
"PkgName": "m4",
"InstalledVersion": "1.4.18-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-1687",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "m4: unquoted output of maketemp and mkstemp",
"Description": "The (1) maketemp and (2) mkstemp builtin functions in GNU m4 before 1.4.11 do not quote their output when a file is created, which might allow context-dependent attackers to trigger a macro expansion, leading to unspecified use of an incorrect filename.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V2Score": 7.5
}
},
"References": [
"http://secunia.com/advisories/29671",
"http://secunia.com/advisories/29729",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612",
"http://www.openwall.com/lists/oss-security/2008/04/07/1",
"http://www.openwall.com/lists/oss-security/2008/04/07/12",
"http://www.openwall.com/lists/oss-security/2008/04/07/3",
"http://www.openwall.com/lists/oss-security/2008/04/07/4",
"http://www.securityfocus.com/bid/28688",
"http://www.vupen.com/english/advisories/2008/1151/references",
"https://access.redhat.com/security/cve/CVE-2008-1687",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/41706"
],
"PublishedDate": "2008-04-09T19:05:00Z",
"LastModifiedDate": "2017-08-08T01:30:00Z"
},
{
"VulnerabilityID": "CVE-2008-1688",
"PkgName": "m4",
"InstalledVersion": "1.4.18-5",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-1688",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "m4: code execution via -F argument",
"Description": "Unspecified vulnerability in GNU m4 before 1.4.11 might allow context-dependent attackers to execute arbitrary code, related to improper handling of filenames specified with the -F option. NOTE: it is not clear when this issue crosses privilege boundaries.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V2Score": 7.5
}
},
"References": [
"http://osvdb.org/44272",
"http://secunia.com/advisories/29671",
"http://secunia.com/advisories/29729",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612",
"http://www.openwall.com/lists/oss-security/2008/04/07/1",
"http://www.openwall.com/lists/oss-security/2008/04/07/3",
"http://www.securityfocus.com/bid/28688",
"http://www.vupen.com/english/advisories/2008/1151/references",
"https://access.redhat.com/security/cve/CVE-2008-1688",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/41704"
],
"PublishedDate": "2008-04-09T19:05:00Z",
"LastModifiedDate": "2017-08-08T01:30:00Z"
},
{
"VulnerabilityID": "CVE-2021-46669",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-46669",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used",
"Description": "MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2021-46669",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-25638",
"https://linux.oracle.com/cve/CVE-2021-46669.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
"https://mariadb.com/kb/en/security/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-46669",
"https://security.netapp.com/advisory/ntap-20220221-0002/"
],
"PublishedDate": "2022-02-01T02:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27376",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27376",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in Item_args::walk_arg",
"Description": "MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27376",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26354",
"https://linux.oracle.com/cve/CVE-2022-27376.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27376",
"https://security.netapp.com/advisory/ntap-20220519-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27377",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27377",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison when complex conversion is involved in blob",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27377",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26281",
"https://linux.oracle.com/cve/CVE-2022-27377.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27377",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27378",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27378",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in create_tmp_table::finalize",
"Description": "An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27378",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26423",
"https://linux.oracle.com/cve/CVE-2022-27378.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27378",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27379",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27379",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in component arg_comparator::compare_real_fixed",
"Description": "An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27379",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26353",
"https://linux.oracle.com/cve/CVE-2022-27379.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27379",
"https://security.netapp.com/advisory/ntap-20220526-0005/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27380",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27380",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at my_decimal::operator=",
"Description": "An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27380",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26280",
"https://linux.oracle.com/cve/CVE-2022-27380.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27380",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27381",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27381",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at Field::set_default via specially crafted SQL statements",
"Description": "An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27381",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26061",
"https://linux.oracle.com/cve/CVE-2022-27381.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27381",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27382",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27382",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order",
"Description": "MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27382",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26402",
"https://linux.oracle.com/cve/CVE-2022-27382.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27382",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-07-19T13:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-27383",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27383",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c",
"Description": "MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27383",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26323",
"https://linux.oracle.com/cve/CVE-2022-27383.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27383",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27384",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27384",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash via component Item_subselect::init_expr_cache_tracker",
"Description": "An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27384",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26047",
"https://linux.oracle.com/cve/CVE-2022-27384.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27384",
"https://security.netapp.com/advisory/ntap-20220519-0006/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27385",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27385",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join",
"Description": "An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-27385",
"https://jira.mariadb.org/browse/MDEV-26415",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27385",
"https://security.netapp.com/advisory/ntap-20220526-0008/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-06-07T13:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-27386",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27386",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crashes in query_arena::set_query_arena upon SELECT from view",
"Description": "MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-89"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27386",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26406",
"https://linux.oracle.com/cve/CVE-2022-27386.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27386",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27387",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27387",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failures in decimal_bin_size",
"Description": "MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.",
"Severity": "HIGH",
"CweIDs": [
"CWE-120"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27387",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-26422",
"https://linux.oracle.com/cve/CVE-2022-27387.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27387",
"https://security.netapp.com/advisory/ntap-20220526-0004/"
],
"PublishedDate": "2022-04-12T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27444",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27444",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash when using HAVING with NOT EXIST predicate in an equality",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27444",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28080",
"https://linux.oracle.com/cve/CVE-2022-27444.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27444",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-07-19T13:32:00Z"
},
{
"VulnerabilityID": "CVE-2022-27445",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27445",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in compare_order_elements",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27445",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28081",
"https://linux.oracle.com/cve/CVE-2022-27445.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27445",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27446",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27446",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash when using HAVING with IS NULL predicate in an equality",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27446",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28082",
"https://linux.oracle.com/cve/CVE-2022-27446.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27446",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-07-19T13:35:00Z"
},
{
"VulnerabilityID": "CVE-2022-27447",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27447",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in Binary_string::free_buffer",
"Description": "MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27447",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28099",
"https://linux.oracle.com/cve/CVE-2022-27447.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27447",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27448",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27448",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash in multi-update and implicit grouping",
"Description": "There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27448",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28095",
"https://linux.oracle.com/cve/CVE-2022-27448.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27448",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27449",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27449",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in sql/item_func.cc",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27449",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28089",
"https://linux.oracle.com/cve/CVE-2022-27449.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27449",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27451",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27451",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: crash via window function in expression in ORDER BY",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27451",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28094",
"https://linux.oracle.com/cve/CVE-2022-27451.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27451",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:52:00Z"
},
{
"VulnerabilityID": "CVE-2022-27452",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27452",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in sql/item_cmpfunc.cc",
"Description": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27452",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28090",
"https://linux.oracle.com/cve/CVE-2022-27452.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27452",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27455",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27455",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27455",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28097",
"https://linux.oracle.com/cve/CVE-2022-27455.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:56:00Z"
},
{
"VulnerabilityID": "CVE-2022-27456",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27456",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27456",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28093",
"https://linux.oracle.com/cve/CVE-2022-27456.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27456",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-27457",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27457",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: incorrect key in \"dup value\" error after long unique",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27457",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28098",
"https://linux.oracle.com/cve/CVE-2022-27457.html",
"https://linux.oracle.com/errata/ELSA-2022-5948.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27457",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-06-30T12:56:00Z"
},
{
"VulnerabilityID": "CVE-2022-27458",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in Binary_string::free_buffer",
"Description": "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Binary_string::free_buffer() at /sql/sql_string.h.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:5948",
"https://access.redhat.com/security/cve/CVE-2022-27458",
"https://bugzilla.redhat.com/2049302",
"https://bugzilla.redhat.com/2050017",
"https://bugzilla.redhat.com/2050022",
"https://bugzilla.redhat.com/2050024",
"https://bugzilla.redhat.com/2050026",
"https://bugzilla.redhat.com/2050032",
"https://bugzilla.redhat.com/2050034",
"https://bugzilla.redhat.com/2068211",
"https://bugzilla.redhat.com/2068233",
"https://bugzilla.redhat.com/2068234",
"https://bugzilla.redhat.com/2069833",
"https://bugzilla.redhat.com/2074817",
"https://bugzilla.redhat.com/2074947",
"https://bugzilla.redhat.com/2074949",
"https://bugzilla.redhat.com/2074951",
"https://bugzilla.redhat.com/2074966",
"https://bugzilla.redhat.com/2074981",
"https://bugzilla.redhat.com/2074987",
"https://bugzilla.redhat.com/2074996",
"https://bugzilla.redhat.com/2074999",
"https://bugzilla.redhat.com/2075005",
"https://bugzilla.redhat.com/2075006",
"https://bugzilla.redhat.com/2075691",
"https://bugzilla.redhat.com/2075692",
"https://bugzilla.redhat.com/2075693",
"https://bugzilla.redhat.com/2075694",
"https://bugzilla.redhat.com/2075695",
"https://bugzilla.redhat.com/2075696",
"https://bugzilla.redhat.com/2075697",
"https://bugzilla.redhat.com/2075699",
"https://bugzilla.redhat.com/2075700",
"https://bugzilla.redhat.com/2075701",
"https://bugzilla.redhat.com/2076144",
"https://bugzilla.redhat.com/2076145",
"https://bugzilla.redhat.com/2092354",
"https://bugzilla.redhat.com/2092360",
"https://errata.almalinux.org/9/ALSA-2022-5948.html",
"https://jira.mariadb.org/browse/MDEV-28099",
"https://linux.oracle.com/cve/CVE-2022-27458.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-27458",
"https://security.netapp.com/advisory/ntap-20220526-0007/"
],
"PublishedDate": "2022-04-14T13:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32081",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32081",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc",
"Description": "MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32081",
"https://jira.mariadb.org/browse/MDEV-26420",
"https://nvd.nist.gov/vuln/detail/CVE-2022-32081",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-26T19:51:00Z"
},
{
"VulnerabilityID": "CVE-2022-32082",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32082",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc",
"Description": "MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-617"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32082",
"https://jira.mariadb.org/browse/MDEV-26433",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32083",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32083",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash at Item_subselect::init_expr_cache_tracker",
"Description": "MariaDB v10.2 to v10.6.1 was discovered to contain a segmentation fault via the component Item_subselect::init_expr_cache_tracker.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32083",
"https://jira.mariadb.org/browse/MDEV-26047",
"https://linux.oracle.com/cve/CVE-2022-32083.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220826-0006/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32084",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32084",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: segmentation fault via the component sub_select",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component sub_select.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32084",
"https://jira.mariadb.org/browse/MDEV-26427",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32085",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32085",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32085",
"https://jira.mariadb.org/browse/MDEV-26407",
"https://linux.oracle.com/cve/CVE-2022-32085.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32086",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32086",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT",
"Description": "MariaDB v10.4 to v10.8 was discovered to contain a segmentation fault via the component Item_field::fix_outer_field.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32086",
"https://jira.mariadb.org/browse/MDEV-26412",
"https://security.netapp.com/advisory/ntap-20220826-0007/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-26T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32087",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32087",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in Item_args::walk_args",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_args::walk_args.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32087",
"https://jira.mariadb.org/browse/MDEV-26437",
"https://linux.oracle.com/cve/CVE-2022-32087.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32088",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32088",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort",
"Description": "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32088",
"https://jira.mariadb.org/browse/MDEV-26419",
"https://linux.oracle.com/cve/CVE-2022-32088.html",
"https://linux.oracle.com/errata/ELSA-2022-6443.html",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32089",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32089",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in st_select_lex_unit::exclude_level",
"Description": "MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32089",
"https://jira.mariadb.org/browse/MDEV-26410",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-08-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-32091",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-32091",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "mariadb: server crash in JOIN_CACHE::free or in copy_fields",
"Description": "MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.",
"Severity": "HIGH",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-32091",
"https://jira.mariadb.org/browse/MDEV-26431",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-32091",
"https://security.netapp.com/advisory/ntap-20220818-0005/"
],
"PublishedDate": "2022-07-01T20:15:00Z",
"LastModifiedDate": "2022-09-16T11:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-38791",
"PkgName": "mariadb-common",
"InstalledVersion": "1:10.5.15-0+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-38791",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compr ...",
"Description": "In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock.",
"Severity": "MEDIUM",
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://jira.mariadb.org/browse/MDEV-28719",
"https://nvd.nist.gov/vuln/detail/CVE-2022-38791"
],
"PublishedDate": "2022-08-27T20:15:00Z",
"LastModifiedDate": "2022-09-01T19:35:00Z"
},
{
"VulnerabilityID": "CVE-2022-0563",
"PkgName": "mount",
"InstalledVersion": "2.36.1-8+deb11u1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
"Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
"Severity": "LOW",
"CweIDs": [
"CWE-209"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0563",
"https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
"https://security.netapp.com/advisory/ntap-20220331-0002/"
],
"PublishedDate": "2022-02-21T19:15:00Z",
"LastModifiedDate": "2022-06-03T14:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgName": "ncurses-base",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-04-27T13:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgName": "ncurses-base",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2021-11-30T22:42:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "HIGH",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-04-27T13:14:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.2+20201114-2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2021-11-30T22:42:00Z"
},
{
"VulnerabilityID": "CVE-2021-41617",
"PkgName": "openssh-client",
"InstalledVersion": "1:8.4p1-5+deb11u1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-41617",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured",
"Description": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
"Severity": "HIGH",
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 4.4,
"V3Score": 7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json",
"https://access.redhat.com/security/cve/CVE-2021-41617",
"https://bugzilla.suse.com/show_bug.cgi?id=1190975",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617",
"https://errata.almalinux.org/8/ALSA-2022-2013.html",
"https://linux.oracle.com/cve/CVE-2021-41617.html",
"https://linux.oracle.com/errata/ELSA-2022-2013.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-41617",
"https://security.netapp.com/advisory/ntap-20211014-0004/",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-8.8",
"https://www.openwall.com/lists/oss-security/2021/09/26/1",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2021-09-26T19:15:00Z",
"LastModifiedDate": "2022-07-25T18:17:00Z"
},
{
"VulnerabilityID": "CVE-2007-2243",
"PkgName": "openssh-client",
"InstalledVersion": "1:8.4p1-5+deb11u1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-2243",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabl ...",
"Description": "OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.",
"Severity": "LOW",
"CweIDs": [
"CWE-287"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V2Score": 5
}
},
"References": [
"http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.html",
"http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html",
"http://securityreason.com/securityalert/2631",
"http://www.osvdb.org/34600",
"http://www.securityfocus.com/bid/23601",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/33794",
"https://security.netapp.com/advisory/ntap-20191107-0003/"
],
"PublishedDate": "2007-04-25T16:19:00Z",
"LastModifiedDate": "2017-07-29T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2007-2768",
"PkgName": "openssh-client",
"InstalledVersion": "1:8.4p1-5+deb11u1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-2768",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, a ...",
"Description": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V2Score": 4.3
}
},
"References": [
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://nvd.nist.gov/vuln/detail/CVE-2007-2768",
"https://security.netapp.com/advisory/ntap-20191107-0002/"
],
"PublishedDate": "2007-05-21T20:30:00Z",
"LastModifiedDate": "2021-04-01T15:32:00Z"
},
{
"VulnerabilityID": "CVE-2008-3234",
"PkgName": "openssh-client",
"InstalledVersion": "1:8.4p1-5+deb11u1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2008-3234",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapsh ...",
"Description": "sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.",
"Severity": "LOW",
"CweIDs": [
"CWE-264"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"V2Score": 6.5
}
},
"References": [
"http://www.securityfocus.com/bid/30276",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44037",
"https://www.exploit-db.com/exploits/6094"
],
"PublishedDate": "2008-07-18T16:41:00Z",
"LastModifiedDate": "2017-09-29T01:31:00Z"
},
{
"VulnerabilityID": "CVE-2016-20012",
"PkgName": "openssh-client",
"InstalledVersion": "1:8.4p1-5+deb11u1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-20012",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssh: Public key information leak",
"Description": "** DISPUTED ** OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 4.3,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.9
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2016-20012",
"https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
"https://github.com/openssh/openssh-portable/pull/270",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
"https://nvd.nist.gov/vuln/detail/CVE-2016-20012",
"https://rushter.com/blog/public-ssh-keys/",
"https://security.netapp.com/advisory/ntap-20211014-0005/",
"https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
"https://www.openwall.com/lists/oss-security/2018/08/24/1"
],
"PublishedDate": "2021-09-15T20:15:00Z",
"LastModifiedDate": "2022-04-18T18:06:00Z"
},
{
"VulnerabilityID": "CVE-2018-15919",
"PkgName": "openssh-client",
"InstalledVersion": "1:8.4p1-5+deb11u1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-15919",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssh: User enumeration via malformed packets in authentication requests",
"Description": "Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or \"oracle\") as a vulnerability.'",
"Severity": "LOW",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"http://seclists.org/oss-sec/2018/q3/180",
"http://www.securityfocus.com/bid/105163",
"https://access.redhat.com/security/cve/CVE-2018-15919",
"https://security.netapp.com/advisory/ntap-20181221-0001/"
],
"PublishedDate": "2018-08-28T08:29:00Z",
"LastModifiedDate": "2019-03-07T16:29:00Z"
},
{
"VulnerabilityID": "CVE-2019-6110",
"PkgName": "openssh-client",
"InstalledVersion": "1:8.4p1-5+deb11u1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-6110",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output",
"Description": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.",
"Severity": "LOW",
"CweIDs": [
"CWE-838"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"V2Score": 4,
"V3Score": 6.8
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"V3Score": 3.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-6110",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://www.exploit-db.com/exploits/46193/"
],
"PublishedDate": "2019-01-31T18:29:00Z",
"LastModifiedDate": "2020-08-24T17:37:00Z"
},
{
"VulnerabilityID": "CVE-2020-14145",
"PkgName": "openssh-client",
"InstalledVersion": "1:8.4p1-5+deb11u1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-14145",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssh: Observable discrepancy leading to an information leak in the algorithm negotiation",
"Description": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.",
"Severity": "LOW",
"CweIDs": [
"CWE-203"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 4.3,
"V3Score": 5.9
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.9
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2020/12/02/1",
"https://access.redhat.com/security/cve/CVE-2020-14145",
"https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145",
"https://docs.ssh-mitm.at/CVE-2020-14145.html",
"https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
"https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
"https://linux.oracle.com/cve/CVE-2020-14145.html",
"https://linux.oracle.com/errata/ELSA-2021-4368.html",
"https://nvd.nist.gov/vuln/detail/CVE-2020-14145",
"https://security.gentoo.org/glsa/202105-35",
"https://security.netapp.com/advisory/ntap-20200709-0004/",
"https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/",
"https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf"
],
"PublishedDate": "2020-06-29T18:15:00Z",
"LastModifiedDate": "2022-04-28T19:34:00Z"
},
{
"VulnerabilityID": "CVE-2020-15778",
"PkgName": "openssh-client",
"InstalledVersion": "1:8.4p1-5+deb11u1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-15778",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssh: scp allows command injection when using backtick characters in the destination argument",
"Description": "** DISPUTED ** scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-78"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/articles/5284081",
"https://access.redhat.com/security/cve/CVE-2020-15778",
"https://github.com/cpandya2909/CVE-2020-15778",
"https://github.com/cpandya2909/CVE-2020-15778/",
"https://news.ycombinator.com/item?id=25005567",
"https://nvd.nist.gov/vuln/detail/CVE-2020-15778",
"https://security.netapp.com/advisory/ntap-20200731-0007/",
"https://www.openssh.com/security.html"
],
"PublishedDate": "2020-07-24T14:15:00Z",
"LastModifiedDate": "2021-06-22T14:47:00Z"
},
{
"VulnerabilityID": "CVE-2021-36368",
"PkgName": "openssh-client",
"InstalledVersion": "1:8.4p1-5+deb11u1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36368",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssh: possible bypass of fido 2 devices and ssh-askpass",
"Description": "** DISPUTED ** An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is \"this is not an authentication bypass, since nothing is being bypassed.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-287"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 2.6,
"V3Score": 3.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-36368",
"https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
"https://docs.ssh-mitm.at/trivialauth.html",
"https://github.com/openssh/openssh-portable/pull/258",
"https://nvd.nist.gov/vuln/detail/CVE-2021-36368",
"https://security-tracker.debian.org/tracker/CVE-2021-36368",
"https://www.openssh.com/security.html"
],
"PublishedDate": "2022-03-13T00:15:00Z",
"LastModifiedDate": "2022-07-01T17:21:00Z"
},
{
"VulnerabilityID": "CVE-2022-2097",
"PkgName": "openssl",
"InstalledVersion": "1.1.1n-0+deb11u3",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-2097",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssl: AES OCB fails to encrypt some bytes",
"Description": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-326"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2022:6224",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1292.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2068.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2097.json",
"https://access.redhat.com/security/cve/CVE-2022-2097",
"https://bugzilla.redhat.com/2081494",
"https://bugzilla.redhat.com/2087911",
"https://bugzilla.redhat.com/2087913",
"https://bugzilla.redhat.com/2097310",
"https://bugzilla.redhat.com/2104905",
"https://crates.io/crates/openssl-src",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097",
"https://errata.almalinux.org/9/ALSA-2022-6224.html",
"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431",
"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93",
"https://linux.oracle.com/cve/CVE-2022-2097.html",
"https://linux.oracle.com/errata/ELSA-2022-9751.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2097",
"https://rustsec.org/advisories/RUSTSEC-2022-0032.html",
"https://security.netapp.com/advisory/ntap-20220715-0011/",
"https://ubuntu.com/security/notices/USN-5502-1",
"https://www.openssl.org/news/secadv/20220705.txt"
],
"PublishedDate": "2022-07-05T11:15:00Z",
"LastModifiedDate": "2022-08-26T18:03:00Z"
},
{
"VulnerabilityID": "CVE-2007-6755",
"PkgName": "openssl",
"InstalledVersion": "1.1.1n-0+deb11u3",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-6755",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "Dual_EC_DRBG: weak pseudo random number generator",
"Description": "The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain \"skeleton key\" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE.",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"V2Score": 5.8
},
"redhat": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"V2Score": 5.8
}
},
"References": [
"http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/",
"http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html",
"http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html",
"http://rump2007.cr.yp.to/15-shumow.pdf",
"http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/",
"http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect",
"http://www.securityfocus.com/bid/63657",
"https://access.redhat.com/security/cve/CVE-2007-6755",
"https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html"
],
"PublishedDate": "2013-10-11T22:55:00Z",
"LastModifiedDate": "2021-11-30T18:57:00Z"
},
{
"VulnerabilityID": "CVE-2010-0928",
"PkgName": "openssl",
"InstalledVersion": "1.1.1n-0+deb11u3",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-0928",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "openssl: RSA authentication weakness",
"Description": "OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a \"fault-based attack.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-310"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:H/Au:N/C:C/I:N/A:N",
"V2Score": 4
}
},
"References": [
"http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/",
"http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf",
"http://www.networkworld.com/news/2010/030410-rsa-security-attack.html",
"http://www.osvdb.org/62808",
"http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/",
"https://access.redhat.com/security/cve/CVE-2010-0928",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/56750"
],
"PublishedDate": "2010-03-05T19:30:00Z",
"LastModifiedDate": "2017-08-17T01:32:00Z"
},
{
"VulnerabilityID": "CVE-2007-5686",
"PkgName": "passwd",
"InstalledVersion": "1:4.8.1-1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-5686",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...",
"Description": "initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts. NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.",
"Severity": "LOW",
"CweIDs": [
"CWE-264"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"V2Score": 4.9
}
},
"References": [
"http://secunia.com/advisories/27215",
"http://www.securityfocus.com/archive/1/482129/100/100/threaded",
"http://www.securityfocus.com/archive/1/482857/100/0/threaded",
"http://www.securityfocus.com/bid/26048",
"http://www.vupen.com/english/advisories/2007/3474",
"https://issues.rpath.com/browse/RPL-1825"
],
"PublishedDate": "2007-10-28T17:08:00Z",
"LastModifiedDate": "2018-10-15T21:45:00Z"
},
{
"VulnerabilityID": "CVE-2013-4235",
"PkgName": "passwd",
"InstalledVersion": "1:4.8.1-1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4235",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "shadow-utils: TOCTOU race conditions by copying and removing directory trees",
"Description": "shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees",
"Severity": "LOW",
"CweIDs": [
"CWE-367"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 3.3,
"V3Score": 4.7
},
"redhat": {
"V2Vector": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
"V2Score": 3.7,
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2013-4235",
"https://access.redhat.com/security/cve/cve-2013-4235",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://security-tracker.debian.org/tracker/CVE-2013-4235"
],
"PublishedDate": "2019-12-03T15:15:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2019-19882",
"PkgName": "passwd",
"InstalledVersion": "1:4.8.1-1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-19882",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "shadow-utils: local users can obtain root access because setuid programs are misconfigured",
"Description": "shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable for use with setuid account management tools. This combination leads to account management tools (groupadd, groupdel, groupmod, useradd, userdel, usermod) that can easily be used by unprivileged local users to escalate privileges to root in multiple ways. This issue became much more relevant in approximately December 2019 when an unrelated bug was fixed (i.e., the chmod calls to suidusbins were fixed in the upstream Makefile which is now included in the release version 4.8).",
"Severity": "LOW",
"CweIDs": [
"CWE-732"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 6.9,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2019-19882",
"https://bugs.archlinux.org/task/64836",
"https://bugs.gentoo.org/702252",
"https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75",
"https://github.com/shadow-maint/shadow/pull/199",
"https://github.com/void-linux/void-packages/pull/17580",
"https://security.gentoo.org/glsa/202008-09"
],
"PublishedDate": "2019-12-18T16:15:00Z",
"LastModifiedDate": "2020-08-25T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2010-4651",
"PkgName": "patch",
"InstalledVersion": "2.7.6-7",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4651",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "patch: directory traversal flaw allows for arbitrary file creation",
"Description": "Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.",
"Severity": "LOW",
"CweIDs": [
"CWE-22"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"V2Score": 5.8
},
"redhat": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V2Score": 2.1
}
},
"References": [
"http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1",
"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html",
"http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html",
"http://openwall.com/lists/oss-security/2011/01/05/10",
"http://openwall.com/lists/oss-security/2011/01/06/19",
"http://openwall.com/lists/oss-security/2011/01/06/20",
"http://openwall.com/lists/oss-security/2011/01/06/21",
"http://secunia.com/advisories/43663",
"http://secunia.com/advisories/43677",
"http://support.apple.com/kb/HT4723",
"http://www.securityfocus.com/bid/46768",
"http://www.vupen.com/english/advisories/2011/0600",
"https://access.redhat.com/security/cve/CVE-2010-4651",
"https://bugzilla.redhat.com/show_bug.cgi?id=667529",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651",
"https://ubuntu.com/security/notices/USN-2651-1"
],
"PublishedDate": "2011-03-11T22:55:00Z",
"LastModifiedDate": "2016-11-28T19:07:00Z"
},
{
"VulnerabilityID": "CVE-2018-6951",
"PkgName": "patch",
"InstalledVersion": "2.7.6-7",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-6951",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "patch: NULL pointer dereference in pch.c:intuit_diff_type() causes a crash",
"Description": "An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a \"mangled rename\" issue.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/103044",
"https://access.redhat.com/security/cve/CVE-2018-6951",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951",
"https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a",
"https://nvd.nist.gov/vuln/detail/CVE-2018-6951",
"https://savannah.gnu.org/bugs/index.php?53132",
"https://security.gentoo.org/glsa/201904-17",
"https://ubuntu.com/security/notices/USN-3624-1",
"https://usn.ubuntu.com/3624-1/"
],
"PublishedDate": "2018-02-13T19:29:00Z",
"LastModifiedDate": "2019-04-17T20:29:00Z"
},
{
"VulnerabilityID": "CVE-2018-6952",
"PkgName": "patch",
"InstalledVersion": "2.7.6-7",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-6952",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "patch: Double free of memory in pch.c:another_hunk() causes a crash",
"Description": "A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.",
"Severity": "LOW",
"CweIDs": [
"CWE-415"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://www.securityfocus.com/bid/103047",
"https://access.redhat.com/errata/RHSA-2019:2033",
"https://access.redhat.com/security/cve/CVE-2018-6952",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952",
"https://linux.oracle.com/cve/CVE-2018-6952.html",
"https://linux.oracle.com/errata/ELSA-2019-2033.html",
"https://nvd.nist.gov/vuln/detail/CVE-2018-6952",
"https://savannah.gnu.org/bugs/index.php?53133",
"https://security.gentoo.org/glsa/201904-17"
],
"PublishedDate": "2018-02-13T19:29:00Z",
"LastModifiedDate": "2019-04-17T20:29:00Z"
},
{
"VulnerabilityID": "CVE-2021-45261",
"PkgName": "patch",
"InstalledVersion": "2.7.6-7",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45261",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "patch: Invalid Pointer via another_hunk function",
"Description": "An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.",
"Severity": "LOW",
"CweIDs": [
"CWE-763"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-45261",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261",
"https://savannah.gnu.org/bugs/?61685"
],
"PublishedDate": "2021-12-22T18:15:00Z",
"LastModifiedDate": "2021-12-28T14:24:00Z"
},
{
"VulnerabilityID": "CVE-2020-16156",
"PkgName": "perl",
"InstalledVersion": "5.32.1-4+deb11u2",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-16156",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "perl-CPAN: Bypass of verification of signatures in CHECKSUMS files",
"Description": "CPAN 2.28 allows Signature Verification Bypass.",
"Severity": "HIGH",
"CweIDs": [
"CWE-347"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html",
"https://access.redhat.com/security/cve/CVE-2020-16156",
"https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/",
"https://metacpan.org/pod/distribution/CPAN/scripts/cpan"
],
"PublishedDate": "2021-12-13T18:15:00Z",
"LastModifiedDate": "2022-04-01T13:26:00Z"
},
{
"VulnerabilityID": "CVE-2011-4116",
"PkgName": "perl",
"InstalledVersion": "5.32.1-4+deb11u2",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-4116",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "perl: File::Temp insecure temporary file handling",
"Description": "_is_safe in the File::Temp module for Perl does not properly handle symlinks.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"V2Score": 1.9
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2011/11/04/2",
"http://www.openwall.com/lists/oss-security/2011/11/04/4",
"https://access.redhat.com/security/cve/CVE-2011-4116",
"https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14",
"https://rt.cpan.org/Public/Bug/Display.html?id=69106",
"https://seclists.org/oss-sec/2011/q4/238"
],
"PublishedDate": "2020-01-31T18:15:00Z",
"LastModifiedDate": "2020-02-05T22:10:00Z"
},
{
"VulnerabilityID": "CVE-2020-16156",
"PkgName": "perl-base",
"InstalledVersion": "5.32.1-4+deb11u2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-16156",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "perl-CPAN: Bypass of verification of signatures in CHECKSUMS files",
"Description": "CPAN 2.28 allows Signature Verification Bypass.",
"Severity": "HIGH",
"CweIDs": [
"CWE-347"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html",
"https://access.redhat.com/security/cve/CVE-2020-16156",
"https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/",
"https://metacpan.org/pod/distribution/CPAN/scripts/cpan"
],
"PublishedDate": "2021-12-13T18:15:00Z",
"LastModifiedDate": "2022-04-01T13:26:00Z"
},
{
"VulnerabilityID": "CVE-2011-4116",
"PkgName": "perl-base",
"InstalledVersion": "5.32.1-4+deb11u2",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-4116",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "perl: File::Temp insecure temporary file handling",
"Description": "_is_safe in the File::Temp module for Perl does not properly handle symlinks.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"V2Score": 1.9
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2011/11/04/2",
"http://www.openwall.com/lists/oss-security/2011/11/04/4",
"https://access.redhat.com/security/cve/CVE-2011-4116",
"https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14",
"https://rt.cpan.org/Public/Bug/Display.html?id=69106",
"https://seclists.org/oss-sec/2011/q4/238"
],
"PublishedDate": "2020-01-31T18:15:00Z",
"LastModifiedDate": "2020-02-05T22:10:00Z"
},
{
"VulnerabilityID": "CVE-2020-16156",
"PkgName": "perl-modules-5.32",
"InstalledVersion": "5.32.1-4+deb11u2",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-16156",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "perl-CPAN: Bypass of verification of signatures in CHECKSUMS files",
"Description": "CPAN 2.28 allows Signature Verification Bypass.",
"Severity": "HIGH",
"CweIDs": [
"CWE-347"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
}
},
"References": [
"http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html",
"https://access.redhat.com/security/cve/CVE-2020-16156",
"https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/",
"https://metacpan.org/pod/distribution/CPAN/scripts/cpan"
],
"PublishedDate": "2021-12-13T18:15:00Z",
"LastModifiedDate": "2022-04-01T13:26:00Z"
},
{
"VulnerabilityID": "CVE-2011-4116",
"PkgName": "perl-modules-5.32",
"InstalledVersion": "5.32.1-4+deb11u2",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-4116",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "perl: File::Temp insecure temporary file handling",
"Description": "_is_safe in the File::Temp module for Perl does not properly handle symlinks.",
"Severity": "LOW",
"CweIDs": [
"CWE-59"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"V2Score": 1.9
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2011/11/04/2",
"http://www.openwall.com/lists/oss-security/2011/11/04/4",
"https://access.redhat.com/security/cve/CVE-2011-4116",
"https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14",
"https://rt.cpan.org/Public/Bug/Display.html?id=69106",
"https://seclists.org/oss-sec/2011/q4/238"
],
"PublishedDate": "2020-01-31T18:15:00Z",
"LastModifiedDate": "2020-02-05T22:10:00Z"
},
{
"VulnerabilityID": "CVE-2015-20107",
"PkgName": "python3.9",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2015-20107",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python(mailcap): findmatch() function does not sanitise the second argument",
"Description": "In Python (aka CPython) through 3.10.4, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments).",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-77"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 10,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"V3Score": 7.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2015-20107",
"https://bugs.python.org/issue24778",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107",
"https://github.com/python/cpython/issues/68966",
"https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80",
"https://github.com/python/cpython/pull/91993",
"https://linux.oracle.com/cve/CVE-2015-20107.html",
"https://linux.oracle.com/errata/ELSA-2022-6457.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/53TQZFLS6O3FLIMVSXFEEPZSWLDZLBOX/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57NECACX333A3BBZM2TR2VZ4ZE3UG3SN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DBVY4YC2P6EPZZ2DROOXHDOWZ4BJFLW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIKVSW3H6W2GQGDE5DTIWLGFNH6KKEW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKGMYDVKI3XNM27B6I6RQ6QV3TVJAUCG/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3LNY2NHM6J22O6Q5ANOE3SZRK3OACKR/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPCLGZZJPVXFWUWVV5WCD5FNUAFLKBDN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAI2GBC7WKH7J5NH6J2IW5RT3VF2SF5M/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTTZGLD2YBMMG6U6F5HOTPOGGPBIURMA/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/",
"https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/",
"https://nvd.nist.gov/vuln/detail/CVE-2015-20107",
"https://security.netapp.com/advisory/ntap-20220616-0001/",
"https://ubuntu.com/security/notices/USN-5519-1"
],
"PublishedDate": "2022-04-13T16:15:00Z",
"LastModifiedDate": "2022-07-08T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-29921",
"PkgName": "python3.9",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-29921",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python-ipaddress: Improper input validation of octal strings",
"Description": "In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.",
"Severity": "CRITICAL",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"V3Score": 9.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-29921",
"https://bugs.python.org/issue36384",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921",
"https://docs.python.org/3/library/ipaddress.html",
"https://errata.almalinux.org/8/ALSA-2021-4162.html",
"https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst",
"https://github.com/python/cpython/pull/12577",
"https://github.com/python/cpython/pull/25099",
"https://github.com/sickcodes",
"https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md",
"https://linux.oracle.com/cve/CVE-2021-29921.html",
"https://linux.oracle.com/errata/ELSA-2021-4162.html",
"https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html",
"https://security.netapp.com/advisory/ntap-20210622-0003/",
"https://sick.codes/sick-2021-014",
"https://ubuntu.com/security/notices/USN-4973-1",
"https://ubuntu.com/security/notices/USN-4973-2",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-05-06T13:15:00Z",
"LastModifiedDate": "2022-07-25T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-10735",
"PkgName": "python3.9",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-10735",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS",
"Description": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2022/09/21/1",
"http://www.openwall.com/lists/oss-security/2022/09/21/4",
"https://access.redhat.com/security/cve/CVE-2020-10735",
"https://bugzilla.redhat.com/show_bug.cgi?id=1834423",
"https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y",
"https://github.com/python/cpython/issues/95778",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/"
],
"PublishedDate": "2022-09-09T14:15:00Z",
"LastModifiedDate": "2022-09-23T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3737",
"PkgName": "python3.9",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3737",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib: HTTP client possible infinite loop on a 100 Continue response",
"Description": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-400",
"CWE-835"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3737.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4189.json",
"https://access.redhat.com/security/cve/CVE-2021-3737",
"https://bugs.python.org/issue44022",
"https://bugzilla.redhat.com/show_bug.cgi?id=1995162",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737",
"https://errata.almalinux.org/8/ALSA-2022-1986.html",
"https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)",
"https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)",
"https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14",
"https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)",
"https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)",
"https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)",
"https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)",
"https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)",
"https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)",
"https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)",
"https://github.com/python/cpython/pull/25916",
"https://github.com/python/cpython/pull/26503",
"https://linux.oracle.com/cve/CVE-2021-3737.html",
"https://linux.oracle.com/errata/ELSA-2022-1986.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3737",
"https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html",
"https://security.netapp.com/advisory/ntap-20220407-0009/",
"https://ubuntu.com/security/CVE-2021-3737",
"https://ubuntu.com/security/notices/USN-5083-1",
"https://ubuntu.com/security/notices/USN-5199-1",
"https://ubuntu.com/security/notices/USN-5200-1",
"https://ubuntu.com/security/notices/USN-5201-1",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2022-03-04T19:15:00Z",
"LastModifiedDate": "2022-07-25T18:16:00Z"
},
{
"VulnerabilityID": "CVE-2022-0391",
"PkgName": "python3.9",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0391",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib.parse does not sanitize URLs containing ASCII newline and tabs",
"Description": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\\r' and '\\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.",
"Severity": "HIGH",
"CweIDs": [
"CWE-74"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0391",
"https://bugs.python.org/issue43882",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391",
"https://errata.almalinux.org/8/ALSA-2022-1821.html",
"https://linux.oracle.com/cve/CVE-2022-0391.html",
"https://linux.oracle.com/errata/ELSA-2022-6457.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0391",
"https://security.netapp.com/advisory/ntap-20220225-0009/",
"https://ubuntu.com/security/notices/USN-5342-1",
"https://www.oracle.com/security-alerts/cpuapr2022.html"
],
"PublishedDate": "2022-02-09T23:15:00Z",
"LastModifiedDate": "2022-06-16T21:23:00Z"
},
{
"VulnerabilityID": "CVE-2021-3426",
"PkgName": "python3.9",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3426",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: Information disclosure via pydoc",
"Description": "There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-200",
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 2.7,
"V3Score": 5.7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3426",
"https://bugzilla.redhat.com/show_bug.cgi?id=1935913",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426",
"https://github.com/python/cpython/pull/24285",
"https://github.com/python/cpython/pull/24337",
"https://linux.oracle.com/cve/CVE-2021-3426.html",
"https://linux.oracle.com/errata/ELSA-2021-9562.html",
"https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/",
"https://python-security.readthedocs.io/vuln/pydoc-getfile.html",
"https://security.gentoo.org/glsa/202104-04",
"https://security.netapp.com/advisory/ntap-20210629-0003/",
"https://ubuntu.com/security/notices/USN-5342-1",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-05-20T13:15:00Z",
"LastModifiedDate": "2022-03-01T15:29:00Z"
},
{
"VulnerabilityID": "CVE-2021-3733",
"PkgName": "python3.9",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3733",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib: Regular expression DoS in AbstractBasicAuthHandler",
"Description": "There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3733",
"https://bugs.python.org/issue43075",
"https://bugzilla.redhat.com/show_bug.cgi?id=1995234",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733",
"https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final",
"https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final",
"https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final",
"https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final",
"https://errata.almalinux.org/8/ALSA-2022-1821.html",
"https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)",
"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb",
"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)",
"https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)",
"https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)",
"https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)",
"https://github.com/python/cpython/pull/24391",
"https://linux.oracle.com/cve/CVE-2021-3733.html",
"https://linux.oracle.com/errata/ELSA-2022-1821.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3733",
"https://security.netapp.com/advisory/ntap-20220407-0001/",
"https://ubuntu.com/security/CVE-2021-3733",
"https://ubuntu.com/security/notices/USN-5083-1",
"https://ubuntu.com/security/notices/USN-5199-1",
"https://ubuntu.com/security/notices/USN-5200-1"
],
"PublishedDate": "2022-03-10T17:42:00Z",
"LastModifiedDate": "2022-06-14T14:38:00Z"
},
{
"VulnerabilityID": "CVE-2021-4189",
"PkgName": "python3.9",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4189",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: ftplib should not use the host from the PASV response",
"Description": "A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-252"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3737.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4189.json",
"https://access.redhat.com/security/cve/CVE-2021-4189",
"https://bugs.python.org/issue43285",
"https://bugzilla.redhat.com/show_bug.cgi?id=2036020",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189",
"https://errata.almalinux.org/8/ALSA-2022-1986.html",
"https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e",
"https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)",
"https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)",
"https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)",
"https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)",
"https://linux.oracle.com/cve/CVE-2021-4189.html",
"https://linux.oracle.com/errata/ELSA-2022-1986.html",
"https://python-security.readthedocs.io/vuln/ftplib-pasv.html",
"https://security-tracker.debian.org/tracker/CVE-2021-4189",
"https://ubuntu.com/security/notices/USN-5342-1"
],
"PublishedDate": "2022-08-24T16:15:00Z",
"LastModifiedDate": "2022-08-29T13:31:00Z"
},
{
"VulnerabilityID": "CVE-2020-27619",
"PkgName": "python3.9",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-27619",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: Unsafe use of eval() on data retrieved via HTTP in the test suite",
"Description": "In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-27619",
"https://bugs.python.org/issue41944",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619",
"https://errata.almalinux.org/8/ALSA-2021-4162.html",
"https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8",
"https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9",
"https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33",
"https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794",
"https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b",
"https://linux.oracle.com/cve/CVE-2020-27619.html",
"https://linux.oracle.com/errata/ELSA-2021-4151.html",
"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
"https://nvd.nist.gov/vuln/detail/CVE-2020-27619",
"https://security.netapp.com/advisory/ntap-20201123-0004/",
"https://ubuntu.com/security/notices/USN-4754-1",
"https://ubuntu.com/security/notices/USN-4754-3",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2020-10-22T03:16:00Z",
"LastModifiedDate": "2022-07-25T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-28861",
"PkgName": "python3.9",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-28861",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: an open redirection vulnerability in lib/http/server.py may lead to information disclosure",
"Description": "** DISPUTED ** Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-601"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"V3Score": 7.4
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"V3Score": 7.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-28861",
"https://bugs.python.org/issue43223",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861",
"https://github.com/python/cpython/pull/24848",
"https://github.com/python/cpython/pull/93879",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-28861",
"https://ubuntu.com/security/notices/USN-5629-1"
],
"PublishedDate": "2022-08-23T01:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2015-20107",
"PkgName": "python3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2015-20107",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python(mailcap): findmatch() function does not sanitise the second argument",
"Description": "In Python (aka CPython) through 3.10.4, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments).",
"Severity": "CRITICAL",
"CweIDs": [
"CWE-77"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 10,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"V3Score": 7.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2015-20107",
"https://bugs.python.org/issue24778",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107",
"https://github.com/python/cpython/issues/68966",
"https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80",
"https://github.com/python/cpython/pull/91993",
"https://linux.oracle.com/cve/CVE-2015-20107.html",
"https://linux.oracle.com/errata/ELSA-2022-6457.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/53TQZFLS6O3FLIMVSXFEEPZSWLDZLBOX/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57NECACX333A3BBZM2TR2VZ4ZE3UG3SN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DBVY4YC2P6EPZZ2DROOXHDOWZ4BJFLW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIKVSW3H6W2GQGDE5DTIWLGFNH6KKEW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKGMYDVKI3XNM27B6I6RQ6QV3TVJAUCG/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3LNY2NHM6J22O6Q5ANOE3SZRK3OACKR/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPCLGZZJPVXFWUWVV5WCD5FNUAFLKBDN/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAI2GBC7WKH7J5NH6J2IW5RT3VF2SF5M/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTTZGLD2YBMMG6U6F5HOTPOGGPBIURMA/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/",
"https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/",
"https://nvd.nist.gov/vuln/detail/CVE-2015-20107",
"https://security.netapp.com/advisory/ntap-20220616-0001/",
"https://ubuntu.com/security/notices/USN-5519-1"
],
"PublishedDate": "2022-04-13T16:15:00Z",
"LastModifiedDate": "2022-07-08T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-29921",
"PkgName": "python3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-29921",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python-ipaddress: Improper input validation of octal strings",
"Description": "In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.",
"Severity": "CRITICAL",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"V3Score": 9.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-29921",
"https://bugs.python.org/issue36384",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921",
"https://docs.python.org/3/library/ipaddress.html",
"https://errata.almalinux.org/8/ALSA-2021-4162.html",
"https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst",
"https://github.com/python/cpython/pull/12577",
"https://github.com/python/cpython/pull/25099",
"https://github.com/sickcodes",
"https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md",
"https://linux.oracle.com/cve/CVE-2021-29921.html",
"https://linux.oracle.com/errata/ELSA-2021-4162.html",
"https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html",
"https://security.netapp.com/advisory/ntap-20210622-0003/",
"https://sick.codes/sick-2021-014",
"https://ubuntu.com/security/notices/USN-4973-1",
"https://ubuntu.com/security/notices/USN-4973-2",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-05-06T13:15:00Z",
"LastModifiedDate": "2022-07-25T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-10735",
"PkgName": "python3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-10735",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS",
"Description": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-704"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"http://www.openwall.com/lists/oss-security/2022/09/21/1",
"http://www.openwall.com/lists/oss-security/2022/09/21/4",
"https://access.redhat.com/security/cve/CVE-2020-10735",
"https://bugzilla.redhat.com/show_bug.cgi?id=1834423",
"https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y",
"https://github.com/python/cpython/issues/95778",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/"
],
"PublishedDate": "2022-09-09T14:15:00Z",
"LastModifiedDate": "2022-09-23T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-3737",
"PkgName": "python3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3737",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib: HTTP client possible infinite loop on a 100 Continue response",
"Description": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.",
"Severity": "HIGH",
"CweIDs": [
"CWE-400",
"CWE-835"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.1,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3737.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4189.json",
"https://access.redhat.com/security/cve/CVE-2021-3737",
"https://bugs.python.org/issue44022",
"https://bugzilla.redhat.com/show_bug.cgi?id=1995162",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737",
"https://errata.almalinux.org/8/ALSA-2022-1986.html",
"https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)",
"https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)",
"https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14",
"https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)",
"https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)",
"https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)",
"https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)",
"https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)",
"https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)",
"https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)",
"https://github.com/python/cpython/pull/25916",
"https://github.com/python/cpython/pull/26503",
"https://linux.oracle.com/cve/CVE-2021-3737.html",
"https://linux.oracle.com/errata/ELSA-2022-1986.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3737",
"https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html",
"https://security.netapp.com/advisory/ntap-20220407-0009/",
"https://ubuntu.com/security/CVE-2021-3737",
"https://ubuntu.com/security/notices/USN-5083-1",
"https://ubuntu.com/security/notices/USN-5199-1",
"https://ubuntu.com/security/notices/USN-5200-1",
"https://ubuntu.com/security/notices/USN-5201-1",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2022-03-04T19:15:00Z",
"LastModifiedDate": "2022-07-25T18:16:00Z"
},
{
"VulnerabilityID": "CVE-2022-0391",
"PkgName": "python3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0391",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib.parse does not sanitize URLs containing ASCII newline and tabs",
"Description": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\\r' and '\\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.",
"Severity": "HIGH",
"CweIDs": [
"CWE-74"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0391",
"https://bugs.python.org/issue43882",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391",
"https://errata.almalinux.org/8/ALSA-2022-1821.html",
"https://linux.oracle.com/cve/CVE-2022-0391.html",
"https://linux.oracle.com/errata/ELSA-2022-6457.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0391",
"https://security.netapp.com/advisory/ntap-20220225-0009/",
"https://ubuntu.com/security/notices/USN-5342-1",
"https://www.oracle.com/security-alerts/cpuapr2022.html"
],
"PublishedDate": "2022-02-09T23:15:00Z",
"LastModifiedDate": "2022-06-16T21:23:00Z"
},
{
"VulnerabilityID": "CVE-2021-3426",
"PkgName": "python3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3426",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: Information disclosure via pydoc",
"Description": "There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-200",
"CWE-200"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 2.7,
"V3Score": 5.7
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3426",
"https://bugzilla.redhat.com/show_bug.cgi?id=1935913",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426",
"https://github.com/python/cpython/pull/24285",
"https://github.com/python/cpython/pull/24337",
"https://linux.oracle.com/cve/CVE-2021-3426.html",
"https://linux.oracle.com/errata/ELSA-2021-9562.html",
"https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/",
"https://python-security.readthedocs.io/vuln/pydoc-getfile.html",
"https://security.gentoo.org/glsa/202104-04",
"https://security.netapp.com/advisory/ntap-20210629-0003/",
"https://ubuntu.com/security/notices/USN-5342-1",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-05-20T13:15:00Z",
"LastModifiedDate": "2022-03-01T15:29:00Z"
},
{
"VulnerabilityID": "CVE-2021-3733",
"PkgName": "python3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-3733",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: urllib: Regular expression DoS in AbstractBasicAuthHandler",
"Description": "There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-3733",
"https://bugs.python.org/issue43075",
"https://bugzilla.redhat.com/show_bug.cgi?id=1995234",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733",
"https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final",
"https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final",
"https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final",
"https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final",
"https://errata.almalinux.org/8/ALSA-2022-1821.html",
"https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)",
"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb",
"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)",
"https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)",
"https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)",
"https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)",
"https://github.com/python/cpython/pull/24391",
"https://linux.oracle.com/cve/CVE-2021-3733.html",
"https://linux.oracle.com/errata/ELSA-2022-1821.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-3733",
"https://security.netapp.com/advisory/ntap-20220407-0001/",
"https://ubuntu.com/security/CVE-2021-3733",
"https://ubuntu.com/security/notices/USN-5083-1",
"https://ubuntu.com/security/notices/USN-5199-1",
"https://ubuntu.com/security/notices/USN-5200-1"
],
"PublishedDate": "2022-03-10T17:42:00Z",
"LastModifiedDate": "2022-06-14T14:38:00Z"
},
{
"VulnerabilityID": "CVE-2021-4189",
"PkgName": "python3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4189",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: ftplib should not use the host from the PASV response",
"Description": "A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-252"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3737.json",
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4189.json",
"https://access.redhat.com/security/cve/CVE-2021-4189",
"https://bugs.python.org/issue43285",
"https://bugzilla.redhat.com/show_bug.cgi?id=2036020",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189",
"https://errata.almalinux.org/8/ALSA-2022-1986.html",
"https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e",
"https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)",
"https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)",
"https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)",
"https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)",
"https://linux.oracle.com/cve/CVE-2021-4189.html",
"https://linux.oracle.com/errata/ELSA-2022-1986.html",
"https://python-security.readthedocs.io/vuln/ftplib-pasv.html",
"https://security-tracker.debian.org/tracker/CVE-2021-4189",
"https://ubuntu.com/security/notices/USN-5342-1"
],
"PublishedDate": "2022-08-24T16:15:00Z",
"LastModifiedDate": "2022-08-29T13:31:00Z"
},
{
"VulnerabilityID": "CVE-2020-27619",
"PkgName": "python3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-27619",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: Unsafe use of eval() on data retrieved via HTTP in the test suite",
"Description": "In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V2Score": 7.5,
"V3Score": 9.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-27619",
"https://bugs.python.org/issue41944",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619",
"https://errata.almalinux.org/8/ALSA-2021-4162.html",
"https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8",
"https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9",
"https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33",
"https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794",
"https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b",
"https://linux.oracle.com/cve/CVE-2020-27619.html",
"https://linux.oracle.com/errata/ELSA-2021-4151.html",
"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
"https://nvd.nist.gov/vuln/detail/CVE-2020-27619",
"https://security.netapp.com/advisory/ntap-20201123-0004/",
"https://ubuntu.com/security/notices/USN-4754-1",
"https://ubuntu.com/security/notices/USN-4754-3",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2020-10-22T03:16:00Z",
"LastModifiedDate": "2022-07-25T18:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-28861",
"PkgName": "python3.9-minimal",
"InstalledVersion": "3.9.2-1",
"Layer": {
"Digest": "sha256:8471b75885efc7790a16be5328e3b368567b76a60fc3feabd6869c15e175ee05",
"DiffID": "sha256:bcc8223cbebfa8bedef4f74a0914f383e7bf1ab0db7c7f110e37084860e04e10"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-28861",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "python: an open redirection vulnerability in lib/http/server.py may lead to information disclosure",
"Description": "** DISPUTED ** Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"",
"Severity": "LOW",
"CweIDs": [
"CWE-601"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"V3Score": 7.4
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"V3Score": 7.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-28861",
"https://bugs.python.org/issue43223",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861",
"https://github.com/python/cpython/pull/24848",
"https://github.com/python/cpython/pull/93879",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-28861",
"https://ubuntu.com/security/notices/USN-5629-1"
],
"PublishedDate": "2022-08-23T01:15:00Z",
"LastModifiedDate": "2022-09-22T03:15:00Z"
},
{
"VulnerabilityID": "CVE-2005-2541",
"PkgName": "tar",
"InstalledVersion": "1.34+dfsg-1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-2541",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "tar: does not properly warn the user when extracting setuid or setgid files",
"Description": "Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.",
"Severity": "LOW",
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"V2Score": 10
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7
}
},
"References": [
"http://marc.info/?l=bugtraq&m=112327628230258&w=2",
"https://access.redhat.com/security/cve/CVE-2005-2541",
"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E"
],
"PublishedDate": "2005-08-10T04:00:00Z",
"LastModifiedDate": "2021-06-18T15:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-4217",
"PkgName": "unzip",
"InstalledVersion": "6.0-26+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4217",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "unzip: Null pointer dereference in Unicode strings code",
"Description": "A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.",
"Severity": "LOW",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V3Score": 7.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 4.7
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-4217",
"https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1957077",
"https://bugzilla.redhat.com/show_bug.cgi?id=2044583",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217",
"https://nvd.nist.gov/vuln/detail/CVE-2021-4217"
],
"PublishedDate": "2022-08-24T16:15:00Z",
"LastModifiedDate": "2022-08-29T13:18:00Z"
},
{
"VulnerabilityID": "CVE-2022-0563",
"PkgName": "util-linux",
"InstalledVersion": "2.36.1-8+deb11u1",
"Layer": {
"Digest": "sha256:23858da423a6737f0467fab0014e5b53009ea7405d575636af0c3f100bbb2f10",
"DiffID": "sha256:b9fcb0f781e4bcde2c9f7f27cb93c549f6c6ecfdc7fdcc783813347e97faf19c"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
"Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
"Severity": "LOW",
"CweIDs": [
"CWE-209"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0563",
"https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
"https://security.netapp.com/advisory/ntap-20220331-0002/"
],
"PublishedDate": "2022-02-21T19:15:00Z",
"LastModifiedDate": "2022-06-03T14:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-0563",
"PkgName": "uuid-dev",
"InstalledVersion": "2.36.1-8+deb11u1",
"Layer": {
"Digest": "sha256:8ffa7aaef4041744c03222b6b241a78a3b4ab9e8a8b99fb633a1f14b42f8bc56",
"DiffID": "sha256:b78efdac8138b52393aa31987588596dd8da798710af1c7d1d975314e660b5fc"
},
"SeveritySource": "debian",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
"Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
"Severity": "LOW",
"CweIDs": [
"CWE-209"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-0563",
"https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
"https://security.netapp.com/advisory/ntap-20220331-0002/"
],
"PublishedDate": "2022-02-21T19:15:00Z",
"LastModifiedDate": "2022-06-03T14:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-31879",
"PkgName": "wget",
"InstalledVersion": "1.21-1+deb11u1",
"Layer": {
"Digest": "sha256:326f452ade5c33097eba4ba88a24bd77a93a3d994d4dc39b936482655e664857",
"DiffID": "sha256:54b354c15c5a2fd95f78e697e7c857fe17984cd427715fceec2497f47c952b41"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-31879",
"DataSource": {
"ID": "debian",
"Name": "Debian Security Tracker",
"URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
},
"Title": "wget: authorization header disclosure on redirect",
"Description": "GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-601"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"V2Score": 5.8,
"V3Score": 6.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-31879",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879",
"https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-31879",
"https://savannah.gnu.org/bugs/?56909",
"https://security.netapp.com/advisory/ntap-20210618-0002/"
],
"PublishedDate": "2021-04-29T05:15:00Z",
"LastModifiedDate": "2022-05-13T20:52:00Z"
}
]
}
]
}