[
https://issues.apache.org/jira/browse/GUACAMOLE-1368?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Tom Gates updated GUACAMOLE-1368:
---------------------------------
Summary: Latest docker image fails security scans with High severity
vulnerabilies. (was: Latest docker image fails security scans.)
> Latest docker image fails security scans with High severity vulnerabilies.
> --------------------------------------------------------------------------
>
> Key: GUACAMOLE-1368
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1368
> Project: Guacamole
> Issue Type: Bug
> Components: guacamole
> Affects Versions: 1.3.0
> Environment: Docker
> Reporter: Tom Gates
> Priority: Critical
>
> tgates@MacBook-Pro ~
> % docker pull guacamole/guacamole:1.3.0 !10101
> 1.3.0: Pulling from guacamole/guacamole
> Digest:
> sha256:739cb6820ae884827ceaaa87b45b8802769649c848d737584aea79d999177dc3
> Status: Downloaded newer image for guacamole/guacamole:1.3.0
> docker.io/guacamole/guacamole:1.3.0
> tgates@MacBook-Pro ~
> % docker scan guacamole/guacamole:1.3.0 !10102
> Testing guacamole/guacamole:1.3.0...
> ✗ Low severity vulnerability found in tar
> Description: Out-of-bounds Read
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-TAR-1063001]
> Introduced through: meta-common-packages@meta
> From: meta-common-packages@meta > [email protected]+dfsg-6
> ✗ Low severity vulnerability found in tar
> Description: CVE-2005-2541
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-TAR-312331]
> Introduced through: meta-common-packages@meta
> From: meta-common-packages@meta > [email protected]+dfsg-6
> ✗ Low severity vulnerability found in tar
> Description: NULL Pointer Dereference
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-TAR-341203]
> Introduced through: meta-common-packages@meta
> From: meta-common-packages@meta > [email protected]+dfsg-6
> ✗ Low severity vulnerability found in systemd/libsystemd0
> Description: Authentication Bypass
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-1291056]
> Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
> util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
> From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
> From: [email protected] > apt/[email protected] >
> systemd/libsystemd0@241-7~deb10u5
> From: util-linux/[email protected] > [email protected] >
> systemd/libsystemd0@241-7~deb10u5
> and 4 more...
> ✗ Low severity vulnerability found in systemd/libsystemd0
> Description: Link Following
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-305144]
> Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
> util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
> From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
> From: [email protected] > apt/[email protected] >
> systemd/libsystemd0@241-7~deb10u5
> From: util-linux/[email protected] > [email protected] >
> systemd/libsystemd0@241-7~deb10u5
> and 4 more...
> ✗ Low severity vulnerability found in systemd/libsystemd0
> Description: Missing Release of Resource after Effective Lifetime
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-542807]
> Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
> util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
> From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
> From: [email protected] > apt/[email protected] >
> systemd/libsystemd0@241-7~deb10u5
> From: util-linux/[email protected] > [email protected] >
> systemd/libsystemd0@241-7~deb10u5
> and 4 more...
> ✗ Low severity vulnerability found in systemd/libsystemd0
> Description: Improper Input Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-570991]
> Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
> util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
> From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
> From: [email protected] > apt/[email protected] >
> systemd/libsystemd0@241-7~deb10u5
> From: util-linux/[email protected] > [email protected] >
> systemd/libsystemd0@241-7~deb10u5
> and 4 more...
> ✗ Low severity vulnerability found in sqlite3/libsqlite3-0
> Description: Improper Input Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-535712]
> Introduced through: gnupg2/[email protected]+deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> ✗ Low severity vulnerability found in sqlite3/libsqlite3-0
> Description: Use After Free
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-565214]
> Introduced through: gnupg2/[email protected]+deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> ✗ Low severity vulnerability found in shadow/passwd
> Description: Time-of-check Time-of-use (TOCTOU)
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-306205]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2,
> gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1,
> util-linux/[email protected]
> From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
> From: gnupg2/[email protected]+deb10u1 > [email protected] >
> shadow/passwd@1:4.5-1.1
> From: shadow/login@1:4.5-1.1
> and 1 more...
> ✗ Low severity vulnerability found in shadow/passwd
> Description: Incorrect Permission Assignment for Critical Resource
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-306230]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2,
> gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1,
> util-linux/[email protected]
> From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
> From: gnupg2/[email protected]+deb10u1 > [email protected] >
> shadow/passwd@1:4.5-1.1
> From: shadow/login@1:4.5-1.1
> and 1 more...
> ✗ Low severity vulnerability found in shadow/passwd
> Description: Access Restriction Bypass
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-306250]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2,
> gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1,
> util-linux/[email protected]
> From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
> From: gnupg2/[email protected]+deb10u1 > [email protected] >
> shadow/passwd@1:4.5-1.1
> From: shadow/login@1:4.5-1.1
> and 1 more...
> ✗ Low severity vulnerability found in shadow/passwd
> Description: Incorrect Permission Assignment for Critical Resource
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-539852]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2,
> gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1,
> util-linux/[email protected]
> From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
> From: gnupg2/[email protected]+deb10u1 > [email protected] >
> shadow/passwd@1:4.5-1.1
> From: shadow/login@1:4.5-1.1
> and 1 more...
> ✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
> Description: Cryptographic Issues
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-306560]
> Introduced through: [email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> and 7 more...
> ✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
> Description: Arbitrary Code Injection
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-306596]
> Introduced through: [email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> and 7 more...
> ✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
> Description: Arbitrary Code Injection
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-474393]
> Introduced through: [email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> and 7 more...
> ✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
> Description: Resource Exhaustion
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-543815]
> Introduced through: [email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> and 7 more...
> ✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
> Description: Resource Exhaustion
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-546420]
> Introduced through: [email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> and 7 more...
> ✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
> Description: Improper Input Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-584372]
> Introduced through: [email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> and 7 more...
> ✗ Low severity vulnerability found in python-defaults/libpython2-stdlib
> Description: Link Following
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PYTHONDEFAULTS-269278]
> Introduced through: [email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python-defaults/[email protected]
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] > python-defaults/[email protected]
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected]
> and 5 more...
> ✗ Low severity vulnerability found in perl
> Description: Link Following
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PERL-327793]
> Introduced through: git@1:2.20.1-2+deb10u3, meta-common-packages@meta
> From: git@1:2.20.1-2+deb10u3 > [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > [email protected] >
> [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > [email protected]+deb10u1 >
> perl/[email protected]+deb10u1
> and 3 more...
> ✗ Low severity vulnerability found in pcre3/libpcre3
> Description: Out-of-Bounds
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345321]
> Introduced through: meta-common-packages@meta
> From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
> ✗ Low severity vulnerability found in pcre3/libpcre3
> Description: Out-of-Bounds
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345353]
> Introduced through: meta-common-packages@meta
> From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
> ✗ Low severity vulnerability found in pcre3/libpcre3
> Description: Uncontrolled Recursion
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345502]
> Introduced through: meta-common-packages@meta
> From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
> ✗ Low severity vulnerability found in pcre3/libpcre3
> Description: Out-of-Bounds
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345530]
> Introduced through: meta-common-packages@meta
> From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
> ✗ Low severity vulnerability found in pcre3/libpcre3
> Description: Out-of-bounds Read
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-572368]
> Introduced through: meta-common-packages@meta
> From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
> ✗ Low severity vulnerability found in openssl/libssl1.1
> Description: Cryptographic Issues
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-374709]
> Introduced through: openssl/[email protected]+deb10u4,
> openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
> From: openssl/[email protected]+deb10u4
> From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
> openssl/[email protected]+deb10u4
> From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
> openssl/[email protected]+deb10u4
> and 6 more...
> ✗ Low severity vulnerability found in openssl/libssl1.1
> Description: Cryptographic Issues
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-374996]
> Introduced through: openssl/[email protected]+deb10u4,
> openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
> From: openssl/[email protected]+deb10u4
> From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
> openssl/[email protected]+deb10u4
> From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
> openssl/[email protected]+deb10u4
> and 6 more...
> ✗ Low severity vulnerability found in openssh/openssh-client
> Description: Information Exposure
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-368617]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
> From: openssh/openssh-client@1:7.9p1-10+deb10u2
> ✗ Low severity vulnerability found in openssh/openssh-client
> Description: Access Restriction Bypass
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-368833]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
> From: openssh/openssh-client@1:7.9p1-10+deb10u2
> ✗ Low severity vulnerability found in openssh/openssh-client
> Description: Information Exposure
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-368925]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
> From: openssh/openssh-client@1:7.9p1-10+deb10u2
> ✗ Low severity vulnerability found in openssh/openssh-client
> Description: Improper Authentication
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-369016]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
> From: openssh/openssh-client@1:7.9p1-10+deb10u2
> ✗ Low severity vulnerability found in openssh/openssh-client
> Description: Inappropriate Encoding for Output Context
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-369020]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
> From: openssh/openssh-client@1:7.9p1-10+deb10u2
> ✗ Low severity vulnerability found in openssh/openssh-client
> Description: Integer Overflow or Wraparound
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-472477]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
> From: openssh/openssh-client@1:7.9p1-10+deb10u2
> ✗ Low severity vulnerability found in openssh/openssh-client
> Description: Improper Input Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-570880]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
> From: openssh/openssh-client@1:7.9p1-10+deb10u2
> ✗ Low severity vulnerability found in openssh/openssh-client
> Description: Information Exposure
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-574764]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
> From: openssh/openssh-client@1:7.9p1-10+deb10u2
> ✗ Low severity vulnerability found in openssh/openssh-client
> Description: OS Command Injection
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-590144]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
> From: openssh/openssh-client@1:7.9p1-10+deb10u2
> ✗ Low severity vulnerability found in openldap/libldap-common
> Description: Improper Initialization
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-304601]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> ✗ Low severity vulnerability found in openldap/libldap-common
> Description: Cryptographic Issues
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-304654]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> ✗ Low severity vulnerability found in openldap/libldap-common
> Description: Out-of-Bounds
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-304666]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> ✗ Low severity vulnerability found in openldap/libldap-common
> Description: Improper Certificate Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-584924]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> ✗ Low severity vulnerability found in nettle/libnettle6
> Description: CVE-2021-3580
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-NETTLE-1301269]
> Introduced through: iputils/iputils-ping@3:20180629-2+deb10u1,
> [email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
> From: iputils/iputils-ping@3:20180629-2+deb10u1 > nettle/[email protected]
> From: [email protected] > nettle/[email protected]
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 >
> nettle/[email protected]
> and 5 more...
> ✗ Low severity vulnerability found in lz4/liblz4-1
> Description: Buffer Overflow
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LZ4-473072]
> Introduced through: [email protected], [email protected]+deb10u1,
> procps@2:3.3.15-2
> From: [email protected] > apt/[email protected] > lz4/[email protected]
> From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
> lz4/[email protected]
> From: procps@2:3.3.15-2 > procps/libprocps7@2:3.3.15-2 >
> systemd/libsystemd0@241-7~deb10u5 > lz4/[email protected]
> ✗ Low severity vulnerability found in libtasn1-6
> Description: Resource Management Errors
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBTASN16-339585]
> Introduced through: [email protected], [email protected]+deb10u1
> From: [email protected] > [email protected]
> From: [email protected] > p11-kit/[email protected] >
> [email protected]
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> gnutls28/[email protected]+deb10u5 > [email protected]
> ✗ Low severity vulnerability found in libssh2/libssh2-1
> Description: Integer Overflow or Wraparound
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBSSH2-474372]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> libssh2/[email protected]
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 >
> libssh2/[email protected]
> ✗ Low severity vulnerability found in libseccomp/libseccomp2
> Description: Access Restriction Bypass
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBSECCOMP-341044]
> Introduced through: libseccomp/[email protected], [email protected]
> From: libseccomp/[email protected]
> From: [email protected] > libseccomp/[email protected]
> ✗ Low severity vulnerability found in libpng1.6/libpng16-16
> Description: Resource Management Errors
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBPNG16-296440]
> Introduced through: [email protected]
> From: [email protected] > fontconfig/[email protected] >
> freetype/[email protected]+deb10u2 > libpng1.6/[email protected]
> ✗ Low severity vulnerability found in libpng1.6/libpng16-16
> Description: Memory Leak
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBPNG16-296468]
> Introduced through: [email protected]
> From: [email protected] > fontconfig/[email protected] >
> freetype/[email protected]+deb10u2 > libpng1.6/[email protected]
> ✗ Low severity vulnerability found in libpng1.6/libpng16-16
> Description: Out-of-bounds Write
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBPNG16-296471]
> Introduced through: [email protected]
> From: [email protected] > fontconfig/[email protected] >
> freetype/[email protected]+deb10u2 > libpng1.6/[email protected]
> ✗ Low severity vulnerability found in libgcrypt20
> Description: Use of a Broken or Risky Cryptographic Algorithm
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBGCRYPT20-391902]
> Introduced through: gnupg2/[email protected]+deb10u1,
> gnupg2/[email protected]+deb10u1, procps@2:3.3.15-2, [email protected]+deb10u1
> From: gnupg2/[email protected]+deb10u1 > [email protected]
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> [email protected]
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> [email protected]
> and 8 more...
> ✗ Low severity vulnerability found in krb5/libkrb5support0
> Description: CVE-2004-0971
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-KRB5-395883]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3,
> openssh/openssh-client@1:7.9p1-10+deb10u2, [email protected]+deb10u1
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 >
> krb5/[email protected]+deb10u1
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 >
> krb5/[email protected]+deb10u1
> and 11 more...
> ✗ Low severity vulnerability found in krb5/libkrb5support0
> Description: Integer Overflow or Wraparound
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-KRB5-395955]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3,
> openssh/openssh-client@1:7.9p1-10+deb10u2, [email protected]+deb10u1
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 >
> krb5/[email protected]+deb10u1
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 >
> krb5/[email protected]+deb10u1
> and 11 more...
> ✗ Low severity vulnerability found in iptables/libxtables12
> Description: Improper Input Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-IPTABLES-287323]
> Introduced through: [email protected]
> From: [email protected] > iptables/[email protected]
> ✗ Low severity vulnerability found in iptables/libxtables12
> Description: Out-of-Bounds
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-IPTABLES-451768]
> Introduced through: [email protected]
> From: [email protected] > iptables/[email protected]
> ✗ Low severity vulnerability found in gnutls28/libgnutls30
> Description: Improper Input Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-340755]
> Introduced through: [email protected], gnupg2/[email protected]+deb10u1,
> [email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
> From: [email protected] > gnutls28/[email protected]+deb10u5
> From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
> From: [email protected] > gnutls28/[email protected]+deb10u5
> and 3 more...
> ✗ Low severity vulnerability found in gnupg2/gpgv
> Description: Use of a Broken or Risky Cryptographic Algorithm
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GNUPG2-535553]
> Introduced through: [email protected], gnupg2/[email protected]+deb10u1,
> gnupg2/[email protected]+deb10u1
> From: [email protected] > gnupg2/[email protected]+deb10u1
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1
> and 18 more...
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Double Free
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1078993]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Uncontrolled Recursion
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-338106]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Uncontrolled Recursion
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-338163]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Improper Input Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356371]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Resource Management Errors
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356671]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Resource Management Errors
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356735]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: CVE-2010-4051
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356875]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Out-of-Bounds
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-452228]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Access Restriction Bypass
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-452267]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Use of Insufficiently Random Values
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-453375]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Information Exposure
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-453640]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Information Exposure
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-534995]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in glibc/libc-bin
> Description: Integer Underflow
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-564233]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Low severity vulnerability found in git/git-man
> Description: Improper Input Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GIT-340854]
> Introduced through: git@1:2.20.1-2+deb10u3
> From: git@1:2.20.1-2+deb10u3 > git/git-man@1:2.20.1-2+deb10u3
> From: git@1:2.20.1-2+deb10u3
> ✗ Low severity vulnerability found in expat/libexpat1
> Description: XML External Entity (XXE) Injection
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-358079]
> Introduced through: git@1:2.20.1-2+deb10u3, [email protected],
> [email protected]+deb10u1, [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > expat/[email protected]+deb10u1
> From: [email protected] > fontconfig/[email protected] >
> expat/[email protected]+deb10u1
> From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
> expat/[email protected]+deb10u1
> and 2 more...
> ✗ Low severity vulnerability found in curl/libcurl4
> Description: Information Exposure
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1049501]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
> From: [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
> Fixed in: 7.64.0-4+deb10u2
> ✗ Low severity vulnerability found in curl/libcurl4
> Description: Authentication Bypass
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1089958]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
> From: [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
> Fixed in: 7.64.0-4+deb10u2
> ✗ Low severity vulnerability found in curl/libcurl4
> Description: CVE-2021-22898
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1296892]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
> From: [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
> ✗ Low severity vulnerability found in coreutils
> Description: Improper Input Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-COREUTILS-317465]
> Introduced through: [email protected]
> From: [email protected] > fontconfig/[email protected] >
> fontconfig/[email protected] > [email protected]+nmu1 > [email protected]
> ✗ Low severity vulnerability found in coreutils
> Description: Race Condition
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-COREUTILS-317494]
> Introduced through: [email protected]
> From: [email protected] > fontconfig/[email protected] >
> fontconfig/[email protected] > [email protected]+nmu1 > [email protected]
> ✗ Low severity vulnerability found in bash
> Description: Improper Check for Dropped Privileges
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-BASH-536280]
> Introduced through: [email protected]
> From: [email protected]
> ✗ Low severity vulnerability found in apt/libapt-pkg5.0
> Description: Improper Verification of Cryptographic Signature
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-APT-407502]
> Introduced through: apt/[email protected], [email protected]
> From: apt/[email protected]
> From: [email protected] > apt/[email protected]
> From: [email protected]
> ✗ Medium severity vulnerability found in wget
> Description: Open Redirect
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-WGET-1277612]
> Introduced through: [email protected]
> From: [email protected]
> ✗ Medium severity vulnerability found in sqlite3/libsqlite3-0
> Description: Uncontrolled Recursion
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-537251]
> Introduced through: gnupg2/[email protected]+deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> ✗ Medium severity vulnerability found in sqlite3/libsqlite3-0
> Description: Improper Handling of Exceptional Conditions
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-539769]
> Introduced through: gnupg2/[email protected]+deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> ✗ Medium severity vulnerability found in sqlite3/libsqlite3-0
> Description: CVE-2020-13631
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-570487]
> Introduced through: gnupg2/[email protected]+deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> ✗ Medium severity vulnerability found in python2.7/libpython2.7-stdlib
> Description: HTTP Request Smuggling
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-1085863]
> Introduced through: [email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> and 7 more...
> ✗ Medium severity vulnerability found in pcre3/libpcre3
> Description: Integer Overflow or Wraparound
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-572367]
> Introduced through: meta-common-packages@meta
> From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
> ✗ Medium severity vulnerability found in p11-kit/libp11-kit0
> Description: Out-of-bounds Read
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-P11KIT-1050832]
> Introduced through: [email protected], [email protected]+deb10u1
> From: [email protected] > p11-kit/[email protected]
> From: [email protected] > p11-kit/[email protected] >
> p11-kit/[email protected]
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> gnutls28/[email protected]+deb10u5 > p11-kit/[email protected]
> and 2 more...
> Fixed in: 0.23.15-2+deb10u1
> ✗ Medium severity vulnerability found in openssl/libssl1.1
> Description: Integer Overflow or Wraparound
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-1075330]
> Introduced through: openssl/[email protected]+deb10u4,
> openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
> From: openssl/[email protected]+deb10u4
> From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
> openssl/[email protected]+deb10u4
> From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
> openssl/[email protected]+deb10u4
> and 6 more...
> Fixed in: 1.1.1d-0+deb10u5
> ✗ Medium severity vulnerability found in openssl/libssl1.1
> Description: NULL Pointer Dereference
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-1089177]
> Introduced through: openssl/[email protected]+deb10u4,
> openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
> From: openssl/[email protected]+deb10u4
> From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
> openssl/[email protected]+deb10u4
> From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
> openssl/[email protected]+deb10u4
> and 6 more...
> Fixed in: 1.1.1d-0+deb10u6
> ✗ Medium severity vulnerability found in openssl/libssl1.1
> Description: Information Exposure
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-536856]
> Introduced through: openssl/[email protected]+deb10u4,
> openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
> From: openssl/[email protected]+deb10u4
> From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
> openssl/[email protected]+deb10u4
> From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
> openssl/[email protected]+deb10u4
> and 6 more...
> Fixed in: 1.1.1d-0+deb10u5
> ✗ Medium severity vulnerability found in libzstd/libzstd1
> Description: Incorrect Default Permissions
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBZSTD-1080893]
> Introduced through: libzstd/[email protected]+dfsg-3, [email protected]
> From: libzstd/[email protected]+dfsg-3
> From: [email protected] > apt/[email protected] > libzstd/[email protected]+dfsg-3
> Fixed in: 1.3.8+dfsg-3+deb10u1
> ✗ Medium severity vulnerability found in libzstd/libzstd1
> Description: Incorrect Default Permissions
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBZSTD-1080899]
> Introduced through: libzstd/[email protected]+dfsg-3, [email protected]
> From: libzstd/[email protected]+dfsg-3
> From: [email protected] > apt/[email protected] > libzstd/[email protected]+dfsg-3
> Fixed in: 1.3.8+dfsg-3+deb10u2
> ✗ Medium severity vulnerability found in libgcrypt20
> Description: Race Condition
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBGCRYPT20-460489]
> Introduced through: gnupg2/[email protected]+deb10u1,
> gnupg2/[email protected]+deb10u1, procps@2:3.3.15-2, [email protected]+deb10u1
> From: gnupg2/[email protected]+deb10u1 > [email protected]
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> [email protected]
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> [email protected]
> and 8 more...
> ✗ Medium severity vulnerability found in iproute2
> Description: Use After Free
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-IPROUTE2-568742]
> Introduced through: [email protected]
> From: [email protected]
> ✗ Medium severity vulnerability found in glibc/libc-bin
> Description: Loop with Unreachable Exit Condition ('Infinite Loop')
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1035462]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Medium severity vulnerability found in glibc/libc-bin
> Description: Out-of-bounds Read
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1055403]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Medium severity vulnerability found in glibc/libc-bin
> Description: Out-of-Bounds
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559181]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ Medium severity vulnerability found in curl/libcurl4
> Description: Information Exposure
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1089952]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
> From: [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
> Fixed in: 7.64.0-4+deb10u2
> ✗ High severity vulnerability found in systemd/libsystemd0
> Description: Privilege Chaining
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-345386]
> Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
> util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
> From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
> From: [email protected] > apt/[email protected] >
> systemd/libsystemd0@241-7~deb10u5
> From: util-linux/[email protected] > [email protected] >
> systemd/libsystemd0@241-7~deb10u5
> and 4 more...
> ✗ High severity vulnerability found in systemd/libsystemd0
> Description: Incorrect Privilege Assignment
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-345391]
> Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
> util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
> From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
> From: [email protected] > apt/[email protected] >
> systemd/libsystemd0@241-7~deb10u5
> From: util-linux/[email protected] > [email protected] >
> systemd/libsystemd0@241-7~deb10u5
> and 4 more...
> ✗ High severity vulnerability found in subversion/libsvn1
> Description: NULL Pointer Dereference
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SUBVERSION-1071814]
> Introduced through: [email protected]+deb10u1
> From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1
> From: [email protected]+deb10u1
> Fixed in: 1.10.4-1+deb10u2
> ✗ High severity vulnerability found in sqlite3/libsqlite3-0
> Description: CVE-2019-19603
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-537598]
> Introduced through: gnupg2/[email protected]+deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
> sqlite3/[email protected]+deb10u1
> ✗ High severity vulnerability found in python2.7/libpython2.7-stdlib
> Description: Buffer Overflow
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-1063178]
> Introduced through: [email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> [email protected]+deb10u1 > python2.7/[email protected]+deb10u1
> From: [email protected]+deb10u1 > python-defaults/[email protected] >
> python-defaults/[email protected] >
> python-defaults/[email protected] >
> python2.7/[email protected]+deb10u1
> and 7 more...
> ✗ High severity vulnerability found in pcre2/libpcre2-8-0
> Description: Out-of-bounds Read
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-PCRE2-548863]
> Introduced through: git@1:2.20.1-2+deb10u3, [email protected]
> From: git@1:2.20.1-2+deb10u3 > pcre2/[email protected]
> From: [email protected] > pcre2/[email protected]
> ✗ High severity vulnerability found in p11-kit/libp11-kit0
> Description: Out-of-bounds Write
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-P11KIT-1050833]
> Introduced through: [email protected], [email protected]+deb10u1
> From: [email protected] > p11-kit/[email protected]
> From: [email protected] > p11-kit/[email protected] >
> p11-kit/[email protected]
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> gnutls28/[email protected]+deb10u5 > p11-kit/[email protected]
> and 2 more...
> Fixed in: 0.23.15-2+deb10u1
> ✗ High severity vulnerability found in p11-kit/libp11-kit0
> Description: Integer Overflow or Wraparound
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-P11KIT-1050836]
> Introduced through: [email protected], [email protected]+deb10u1
> From: [email protected] > p11-kit/[email protected]
> From: [email protected] > p11-kit/[email protected] >
> p11-kit/[email protected]
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> gnutls28/[email protected]+deb10u5 > p11-kit/[email protected]
> and 2 more...
> Fixed in: 0.23.15-2+deb10u1
> ✗ High severity vulnerability found in openssl/libssl1.1
> Description: Integer Overflow or Wraparound
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-1075326]
> Introduced through: openssl/[email protected]+deb10u4,
> openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
> [email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
> From: openssl/[email protected]+deb10u4
> From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
> openssl/[email protected]+deb10u4
> From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
> openssl/[email protected]+deb10u4
> and 6 more...
> Fixed in: 1.1.1d-0+deb10u5
> ✗ High severity vulnerability found in openldap/libldap-common
> Description: Reachable Assertion
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064721]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> Fixed in: 2.4.47+dfsg-3+deb10u5
> ✗ High severity vulnerability found in openldap/libldap-common
> Description: Out-of-bounds Read
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064724]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> Fixed in: 2.4.47+dfsg-3+deb10u5
> ✗ High severity vulnerability found in openldap/libldap-common
> Description: Integer Underflow
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064726]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> Fixed in: 2.4.47+dfsg-3+deb10u5
> ✗ High severity vulnerability found in openldap/libldap-common
> Description: Release of Invalid Pointer or Reference
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064733]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> Fixed in: 2.4.47+dfsg-3+deb10u5
> ✗ High severity vulnerability found in openldap/libldap-common
> Description: Double Free
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064737]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> Fixed in: 2.4.47+dfsg-3+deb10u5
> ✗ High severity vulnerability found in openldap/libldap-common
> Description: Loop with Unreachable Exit Condition ('Infinite Loop')
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064742]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> Fixed in: 2.4.47+dfsg-3+deb10u5
> ✗ High severity vulnerability found in openldap/libldap-common
> Description: CVE-2020-36226
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064744]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> Fixed in: 2.4.47+dfsg-3+deb10u5
> ✗ High severity vulnerability found in openldap/libldap-common
> Description: Integer Underflow
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064746]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> Fixed in: 2.4.47+dfsg-3+deb10u5
> ✗ High severity vulnerability found in openldap/libldap-common
> Description: Access of Resource Using Incompatible Type ('Type Confusion')
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064752]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> Fixed in: 2.4.47+dfsg-3+deb10u5
> ✗ High severity vulnerability found in openldap/libldap-common
> Description: Reachable Assertion
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064754]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> Fixed in: 2.4.47+dfsg-3+deb10u5
> ✗ High severity vulnerability found in openldap/libldap-common
> Description: Reachable Assertion
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1074919]
> Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
> git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: gnupg2/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> openldap/[email protected]+dfsg-3+deb10u4
> and 1 more...
> Fixed in: 2.4.47+dfsg-3+deb10u6
> ✗ High severity vulnerability found in nettle/libnettle6
> Description: Use of a Broken or Risky Cryptographic Algorithm
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-NETTLE-1090205]
> Introduced through: iputils/iputils-ping@3:20180629-2+deb10u1,
> [email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
> From: iputils/iputils-ping@3:20180629-2+deb10u1 > nettle/[email protected]
> From: [email protected] > nettle/[email protected]
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 >
> nettle/[email protected]
> and 5 more...
> ✗ High severity vulnerability found in lz4/liblz4-1
> Description: Out-of-bounds Write
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LZ4-1277601]
> Introduced through: [email protected], [email protected]+deb10u1,
> procps@2:3.3.15-2
> From: [email protected] > apt/[email protected] > lz4/[email protected]
> From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
> lz4/[email protected]
> From: procps@2:3.3.15-2 > procps/libprocps7@2:3.3.15-2 >
> systemd/libsystemd0@241-7~deb10u5 > lz4/[email protected]
> Fixed in: 1.8.3-1+deb10u1
> ✗ High severity vulnerability found in libssh2/libssh2-1
> Description: Out-of-bounds Read
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBSSH2-452460]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> libssh2/[email protected]
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 >
> libssh2/[email protected]
> ✗ High severity vulnerability found in libidn2/libidn2-0
> Description: Improper Input Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBIDN2-474100]
> Introduced through: iputils/iputils-ping@3:20180629-2+deb10u1,
> [email protected], [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: iputils/iputils-ping@3:20180629-2+deb10u1 >
> libidn2/[email protected]+deb10u1
> From: [email protected] > libidn2/[email protected]+deb10u1
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
> libidn2/[email protected]+deb10u1
> and 3 more...
> ✗ High severity vulnerability found in libgcrypt20
> Description: Information Exposure
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBGCRYPT20-1297893]
> Introduced through: gnupg2/[email protected]+deb10u1,
> gnupg2/[email protected]+deb10u1, procps@2:3.3.15-2, [email protected]+deb10u1
> From: gnupg2/[email protected]+deb10u1 > [email protected]
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> [email protected]
> From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
> [email protected]
> and 8 more...
> ✗ High severity vulnerability found in libbsd/libbsd0
> Description: Out-of-bounds Read
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-LIBBSD-541041]
> Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
> From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
> libedit/[email protected] > libbsd/[email protected]
> Fixed in: 0.9.1-2+deb10u1
> ✗ High severity vulnerability found in gnutls28/libgnutls30
> Description: Use After Free
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-1085094]
> Introduced through: [email protected], gnupg2/[email protected]+deb10u1,
> [email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
> From: [email protected] > gnutls28/[email protected]+deb10u5
> From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
> From: [email protected] > gnutls28/[email protected]+deb10u5
> and 3 more...
> ✗ High severity vulnerability found in gnutls28/libgnutls30
> Description: Use After Free
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-1085097]
> Introduced through: [email protected], gnupg2/[email protected]+deb10u1,
> [email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
> From: [email protected] > gnutls28/[email protected]+deb10u5
> From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
> From: [email protected] > gnutls28/[email protected]+deb10u5
> and 3 more...
> ✗ High severity vulnerability found in gnutls28/libgnutls30
> Description: Out-of-bounds Write
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-609778]
> Introduced through: [email protected], gnupg2/[email protected]+deb10u1,
> [email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
> From: [email protected] > gnutls28/[email protected]+deb10u5
> From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
> From: [email protected] > gnutls28/[email protected]+deb10u5
> and 3 more...
> ✗ High severity vulnerability found in glibc/libc-bin
> Description: Reachable Assertion
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1065768]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ High severity vulnerability found in glibc/libc-bin
> Description: Use After Free
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1296899]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ High severity vulnerability found in glibc/libc-bin
> Description: Out-of-bounds Write
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559488]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ High severity vulnerability found in glibc/libc-bin
> Description: Use After Free
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559493]
> Introduced through: glibc/[email protected], meta-common-packages@meta
> From: glibc/[email protected]
> From: meta-common-packages@meta > glibc/[email protected]
> ✗ High severity vulnerability found in git/git-man
> Description: Link Following
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GIT-1083853]
> Introduced through: git@1:2.20.1-2+deb10u3
> From: git@1:2.20.1-2+deb10u3 > git/git-man@1:2.20.1-2+deb10u3
> From: git@1:2.20.1-2+deb10u3
> ✗ High severity vulnerability found in gcc-8/libstdc++6
> Description: Information Exposure
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GCC8-347558]
> Introduced through: gcc-8/[email protected], [email protected],
> meta-common-packages@meta
> From: gcc-8/[email protected]
> From: [email protected] > gcc-8/[email protected]
> From: [email protected] > apt/[email protected] > gcc-8/[email protected]
> and 2 more...
> ✗ High severity vulnerability found in gcc-8/libstdc++6
> Description: Insufficient Entropy
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-GCC8-469413]
> Introduced through: gcc-8/[email protected], [email protected],
> meta-common-packages@meta
> From: gcc-8/[email protected]
> From: [email protected] > gcc-8/[email protected]
> From: [email protected] > apt/[email protected] > gcc-8/[email protected]
> and 2 more...
> ✗ High severity vulnerability found in curl/libcurl4
> Description: Out-of-bounds Write
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1049502]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
> From: [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
> Fixed in: 7.64.0-4+deb10u2
> ✗ High severity vulnerability found in curl/libcurl4
> Description: Improper Certificate Validation
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1049506]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
> From: [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
> Fixed in: 7.64.0-4+deb10u2
> ✗ High severity vulnerability found in curl/libcurl4
> Description: Arbitrary Code Injection
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-CURL-573151]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
> From: [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
> Fixed in: 7.64.0-4+deb10u2
> ✗ High severity vulnerability found in curl/libcurl4
> Description: Information Exposure
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-CURL-573153]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
> From: [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
> Fixed in: 7.64.0-4+deb10u2
> ✗ High severity vulnerability found in curl/libcurl4
> Description: Use After Free
> Info: [https://snyk.io/vuln/SNYK-DEBIAN10-CURL-608200]
> Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
> From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
> From: [email protected]+deb10u1
> From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
> Fixed in: 7.64.0-4+deb10u2
>
> Package manager: deb
> Project name: docker-image|guacamole/guacamole
> Docker image: guacamole/guacamole:1.3.0
> Platform: linux/amd64
> Tested 179 dependencies for known vulnerabilities, found 137 vulnerabilities.
> For more free scans that keep your images secure, sign up to Snyk at
> [https://dockr.ly/3ePqVcp]
> tgates@MacBook-Pro ~
--
This message was sent by Atlassian Jira
(v8.3.4#803005)