Tom Gates created GUACAMOLE-1368:
------------------------------------

             Summary: Latest docker image fails security scans.
                 Key: GUACAMOLE-1368
                 URL: https://issues.apache.org/jira/browse/GUACAMOLE-1368
             Project: Guacamole
          Issue Type: Bug
          Components: guacamole
    Affects Versions: 1.3.0
         Environment: Docker
            Reporter: Tom Gates


```

tgates@MacBook-Pro ~
 % git pull guacamole/guacamole:1.3.0 !10100
fatal: not a git repository (or any of the parent directories): .git

tgates@MacBook-Pro ~
 % docker pull guacamole/guacamole:1.3.0 !10101
1.3.0: Pulling from guacamole/guacamole
Digest: sha256:739cb6820ae884827ceaaa87b45b8802769649c848d737584aea79d999177dc3
Status: Downloaded newer image for guacamole/guacamole:1.3.0
docker.io/guacamole/guacamole:1.3.0

tgates@MacBook-Pro ~
 % docker scan guacamole/guacamole:1.3.0 !10102

Testing guacamole/guacamole:1.3.0...

✗ Low severity vulnerability found in tar
 Description: Out-of-bounds Read
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-TAR-1063001
 Introduced through: meta-common-packages@meta
 From: meta-common-packages@meta > [email protected]+dfsg-6

✗ Low severity vulnerability found in tar
 Description: CVE-2005-2541
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-TAR-312331
 Introduced through: meta-common-packages@meta
 From: meta-common-packages@meta > [email protected]+dfsg-6

✗ Low severity vulnerability found in tar
 Description: NULL Pointer Dereference
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-TAR-341203
 Introduced through: meta-common-packages@meta
 From: meta-common-packages@meta > [email protected]+dfsg-6

✗ Low severity vulnerability found in systemd/libsystemd0
 Description: Authentication Bypass
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-1291056
 Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected], 
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
 From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
 From: [email protected] > apt/[email protected] > 
systemd/libsystemd0@241-7~deb10u5
 From: util-linux/[email protected] > [email protected] > 
systemd/libsystemd0@241-7~deb10u5
 and 4 more...

✗ Low severity vulnerability found in systemd/libsystemd0
 Description: Link Following
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-305144
 Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected], 
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
 From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
 From: [email protected] > apt/[email protected] > 
systemd/libsystemd0@241-7~deb10u5
 From: util-linux/[email protected] > [email protected] > 
systemd/libsystemd0@241-7~deb10u5
 and 4 more...

✗ Low severity vulnerability found in systemd/libsystemd0
 Description: Missing Release of Resource after Effective Lifetime
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-542807
 Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected], 
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
 From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
 From: [email protected] > apt/[email protected] > 
systemd/libsystemd0@241-7~deb10u5
 From: util-linux/[email protected] > [email protected] > 
systemd/libsystemd0@241-7~deb10u5
 and 4 more...

✗ Low severity vulnerability found in systemd/libsystemd0
 Description: Improper Input Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-570991
 Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected], 
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
 From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
 From: [email protected] > apt/[email protected] > 
systemd/libsystemd0@241-7~deb10u5
 From: util-linux/[email protected] > [email protected] > 
systemd/libsystemd0@241-7~deb10u5
 and 4 more...

✗ Low severity vulnerability found in sqlite3/libsqlite3-0
 Description: Improper Input Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-535712
 Introduced through: gnupg2/[email protected]+deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1

✗ Low severity vulnerability found in sqlite3/libsqlite3-0
 Description: Use After Free
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-565214
 Introduced through: gnupg2/[email protected]+deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1

✗ Low severity vulnerability found in shadow/passwd
 Description: Time-of-check Time-of-use (TOCTOU)
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-306205
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2, 
gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1, 
util-linux/[email protected]
 From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
 From: gnupg2/[email protected]+deb10u1 > [email protected] > shadow/passwd@1:4.5-1.1
 From: shadow/login@1:4.5-1.1
 and 1 more...

✗ Low severity vulnerability found in shadow/passwd
 Description: Incorrect Permission Assignment for Critical Resource
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-306230
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2, 
gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1, 
util-linux/[email protected]
 From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
 From: gnupg2/[email protected]+deb10u1 > [email protected] > shadow/passwd@1:4.5-1.1
 From: shadow/login@1:4.5-1.1
 and 1 more...

✗ Low severity vulnerability found in shadow/passwd
 Description: Access Restriction Bypass
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-306250
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2, 
gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1, 
util-linux/[email protected]
 From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
 From: gnupg2/[email protected]+deb10u1 > [email protected] > shadow/passwd@1:4.5-1.1
 From: shadow/login@1:4.5-1.1
 and 1 more...

✗ Low severity vulnerability found in shadow/passwd
 Description: Incorrect Permission Assignment for Critical Resource
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-539852
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2, 
gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1, 
util-linux/[email protected]
 From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
 From: gnupg2/[email protected]+deb10u1 > [email protected] > shadow/passwd@1:4.5-1.1
 From: shadow/login@1:4.5-1.1
 and 1 more...

✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
 Description: Cryptographic Issues
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-306560
 Introduced through: [email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 and 7 more...

✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
 Description: Arbitrary Code Injection
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-306596
 Introduced through: [email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 and 7 more...

✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
 Description: Arbitrary Code Injection
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-474393
 Introduced through: [email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 and 7 more...

✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
 Description: Resource Exhaustion
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-543815
 Introduced through: [email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 and 7 more...

✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
 Description: Resource Exhaustion
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-546420
 Introduced through: [email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 and 7 more...

✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
 Description: Improper Input Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-584372
 Introduced through: [email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 and 7 more...

✗ Low severity vulnerability found in python-defaults/libpython2-stdlib
 Description: Link Following
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHONDEFAULTS-269278
 Introduced through: [email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python-defaults/[email protected]
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > python-defaults/[email protected]
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected]
 and 5 more...

✗ Low severity vulnerability found in perl
 Description: Link Following
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PERL-327793
 Introduced through: git@1:2.20.1-2+deb10u3, meta-common-packages@meta
 From: git@1:2.20.1-2+deb10u3 > [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > [email protected] > [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > [email protected]+deb10u1 > 
perl/[email protected]+deb10u1
 and 3 more...

✗ Low severity vulnerability found in pcre3/libpcre3
 Description: Out-of-Bounds
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345321
 Introduced through: meta-common-packages@meta
 From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12

✗ Low severity vulnerability found in pcre3/libpcre3
 Description: Out-of-Bounds
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345353
 Introduced through: meta-common-packages@meta
 From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12

✗ Low severity vulnerability found in pcre3/libpcre3
 Description: Uncontrolled Recursion
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345502
 Introduced through: meta-common-packages@meta
 From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12

✗ Low severity vulnerability found in pcre3/libpcre3
 Description: Out-of-Bounds
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345530
 Introduced through: meta-common-packages@meta
 From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12

✗ Low severity vulnerability found in pcre3/libpcre3
 Description: Out-of-bounds Read
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-572368
 Introduced through: meta-common-packages@meta
 From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12

✗ Low severity vulnerability found in openssl/libssl1.1
 Description: Cryptographic Issues
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-374709
 Introduced through: openssl/[email protected]+deb10u4, 
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
 From: openssl/[email protected]+deb10u4
 From: openssh/openssh-client@1:7.9p1-10+deb10u2 > 
openssl/[email protected]+deb10u4
 From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 > 
openssl/[email protected]+deb10u4
 and 6 more...

✗ Low severity vulnerability found in openssl/libssl1.1
 Description: Cryptographic Issues
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-374996
 Introduced through: openssl/[email protected]+deb10u4, 
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
 From: openssl/[email protected]+deb10u4
 From: openssh/openssh-client@1:7.9p1-10+deb10u2 > 
openssl/[email protected]+deb10u4
 From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 > 
openssl/[email protected]+deb10u4
 and 6 more...

✗ Low severity vulnerability found in openssh/openssh-client
 Description: Information Exposure
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-368617
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
 From: openssh/openssh-client@1:7.9p1-10+deb10u2

✗ Low severity vulnerability found in openssh/openssh-client
 Description: Access Restriction Bypass
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-368833
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
 From: openssh/openssh-client@1:7.9p1-10+deb10u2

✗ Low severity vulnerability found in openssh/openssh-client
 Description: Information Exposure
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-368925
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
 From: openssh/openssh-client@1:7.9p1-10+deb10u2

✗ Low severity vulnerability found in openssh/openssh-client
 Description: Improper Authentication
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-369016
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
 From: openssh/openssh-client@1:7.9p1-10+deb10u2

✗ Low severity vulnerability found in openssh/openssh-client
 Description: Inappropriate Encoding for Output Context
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-369020
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
 From: openssh/openssh-client@1:7.9p1-10+deb10u2

✗ Low severity vulnerability found in openssh/openssh-client
 Description: Integer Overflow or Wraparound
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-472477
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
 From: openssh/openssh-client@1:7.9p1-10+deb10u2

✗ Low severity vulnerability found in openssh/openssh-client
 Description: Improper Input Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-570880
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
 From: openssh/openssh-client@1:7.9p1-10+deb10u2

✗ Low severity vulnerability found in openssh/openssh-client
 Description: Information Exposure
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-574764
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
 From: openssh/openssh-client@1:7.9p1-10+deb10u2

✗ Low severity vulnerability found in openssh/openssh-client
 Description: OS Command Injection
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-590144
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
 From: openssh/openssh-client@1:7.9p1-10+deb10u2

✗ Low severity vulnerability found in openldap/libldap-common
 Description: Improper Initialization
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-304601
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...

✗ Low severity vulnerability found in openldap/libldap-common
 Description: Cryptographic Issues
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-304654
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...

✗ Low severity vulnerability found in openldap/libldap-common
 Description: Out-of-Bounds
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-304666
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...

✗ Low severity vulnerability found in openldap/libldap-common
 Description: Improper Certificate Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-584924
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...

✗ Low severity vulnerability found in nettle/libnettle6
 Description: CVE-2021-3580
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-NETTLE-1301269
 Introduced through: iputils/iputils-ping@3:20180629-2+deb10u1, 
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
 From: iputils/iputils-ping@3:20180629-2+deb10u1 > nettle/[email protected]
 From: [email protected] > nettle/[email protected]
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 > 
nettle/[email protected]
 and 5 more...

✗ Low severity vulnerability found in lz4/liblz4-1
 Description: Buffer Overflow
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LZ4-473072
 Introduced through: [email protected], [email protected]+deb10u1, procps@2:3.3.15-2
 From: [email protected] > apt/[email protected] > lz4/[email protected]
 From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 > 
lz4/[email protected]
 From: procps@2:3.3.15-2 > procps/libprocps7@2:3.3.15-2 > 
systemd/libsystemd0@241-7~deb10u5 > lz4/[email protected]

✗ Low severity vulnerability found in libtasn1-6
 Description: Resource Management Errors
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBTASN16-339585
 Introduced through: [email protected], [email protected]+deb10u1
 From: [email protected] > [email protected]
 From: [email protected] > p11-kit/[email protected] > [email protected]
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
gnutls28/[email protected]+deb10u5 > [email protected]

✗ Low severity vulnerability found in libssh2/libssh2-1
 Description: Integer Overflow or Wraparound
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBSSH2-474372
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
libssh2/[email protected]
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 > 
libssh2/[email protected]

✗ Low severity vulnerability found in libseccomp/libseccomp2
 Description: Access Restriction Bypass
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBSECCOMP-341044
 Introduced through: libseccomp/[email protected], [email protected]
 From: libseccomp/[email protected]
 From: [email protected] > libseccomp/[email protected]

✗ Low severity vulnerability found in libpng1.6/libpng16-16
 Description: Resource Management Errors
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBPNG16-296440
 Introduced through: [email protected]
 From: [email protected] > fontconfig/[email protected] > 
freetype/[email protected]+deb10u2 > libpng1.6/[email protected]

✗ Low severity vulnerability found in libpng1.6/libpng16-16
 Description: Memory Leak
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBPNG16-296468
 Introduced through: [email protected]
 From: [email protected] > fontconfig/[email protected] > 
freetype/[email protected]+deb10u2 > libpng1.6/[email protected]

✗ Low severity vulnerability found in libpng1.6/libpng16-16
 Description: Out-of-bounds Write
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBPNG16-296471
 Introduced through: [email protected]
 From: [email protected] > fontconfig/[email protected] > 
freetype/[email protected]+deb10u2 > libpng1.6/[email protected]

✗ Low severity vulnerability found in libgcrypt20
 Description: Use of a Broken or Risky Cryptographic Algorithm
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBGCRYPT20-391902
 Introduced through: gnupg2/[email protected]+deb10u1, 
gnupg2/[email protected]+deb10u1, procps@2:3.3.15-2, [email protected]+deb10u1
 From: gnupg2/[email protected]+deb10u1 > [email protected]
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
[email protected]
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
[email protected]
 and 8 more...

✗ Low severity vulnerability found in krb5/libkrb5support0
 Description: CVE-2004-0971
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-KRB5-395883
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3, 
openssh/openssh-client@1:7.9p1-10+deb10u2, [email protected]+deb10u1
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 > 
krb5/[email protected]+deb10u1
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 > 
krb5/[email protected]+deb10u1
 and 11 more...

✗ Low severity vulnerability found in krb5/libkrb5support0
 Description: Integer Overflow or Wraparound
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-KRB5-395955
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3, 
openssh/openssh-client@1:7.9p1-10+deb10u2, [email protected]+deb10u1
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 > 
krb5/[email protected]+deb10u1
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 > 
krb5/[email protected]+deb10u1
 and 11 more...

✗ Low severity vulnerability found in iptables/libxtables12
 Description: Improper Input Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-IPTABLES-287323
 Introduced through: [email protected]
 From: [email protected] > iptables/[email protected]

✗ Low severity vulnerability found in iptables/libxtables12
 Description: Out-of-Bounds
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-IPTABLES-451768
 Introduced through: [email protected]
 From: [email protected] > iptables/[email protected]

✗ Low severity vulnerability found in gnutls28/libgnutls30
 Description: Improper Input Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-340755
 Introduced through: [email protected], gnupg2/[email protected]+deb10u1, 
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
 From: [email protected] > gnutls28/[email protected]+deb10u5
 From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
 From: [email protected] > gnutls28/[email protected]+deb10u5
 and 3 more...

✗ Low severity vulnerability found in gnupg2/gpgv
 Description: Use of a Broken or Risky Cryptographic Algorithm
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUPG2-535553
 Introduced through: [email protected], gnupg2/[email protected]+deb10u1, 
gnupg2/[email protected]+deb10u1
 From: [email protected] > gnupg2/[email protected]+deb10u1
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1
 and 18 more...

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Double Free
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1078993
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Uncontrolled Recursion
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-338106
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Uncontrolled Recursion
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-338163
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Improper Input Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356371
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Resource Management Errors
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356671
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Resource Management Errors
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356735
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: CVE-2010-4051
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356875
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Out-of-Bounds
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-452228
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Access Restriction Bypass
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-452267
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Use of Insufficiently Random Values
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-453375
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Information Exposure
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-453640
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Information Exposure
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-534995
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in glibc/libc-bin
 Description: Integer Underflow
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-564233
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Low severity vulnerability found in git/git-man
 Description: Improper Input Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GIT-340854
 Introduced through: git@1:2.20.1-2+deb10u3
 From: git@1:2.20.1-2+deb10u3 > git/git-man@1:2.20.1-2+deb10u3
 From: git@1:2.20.1-2+deb10u3

✗ Low severity vulnerability found in expat/libexpat1
 Description: XML External Entity (XXE) Injection
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-358079
 Introduced through: git@1:2.20.1-2+deb10u3, [email protected], 
[email protected]+deb10u1, [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > expat/[email protected]+deb10u1
 From: [email protected] > fontconfig/[email protected] > 
expat/[email protected]+deb10u1
 From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 > 
expat/[email protected]+deb10u1
 and 2 more...

✗ Low severity vulnerability found in curl/libcurl4
 Description: Information Exposure
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1049501
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
 From: [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
 Fixed in: 7.64.0-4+deb10u2

✗ Low severity vulnerability found in curl/libcurl4
 Description: Authentication Bypass
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1089958
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
 From: [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
 Fixed in: 7.64.0-4+deb10u2

✗ Low severity vulnerability found in curl/libcurl4
 Description: CVE-2021-22898
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1296892
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
 From: [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1

✗ Low severity vulnerability found in coreutils
 Description: Improper Input Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-COREUTILS-317465
 Introduced through: [email protected]
 From: [email protected] > fontconfig/[email protected] > 
fontconfig/[email protected] > [email protected]+nmu1 > [email protected]

✗ Low severity vulnerability found in coreutils
 Description: Race Condition
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-COREUTILS-317494
 Introduced through: [email protected]
 From: [email protected] > fontconfig/[email protected] > 
fontconfig/[email protected] > [email protected]+nmu1 > [email protected]

✗ Low severity vulnerability found in bash
 Description: Improper Check for Dropped Privileges
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-BASH-536280
 Introduced through: [email protected]
 From: [email protected]

✗ Low severity vulnerability found in apt/libapt-pkg5.0
 Description: Improper Verification of Cryptographic Signature
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-APT-407502
 Introduced through: apt/[email protected], [email protected]
 From: apt/[email protected]
 From: [email protected] > apt/[email protected]
 From: [email protected]

✗ Medium severity vulnerability found in wget
 Description: Open Redirect
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-WGET-1277612
 Introduced through: [email protected]
 From: [email protected]

✗ Medium severity vulnerability found in sqlite3/libsqlite3-0
 Description: Uncontrolled Recursion
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-537251
 Introduced through: gnupg2/[email protected]+deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1

✗ Medium severity vulnerability found in sqlite3/libsqlite3-0
 Description: Improper Handling of Exceptional Conditions
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-539769
 Introduced through: gnupg2/[email protected]+deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1

✗ Medium severity vulnerability found in sqlite3/libsqlite3-0
 Description: CVE-2020-13631
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-570487
 Introduced through: gnupg2/[email protected]+deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1

✗ Medium severity vulnerability found in python2.7/libpython2.7-stdlib
 Description: HTTP Request Smuggling
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-1085863
 Introduced through: [email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 and 7 more...

✗ Medium severity vulnerability found in pcre3/libpcre3
 Description: Integer Overflow or Wraparound
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-572367
 Introduced through: meta-common-packages@meta
 From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12

✗ Medium severity vulnerability found in p11-kit/libp11-kit0
 Description: Out-of-bounds Read
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-P11KIT-1050832
 Introduced through: [email protected], [email protected]+deb10u1
 From: [email protected] > p11-kit/[email protected]
 From: [email protected] > p11-kit/[email protected] > 
p11-kit/[email protected]
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
gnutls28/[email protected]+deb10u5 > p11-kit/[email protected]
 and 2 more...
 Fixed in: 0.23.15-2+deb10u1

✗ Medium severity vulnerability found in openssl/libssl1.1
 Description: Integer Overflow or Wraparound
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-1075330
 Introduced through: openssl/[email protected]+deb10u4, 
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
 From: openssl/[email protected]+deb10u4
 From: openssh/openssh-client@1:7.9p1-10+deb10u2 > 
openssl/[email protected]+deb10u4
 From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 > 
openssl/[email protected]+deb10u4
 and 6 more...
 Fixed in: 1.1.1d-0+deb10u5

✗ Medium severity vulnerability found in openssl/libssl1.1
 Description: NULL Pointer Dereference
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-1089177
 Introduced through: openssl/[email protected]+deb10u4, 
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
 From: openssl/[email protected]+deb10u4
 From: openssh/openssh-client@1:7.9p1-10+deb10u2 > 
openssl/[email protected]+deb10u4
 From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 > 
openssl/[email protected]+deb10u4
 and 6 more...
 Fixed in: 1.1.1d-0+deb10u6

✗ Medium severity vulnerability found in openssl/libssl1.1
 Description: Information Exposure
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-536856
 Introduced through: openssl/[email protected]+deb10u4, 
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
 From: openssl/[email protected]+deb10u4
 From: openssh/openssh-client@1:7.9p1-10+deb10u2 > 
openssl/[email protected]+deb10u4
 From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 > 
openssl/[email protected]+deb10u4
 and 6 more...
 Fixed in: 1.1.1d-0+deb10u5

✗ Medium severity vulnerability found in libzstd/libzstd1
 Description: Incorrect Default Permissions
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBZSTD-1080893
 Introduced through: libzstd/[email protected]+dfsg-3, [email protected]
 From: libzstd/[email protected]+dfsg-3
 From: [email protected] > apt/[email protected] > libzstd/[email protected]+dfsg-3
 Fixed in: 1.3.8+dfsg-3+deb10u1

✗ Medium severity vulnerability found in libzstd/libzstd1
 Description: Incorrect Default Permissions
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBZSTD-1080899
 Introduced through: libzstd/[email protected]+dfsg-3, [email protected]
 From: libzstd/[email protected]+dfsg-3
 From: [email protected] > apt/[email protected] > libzstd/[email protected]+dfsg-3
 Fixed in: 1.3.8+dfsg-3+deb10u2

✗ Medium severity vulnerability found in libgcrypt20
 Description: Race Condition
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBGCRYPT20-460489
 Introduced through: gnupg2/[email protected]+deb10u1, 
gnupg2/[email protected]+deb10u1, procps@2:3.3.15-2, [email protected]+deb10u1
 From: gnupg2/[email protected]+deb10u1 > [email protected]
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
[email protected]
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
[email protected]
 and 8 more...

✗ Medium severity vulnerability found in iproute2
 Description: Use After Free
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-IPROUTE2-568742
 Introduced through: [email protected]
 From: [email protected]

✗ Medium severity vulnerability found in glibc/libc-bin
 Description: Loop with Unreachable Exit Condition ('Infinite Loop')
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1035462
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Medium severity vulnerability found in glibc/libc-bin
 Description: Out-of-bounds Read
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1055403
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Medium severity vulnerability found in glibc/libc-bin
 Description: Out-of-Bounds
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559181
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ Medium severity vulnerability found in curl/libcurl4
 Description: Information Exposure
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1089952
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
 From: [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
 Fixed in: 7.64.0-4+deb10u2

✗ High severity vulnerability found in systemd/libsystemd0
 Description: Privilege Chaining
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-345386
 Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected], 
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
 From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
 From: [email protected] > apt/[email protected] > 
systemd/libsystemd0@241-7~deb10u5
 From: util-linux/[email protected] > [email protected] > 
systemd/libsystemd0@241-7~deb10u5
 and 4 more...

✗ High severity vulnerability found in systemd/libsystemd0
 Description: Incorrect Privilege Assignment
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-345391
 Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected], 
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
 From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
 From: [email protected] > apt/[email protected] > 
systemd/libsystemd0@241-7~deb10u5
 From: util-linux/[email protected] > [email protected] > 
systemd/libsystemd0@241-7~deb10u5
 and 4 more...

✗ High severity vulnerability found in subversion/libsvn1
 Description: NULL Pointer Dereference
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SUBVERSION-1071814
 Introduced through: [email protected]+deb10u1
 From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1
 From: [email protected]+deb10u1
 Fixed in: 1.10.4-1+deb10u2

✗ High severity vulnerability found in sqlite3/libsqlite3-0
 Description: CVE-2019-19603
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-537598
 Introduced through: gnupg2/[email protected]+deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 > 
sqlite3/[email protected]+deb10u1

✗ High severity vulnerability found in python2.7/libpython2.7-stdlib
 Description: Buffer Overflow
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-1063178
 Introduced through: [email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
 From: [email protected]+deb10u1 > python-defaults/[email protected] > 
python-defaults/[email protected] > 
python-defaults/[email protected] > 
python2.7/[email protected]+deb10u1
 and 7 more...

✗ High severity vulnerability found in pcre2/libpcre2-8-0
 Description: Out-of-bounds Read
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE2-548863
 Introduced through: git@1:2.20.1-2+deb10u3, [email protected]
 From: git@1:2.20.1-2+deb10u3 > pcre2/[email protected]
 From: [email protected] > pcre2/[email protected]

✗ High severity vulnerability found in p11-kit/libp11-kit0
 Description: Out-of-bounds Write
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-P11KIT-1050833
 Introduced through: [email protected], [email protected]+deb10u1
 From: [email protected] > p11-kit/[email protected]
 From: [email protected] > p11-kit/[email protected] > 
p11-kit/[email protected]
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
gnutls28/[email protected]+deb10u5 > p11-kit/[email protected]
 and 2 more...
 Fixed in: 0.23.15-2+deb10u1

✗ High severity vulnerability found in p11-kit/libp11-kit0
 Description: Integer Overflow or Wraparound
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-P11KIT-1050836
 Introduced through: [email protected], [email protected]+deb10u1
 From: [email protected] > p11-kit/[email protected]
 From: [email protected] > p11-kit/[email protected] > 
p11-kit/[email protected]
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
gnutls28/[email protected]+deb10u5 > p11-kit/[email protected]
 and 2 more...
 Fixed in: 0.23.15-2+deb10u1

✗ High severity vulnerability found in openssl/libssl1.1
 Description: Integer Overflow or Wraparound
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-1075326
 Introduced through: openssl/[email protected]+deb10u4, 
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1, 
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
 From: openssl/[email protected]+deb10u4
 From: openssh/openssh-client@1:7.9p1-10+deb10u2 > 
openssl/[email protected]+deb10u4
 From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 > 
openssl/[email protected]+deb10u4
 and 6 more...
 Fixed in: 1.1.1d-0+deb10u5

✗ High severity vulnerability found in openldap/libldap-common
 Description: Reachable Assertion
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064721
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...
 Fixed in: 2.4.47+dfsg-3+deb10u5

✗ High severity vulnerability found in openldap/libldap-common
 Description: Out-of-bounds Read
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064724
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...
 Fixed in: 2.4.47+dfsg-3+deb10u5

✗ High severity vulnerability found in openldap/libldap-common
 Description: Integer Underflow
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064726
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...
 Fixed in: 2.4.47+dfsg-3+deb10u5

✗ High severity vulnerability found in openldap/libldap-common
 Description: Release of Invalid Pointer or Reference
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064733
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...
 Fixed in: 2.4.47+dfsg-3+deb10u5

✗ High severity vulnerability found in openldap/libldap-common
 Description: Double Free
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064737
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...
 Fixed in: 2.4.47+dfsg-3+deb10u5

✗ High severity vulnerability found in openldap/libldap-common
 Description: Loop with Unreachable Exit Condition ('Infinite Loop')
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064742
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...
 Fixed in: 2.4.47+dfsg-3+deb10u5

✗ High severity vulnerability found in openldap/libldap-common
 Description: CVE-2020-36226
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064744
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...
 Fixed in: 2.4.47+dfsg-3+deb10u5

✗ High severity vulnerability found in openldap/libldap-common
 Description: Integer Underflow
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064746
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...
 Fixed in: 2.4.47+dfsg-3+deb10u5

✗ High severity vulnerability found in openldap/libldap-common
 Description: Access of Resource Using Incompatible Type ('Type Confusion')
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064752
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...
 Fixed in: 2.4.47+dfsg-3+deb10u5

✗ High severity vulnerability found in openldap/libldap-common
 Description: Reachable Assertion
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064754
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...
 Fixed in: 2.4.47+dfsg-3+deb10u5

✗ High severity vulnerability found in openldap/libldap-common
 Description: Reachable Assertion
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1074919
 Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1, 
git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: gnupg2/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
openldap/[email protected]+dfsg-3+deb10u4
 and 1 more...
 Fixed in: 2.4.47+dfsg-3+deb10u6

✗ High severity vulnerability found in nettle/libnettle6
 Description: Use of a Broken or Risky Cryptographic Algorithm
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-NETTLE-1090205
 Introduced through: iputils/iputils-ping@3:20180629-2+deb10u1, 
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
 From: iputils/iputils-ping@3:20180629-2+deb10u1 > nettle/[email protected]
 From: [email protected] > nettle/[email protected]
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 > 
nettle/[email protected]
 and 5 more...

✗ High severity vulnerability found in lz4/liblz4-1
 Description: Out-of-bounds Write
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LZ4-1277601
 Introduced through: [email protected], [email protected]+deb10u1, procps@2:3.3.15-2
 From: [email protected] > apt/[email protected] > lz4/[email protected]
 From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 > 
lz4/[email protected]
 From: procps@2:3.3.15-2 > procps/libprocps7@2:3.3.15-2 > 
systemd/libsystemd0@241-7~deb10u5 > lz4/[email protected]
 Fixed in: 1.8.3-1+deb10u1

✗ High severity vulnerability found in libssh2/libssh2-1
 Description: Out-of-bounds Read
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBSSH2-452460
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
libssh2/[email protected]
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 > 
libssh2/[email protected]

✗ High severity vulnerability found in libidn2/libidn2-0
 Description: Improper Input Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBIDN2-474100
 Introduced through: iputils/iputils-ping@3:20180629-2+deb10u1, 
[email protected], [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: iputils/iputils-ping@3:20180629-2+deb10u1 > 
libidn2/[email protected]+deb10u1
 From: [email protected] > libidn2/[email protected]+deb10u1
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 > 
libidn2/[email protected]+deb10u1
 and 3 more...

✗ High severity vulnerability found in libgcrypt20
 Description: Information Exposure
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBGCRYPT20-1297893
 Introduced through: gnupg2/[email protected]+deb10u1, 
gnupg2/[email protected]+deb10u1, procps@2:3.3.15-2, [email protected]+deb10u1
 From: gnupg2/[email protected]+deb10u1 > [email protected]
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
[email protected]
 From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 > 
[email protected]
 and 8 more...

✗ High severity vulnerability found in libbsd/libbsd0
 Description: Out-of-bounds Read
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBBSD-541041
 Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
 From: openssh/openssh-client@1:7.9p1-10+deb10u2 > 
libedit/[email protected] > libbsd/[email protected]
 Fixed in: 0.9.1-2+deb10u1

✗ High severity vulnerability found in gnutls28/libgnutls30
 Description: Use After Free
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-1085094
 Introduced through: [email protected], gnupg2/[email protected]+deb10u1, 
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
 From: [email protected] > gnutls28/[email protected]+deb10u5
 From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
 From: [email protected] > gnutls28/[email protected]+deb10u5
 and 3 more...

✗ High severity vulnerability found in gnutls28/libgnutls30
 Description: Use After Free
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-1085097
 Introduced through: [email protected], gnupg2/[email protected]+deb10u1, 
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
 From: [email protected] > gnutls28/[email protected]+deb10u5
 From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
 From: [email protected] > gnutls28/[email protected]+deb10u5
 and 3 more...

✗ High severity vulnerability found in gnutls28/libgnutls30
 Description: Out-of-bounds Write
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-609778
 Introduced through: [email protected], gnupg2/[email protected]+deb10u1, 
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
 From: [email protected] > gnutls28/[email protected]+deb10u5
 From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
 From: [email protected] > gnutls28/[email protected]+deb10u5
 and 3 more...

✗ High severity vulnerability found in glibc/libc-bin
 Description: Reachable Assertion
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1065768
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ High severity vulnerability found in glibc/libc-bin
 Description: Use After Free
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1296899
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ High severity vulnerability found in glibc/libc-bin
 Description: Out-of-bounds Write
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559488
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ High severity vulnerability found in glibc/libc-bin
 Description: Use After Free
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559493
 Introduced through: glibc/[email protected], meta-common-packages@meta
 From: glibc/[email protected]
 From: meta-common-packages@meta > glibc/[email protected]

✗ High severity vulnerability found in git/git-man
 Description: Link Following
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GIT-1083853
 Introduced through: git@1:2.20.1-2+deb10u3
 From: git@1:2.20.1-2+deb10u3 > git/git-man@1:2.20.1-2+deb10u3
 From: git@1:2.20.1-2+deb10u3

✗ High severity vulnerability found in gcc-8/libstdc++6
 Description: Information Exposure
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GCC8-347558
 Introduced through: gcc-8/[email protected], [email protected], 
meta-common-packages@meta
 From: gcc-8/[email protected]
 From: [email protected] > gcc-8/[email protected]
 From: [email protected] > apt/[email protected] > gcc-8/[email protected]
 and 2 more...

✗ High severity vulnerability found in gcc-8/libstdc++6
 Description: Insufficient Entropy
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-GCC8-469413
 Introduced through: gcc-8/[email protected], [email protected], 
meta-common-packages@meta
 From: gcc-8/[email protected]
 From: [email protected] > gcc-8/[email protected]
 From: [email protected] > apt/[email protected] > gcc-8/[email protected]
 and 2 more...

✗ High severity vulnerability found in curl/libcurl4
 Description: Out-of-bounds Write
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1049502
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
 From: [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
 Fixed in: 7.64.0-4+deb10u2

✗ High severity vulnerability found in curl/libcurl4
 Description: Improper Certificate Validation
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1049506
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
 From: [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
 Fixed in: 7.64.0-4+deb10u2

✗ High severity vulnerability found in curl/libcurl4
 Description: Arbitrary Code Injection
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-573151
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
 From: [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
 Fixed in: 7.64.0-4+deb10u2

✗ High severity vulnerability found in curl/libcurl4
 Description: Information Exposure
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-573153
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
 From: [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
 Fixed in: 7.64.0-4+deb10u2

✗ High severity vulnerability found in curl/libcurl4
 Description: Use After Free
 Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-608200
 Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
 From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
 From: [email protected]+deb10u1
 From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
 Fixed in: 7.64.0-4+deb10u2

 

Package manager: deb
Project name: docker-image|guacamole/guacamole
Docker image: guacamole/guacamole:1.3.0
Platform: linux/amd64

Tested 179 dependencies for known vulnerabilities, found 137 vulnerabilities.

For more free scans that keep your images secure, sign up to Snyk at 
https://dockr.ly/3ePqVcp


tgates@MacBook-Pro ~
```



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to