Skip to content

Instantly share code, notes, and snippets.

@Hexer338
Created February 20, 2023 12:49
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Hexer338/94bd48732cc37ce289f5929183361645 to your computer and use it in GitHub Desktop.
Save Hexer338/94bd48732cc37ce289f5929183361645 to your computer and use it in GitHub Desktop.
Vulnerability scan of Elasticsearch v7.17.9 docker image using Trivy
{
"SchemaVersion": 2,
"ArtifactName": "e4b82614cac8",
"ArtifactType": "container_image",
"Metadata": {
"OS": {
"Family": "ubuntu",
"Name": "20.04"
},
"ImageID": "sha256:e4b82614cac80061c8ad1bfc5e693d999ee0f9cb59b02e29c535d6eba3a91ec6",
"DiffIDs": [
"sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17",
"sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a",
"sha256:18bda79dfb6bca88ae68a2772a4158468442d4476331d2baf928fd3c1d6789fc",
"sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
"sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2",
"sha256:25842123148292f9c4050d88d73d82a8ab8f58781b272fb3a6bd6006d5889600",
"sha256:ea69c5458eb3826c153edac6f42d575798490c4e77973606de21c13887a37cfc",
"sha256:f546d85b487db358a14ca9a047ae192831214816f68768a667d10c1f4ea3ca43",
"sha256:84513b242b1863ec01a8f52670dd58ebb6175aaf3fd73cabf07cb7e0bc282bc1",
"sha256:509e2447eafce8effaa7f8beca7bf70a62f6d62476c938d6ef1ea5dcab3b5e03"
],
"RepoTags": [
"docker.elastic.co/elasticsearch/elasticsearch:7.17.9"
],
"RepoDigests": [
"docker.elastic.co/elasticsearch/elasticsearch@sha256:59b37f77bd8b015d5b60f75bebb22d06028f7f15036f9d3559d2b7c16ece74db"
],
"ImageConfig": {
"architecture": "arm64",
"created": "2023-01-31T05:40:35.485864077Z",
"history": [
{
"created": "2022-12-09T01:46:50Z",
"created_by": "/bin/sh -c #(nop) ADD file:8cba976cb6ea226de769a768ee274e7679d34f923c93392f340680dc6696232e in / "
},
{
"created": "2022-12-09T01:46:50Z",
"created_by": "/bin/sh -c #(nop) CMD [\"bash\"]",
"empty_layer": true
},
{
"created": "2023-01-31T05:40:29Z",
"created_by": "RUN /bin/sh -c yes no | dpkg-reconfigure dash \u0026\u0026 for iter in 1 2 3 4 5 6 7 8 9 10; do export DEBIAN_FRONTEND=noninteractive \u0026\u0026 apt-get update \u0026\u0026 apt-get upgrade -y \u0026\u0026 apt-get install -y --no-install-recommends ca-certificates curl netcat p11-kit unzip zip \u0026\u0026 apt-get clean \u0026\u0026 rm -rf /var/lib/apt/lists/* \u0026\u0026 exit_code=0 \u0026\u0026 break || exit_code=$? \u0026\u0026 echo \"apt-get error: retry $iter in 10s\" \u0026\u0026 sleep 10; done; exit $exit_code # buildkit",
"comment": "buildkit.dockerfile.v0"
},
{
"created": "2023-01-31T05:40:31Z",
"created_by": "RUN /bin/sh -c groupadd -g 1000 elasticsearch \u0026\u0026 adduser --uid 1000 --gid 1000 --home /usr/share/elasticsearch elasticsearch \u0026\u0026 adduser elasticsearch root \u0026\u0026 chown -R 0:0 /usr/share/elasticsearch # buildkit",
"comment": "buildkit.dockerfile.v0"
},
{
"created": "2023-01-31T05:40:31Z",
"created_by": "ENV ELASTIC_CONTAINER=true",
"comment": "buildkit.dockerfile.v0",
"empty_layer": true
},
{
"created": "2023-01-31T05:40:31Z",
"created_by": "WORKDIR /usr/share/elasticsearch",
"comment": "buildkit.dockerfile.v0"
},
{
"created": "2023-01-31T05:40:33Z",
"created_by": "COPY /usr/share/elasticsearch /usr/share/elasticsearch # buildkit",
"comment": "buildkit.dockerfile.v0"
},
{
"created": "2023-01-31T05:40:33Z",
"created_by": "COPY /bin/tini /bin/tini # buildkit",
"comment": "buildkit.dockerfile.v0"
},
{
"created": "2023-01-31T05:40:33Z",
"created_by": "ENV PATH=/usr/share/elasticsearch/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"comment": "buildkit.dockerfile.v0",
"empty_layer": true
},
{
"created": "2023-01-31T05:40:33Z",
"created_by": "COPY bin/docker-entrypoint.sh /usr/local/bin/docker-entrypoint.sh # buildkit",
"comment": "buildkit.dockerfile.v0"
},
{
"created": "2023-01-31T05:40:34Z",
"created_by": "RUN /bin/sh -c chmod g=u /etc/passwd \u0026\u0026 chmod 0555 /usr/local/bin/docker-entrypoint.sh \u0026\u0026 find / -xdev -perm -4000 -exec chmod ug-s {} + \u0026\u0026 chmod 0775 /usr/share/elasticsearch \u0026\u0026 chown elasticsearch bin config config/jvm.options.d data logs plugins # buildkit",
"comment": "buildkit.dockerfile.v0"
},
{
"created": "2023-01-31T05:40:34Z",
"created_by": "COPY bin/docker-openjdk /etc/ca-certificates/update.d/docker-openjdk # buildkit",
"comment": "buildkit.dockerfile.v0"
},
{
"created": "2023-01-31T05:40:35Z",
"created_by": "RUN /bin/sh -c /etc/ca-certificates/update.d/docker-openjdk # buildkit",
"comment": "buildkit.dockerfile.v0"
},
{
"created": "2023-01-31T05:40:35Z",
"created_by": "EXPOSE map[9200/tcp:{} 9300/tcp:{}]",
"comment": "buildkit.dockerfile.v0",
"empty_layer": true
},
{
"created": "2023-01-31T05:40:35Z",
"created_by": "LABEL org.label-schema.build-date=2023-01-31T05:34:43.305517834Z org.label-schema.license=Elastic-License-2.0 org.label-schema.name=Elasticsearch org.label-schema.schema-version=1.0 org.label-schema.url=https://www.elastic.co/products/elasticsearch org.label-schema.usage=https://www.elastic.co/guide/en/elasticsearch/reference/index.html org.label-schema.vcs-ref=ef48222227ee6b9e70e502f0f0daa52435ee634d org.label-schema.vcs-url=https://github.com/elastic/elasticsearch org.label-schema.vendor=Elastic org.label-schema.version=7.17.9 org.opencontainers.image.created=2023-01-31T05:34:43.305517834Z org.opencontainers.image.documentation=https://www.elastic.co/guide/en/elasticsearch/reference/index.html org.opencontainers.image.licenses=Elastic-License-2.0 org.opencontainers.image.revision=ef48222227ee6b9e70e502f0f0daa52435ee634d org.opencontainers.image.source=https://github.com/elastic/elasticsearch org.opencontainers.image.title=Elasticsearch org.opencontainers.image.url=https://www.elastic.co/products/elasticsearch org.opencontainers.image.vendor=Elastic org.opencontainers.image.version=7.17.9",
"comment": "buildkit.dockerfile.v0",
"empty_layer": true
},
{
"created": "2023-01-31T05:40:35Z",
"created_by": "ENTRYPOINT [\"/bin/tini\" \"--\" \"/usr/local/bin/docker-entrypoint.sh\"]",
"comment": "buildkit.dockerfile.v0",
"empty_layer": true
},
{
"created": "2023-01-31T05:40:35Z",
"created_by": "CMD [\"eswrapper\"]",
"comment": "buildkit.dockerfile.v0",
"empty_layer": true
}
],
"os": "linux",
"rootfs": {
"type": "layers",
"diff_ids": [
"sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17",
"sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a",
"sha256:18bda79dfb6bca88ae68a2772a4158468442d4476331d2baf928fd3c1d6789fc",
"sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
"sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2",
"sha256:25842123148292f9c4050d88d73d82a8ab8f58781b272fb3a6bd6006d5889600",
"sha256:ea69c5458eb3826c153edac6f42d575798490c4e77973606de21c13887a37cfc",
"sha256:f546d85b487db358a14ca9a047ae192831214816f68768a667d10c1f4ea3ca43",
"sha256:84513b242b1863ec01a8f52670dd58ebb6175aaf3fd73cabf07cb7e0bc282bc1",
"sha256:509e2447eafce8effaa7f8beca7bf70a62f6d62476c938d6ef1ea5dcab3b5e03"
]
},
"config": {
"Cmd": [
"eswrapper"
],
"Entrypoint": [
"/bin/tini",
"--",
"/usr/local/bin/docker-entrypoint.sh"
],
"Env": [
"PATH=/usr/share/elasticsearch/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"ELASTIC_CONTAINER=true"
],
"Labels": {
"org.label-schema.build-date": "2023-01-31T05:34:43.305517834Z",
"org.label-schema.license": "Elastic-License-2.0",
"org.label-schema.name": "Elasticsearch",
"org.label-schema.schema-version": "1.0",
"org.label-schema.url": "https://www.elastic.co/products/elasticsearch",
"org.label-schema.usage": "https://www.elastic.co/guide/en/elasticsearch/reference/index.html",
"org.label-schema.vcs-ref": "ef48222227ee6b9e70e502f0f0daa52435ee634d",
"org.label-schema.vcs-url": "https://github.com/elastic/elasticsearch",
"org.label-schema.vendor": "Elastic",
"org.label-schema.version": "7.17.9",
"org.opencontainers.image.created": "2023-01-31T05:34:43.305517834Z",
"org.opencontainers.image.documentation": "https://www.elastic.co/guide/en/elasticsearch/reference/index.html",
"org.opencontainers.image.licenses": "Elastic-License-2.0",
"org.opencontainers.image.revision": "ef48222227ee6b9e70e502f0f0daa52435ee634d",
"org.opencontainers.image.source": "https://github.com/elastic/elasticsearch",
"org.opencontainers.image.title": "Elasticsearch",
"org.opencontainers.image.url": "https://www.elastic.co/products/elasticsearch",
"org.opencontainers.image.vendor": "Elastic",
"org.opencontainers.image.version": "7.17.9"
},
"WorkingDir": "/usr/share/elasticsearch",
"ArgsEscaped": true
}
}
},
"Results": [
{
"Target": "e4b82614cac8 (ubuntu 20.04)",
"Class": "os-pkgs",
"Type": "ubuntu",
"Vulnerabilities": [
{
"VulnerabilityID": "CVE-2016-2781",
"PkgID": "coreutils@8.30-3ubuntu2",
"PkgName": "coreutils",
"InstalledVersion": "8.30-3ubuntu2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-2781",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "coreutils: Non-privileged session can escape to the parent session in chroot",
"Description": "chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.",
"Severity": "LOW",
"CweIDs": [
"CWE-20"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
"V2Score": 2.1,
"V3Score": 6.5
},
"redhat": {
"V2Vector": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"V2Score": 6.2,
"V3Score": 8.6
}
},
"References": [
"http://seclists.org/oss-sec/2016/q1/452",
"http://www.openwall.com/lists/oss-security/2016/02/28/2",
"http://www.openwall.com/lists/oss-security/2016/02/28/3",
"https://access.redhat.com/security/cve/CVE-2016-2781",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
"https://lore.kernel.org/patchwork/patch/793178/"
],
"PublishedDate": "2017-02-07T15:59:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2023-23916",
"PkgID": "curl@7.68.0-1ubuntu2.15",
"PkgName": "curl",
"InstalledVersion": "7.68.0-1ubuntu2.15",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-23916",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "[curl: HTTP multi-header compression denial of service]",
"Description": "HTTP multi-header compression denial of service",
"Severity": "MEDIUM",
"References": [
"https://curl.se/docs/CVE-2023-23916.html",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916"
]
},
{
"VulnerabilityID": "CVE-2022-3219",
"PkgID": "gpgv@2.2.19-3ubuntu2.2",
"PkgName": "gpgv",
"InstalledVersion": "2.2.19-3ubuntu2.2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3219",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "gnupg: denial of service issue (resource consumption) using compressed packets",
"Description": "No description is available for this CVE.",
"Severity": "LOW",
"CVSS": {
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.2
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-3219",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3219",
"https://marc.info/?l=oss-security\u0026m=165696590211434\u0026w=4"
]
},
{
"VulnerabilityID": "CVE-2022-45142",
"PkgID": "libasn1-8-heimdal@7.7.0+dfsg-1ubuntu1.3",
"PkgName": "libasn1-8-heimdal",
"InstalledVersion": "7.7.0+dfsg-1ubuntu1.3",
"FixedVersion": "7.7.0+dfsg-1ubuntu1.4",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-45142",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "[gsskrb5: fix accidental logic inversions]",
"Description": "signature validation failure",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142",
"https://ubuntu.com/security/notices/USN-5849-1",
"https://www.openwall.com/lists/oss-security/2023/02/08/1"
]
},
{
"VulnerabilityID": "CVE-2016-20013",
"PkgID": "libc-bin@2.31-0ubuntu9.9",
"PkgName": "libc-bin",
"InstalledVersion": "2.31-0ubuntu9.9",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-20013",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Description": "sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
}
},
"References": [
"https://akkadia.org/drepper/SHA-crypt.txt",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013",
"https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/",
"https://twitter.com/solardiz/status/795601240151457793"
],
"PublishedDate": "2022-02-19T05:15:00Z",
"LastModifiedDate": "2022-03-03T16:43:00Z"
},
{
"VulnerabilityID": "CVE-2016-20013",
"PkgID": "libc6@2.31-0ubuntu9.9",
"PkgName": "libc6",
"InstalledVersion": "2.31-0ubuntu9.9",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-20013",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Description": "sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.",
"Severity": "LOW",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
}
},
"References": [
"https://akkadia.org/drepper/SHA-crypt.txt",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013",
"https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/",
"https://twitter.com/solardiz/status/795601240151457793"
],
"PublishedDate": "2022-02-19T05:15:00Z",
"LastModifiedDate": "2022-03-03T16:43:00Z"
},
{
"VulnerabilityID": "CVE-2023-23916",
"PkgID": "libcurl4@7.68.0-1ubuntu2.15",
"PkgName": "libcurl4",
"InstalledVersion": "7.68.0-1ubuntu2.15",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-23916",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "[curl: HTTP multi-header compression denial of service]",
"Description": "HTTP multi-header compression denial of service",
"Severity": "MEDIUM",
"References": [
"https://curl.se/docs/CVE-2023-23916.html",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916"
]
},
{
"VulnerabilityID": "CVE-2023-0361",
"PkgID": "libgnutls30@3.6.13-2ubuntu1.7",
"PkgName": "libgnutls30",
"InstalledVersion": "3.6.13-2ubuntu1.7",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-0361",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "A timing side-channel in the handling of RSA ClientKeyExchange message ...",
"Description": "A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.",
"Severity": "MEDIUM",
"References": [
"https://access.redhat.com/security/cve/CVE-2023-0361",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361",
"https://github.com/tlsfuzzer/tlsfuzzer/pull/679",
"https://gitlab.com/gnutls/gnutls/-/issues/1050",
"https://gnutls.org/security-new.html#GNUTLS-SA-2020-07-14"
],
"PublishedDate": "2023-02-15T18:15:00Z",
"LastModifiedDate": "2023-02-16T14:08:00Z"
},
{
"VulnerabilityID": "CVE-2021-36222",
"PkgID": "libgssapi-krb5-2@1.17-6ubuntu4.2",
"PkgName": "libgssapi-krb5-2",
"InstalledVersion": "1.17-6ubuntu4.2",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36222",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS",
"Description": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-36222",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222",
"https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562",
"https://github.com/krb5/krb5/releases",
"https://linux.oracle.com/cve/CVE-2021-36222.html",
"https://linux.oracle.com/errata/ELSA-2021-3576.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-36222",
"https://security.netapp.com/advisory/ntap-20211022-0003/",
"https://security.netapp.com/advisory/ntap-20211104-0007/",
"https://web.mit.edu/kerberos/advisories/",
"https://www.debian.org/security/2021/dsa-4944",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-07-22T18:15:00Z",
"LastModifiedDate": "2021-11-28T23:19:00Z"
},
{
"VulnerabilityID": "CVE-2021-37750",
"PkgID": "libgssapi-krb5-2@1.17-6ubuntu4.2",
"PkgName": "libgssapi-krb5-2",
"InstalledVersion": "1.17-6ubuntu4.2",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-37750",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field",
"Description": "The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json",
"https://access.redhat.com/security/cve/CVE-2021-37750",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750",
"https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49",
"https://github.com/krb5/krb5/releases",
"https://linux.oracle.com/cve/CVE-2021-37750.html",
"https://linux.oracle.com/errata/ELSA-2021-4788.html",
"https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-37750",
"https://security.netapp.com/advisory/ntap-20210923-0002/",
"https://web.mit.edu/kerberos/advisories/",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.starwindsoftware.com/security/sw-20220817-0004/"
],
"PublishedDate": "2021-08-23T05:15:00Z",
"LastModifiedDate": "2022-10-25T16:57:00Z"
},
{
"VulnerabilityID": "CVE-2022-45142",
"PkgID": "libgssapi3-heimdal@7.7.0+dfsg-1ubuntu1.3",
"PkgName": "libgssapi3-heimdal",
"InstalledVersion": "7.7.0+dfsg-1ubuntu1.3",
"FixedVersion": "7.7.0+dfsg-1ubuntu1.4",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-45142",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "[gsskrb5: fix accidental logic inversions]",
"Description": "signature validation failure",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142",
"https://ubuntu.com/security/notices/USN-5849-1",
"https://www.openwall.com/lists/oss-security/2023/02/08/1"
]
},
{
"VulnerabilityID": "CVE-2022-45142",
"PkgID": "libhcrypto4-heimdal@7.7.0+dfsg-1ubuntu1.3",
"PkgName": "libhcrypto4-heimdal",
"InstalledVersion": "7.7.0+dfsg-1ubuntu1.3",
"FixedVersion": "7.7.0+dfsg-1ubuntu1.4",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-45142",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "[gsskrb5: fix accidental logic inversions]",
"Description": "signature validation failure",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142",
"https://ubuntu.com/security/notices/USN-5849-1",
"https://www.openwall.com/lists/oss-security/2023/02/08/1"
]
},
{
"VulnerabilityID": "CVE-2022-45142",
"PkgID": "libheimbase1-heimdal@7.7.0+dfsg-1ubuntu1.3",
"PkgName": "libheimbase1-heimdal",
"InstalledVersion": "7.7.0+dfsg-1ubuntu1.3",
"FixedVersion": "7.7.0+dfsg-1ubuntu1.4",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-45142",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "[gsskrb5: fix accidental logic inversions]",
"Description": "signature validation failure",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142",
"https://ubuntu.com/security/notices/USN-5849-1",
"https://www.openwall.com/lists/oss-security/2023/02/08/1"
]
},
{
"VulnerabilityID": "CVE-2022-45142",
"PkgID": "libheimntlm0-heimdal@7.7.0+dfsg-1ubuntu1.3",
"PkgName": "libheimntlm0-heimdal",
"InstalledVersion": "7.7.0+dfsg-1ubuntu1.3",
"FixedVersion": "7.7.0+dfsg-1ubuntu1.4",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-45142",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "[gsskrb5: fix accidental logic inversions]",
"Description": "signature validation failure",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142",
"https://ubuntu.com/security/notices/USN-5849-1",
"https://www.openwall.com/lists/oss-security/2023/02/08/1"
]
},
{
"VulnerabilityID": "CVE-2022-45142",
"PkgID": "libhx509-5-heimdal@7.7.0+dfsg-1ubuntu1.3",
"PkgName": "libhx509-5-heimdal",
"InstalledVersion": "7.7.0+dfsg-1ubuntu1.3",
"FixedVersion": "7.7.0+dfsg-1ubuntu1.4",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-45142",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "[gsskrb5: fix accidental logic inversions]",
"Description": "signature validation failure",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142",
"https://ubuntu.com/security/notices/USN-5849-1",
"https://www.openwall.com/lists/oss-security/2023/02/08/1"
]
},
{
"VulnerabilityID": "CVE-2021-36222",
"PkgID": "libk5crypto3@1.17-6ubuntu4.2",
"PkgName": "libk5crypto3",
"InstalledVersion": "1.17-6ubuntu4.2",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36222",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS",
"Description": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-36222",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222",
"https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562",
"https://github.com/krb5/krb5/releases",
"https://linux.oracle.com/cve/CVE-2021-36222.html",
"https://linux.oracle.com/errata/ELSA-2021-3576.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-36222",
"https://security.netapp.com/advisory/ntap-20211022-0003/",
"https://security.netapp.com/advisory/ntap-20211104-0007/",
"https://web.mit.edu/kerberos/advisories/",
"https://www.debian.org/security/2021/dsa-4944",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-07-22T18:15:00Z",
"LastModifiedDate": "2021-11-28T23:19:00Z"
},
{
"VulnerabilityID": "CVE-2021-37750",
"PkgID": "libk5crypto3@1.17-6ubuntu4.2",
"PkgName": "libk5crypto3",
"InstalledVersion": "1.17-6ubuntu4.2",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-37750",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field",
"Description": "The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json",
"https://access.redhat.com/security/cve/CVE-2021-37750",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750",
"https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49",
"https://github.com/krb5/krb5/releases",
"https://linux.oracle.com/cve/CVE-2021-37750.html",
"https://linux.oracle.com/errata/ELSA-2021-4788.html",
"https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-37750",
"https://security.netapp.com/advisory/ntap-20210923-0002/",
"https://web.mit.edu/kerberos/advisories/",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.starwindsoftware.com/security/sw-20220817-0004/"
],
"PublishedDate": "2021-08-23T05:15:00Z",
"LastModifiedDate": "2022-10-25T16:57:00Z"
},
{
"VulnerabilityID": "CVE-2022-45142",
"PkgID": "libkrb5-26-heimdal@7.7.0+dfsg-1ubuntu1.3",
"PkgName": "libkrb5-26-heimdal",
"InstalledVersion": "7.7.0+dfsg-1ubuntu1.3",
"FixedVersion": "7.7.0+dfsg-1ubuntu1.4",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-45142",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "[gsskrb5: fix accidental logic inversions]",
"Description": "signature validation failure",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142",
"https://ubuntu.com/security/notices/USN-5849-1",
"https://www.openwall.com/lists/oss-security/2023/02/08/1"
]
},
{
"VulnerabilityID": "CVE-2021-36222",
"PkgID": "libkrb5-3@1.17-6ubuntu4.2",
"PkgName": "libkrb5-3",
"InstalledVersion": "1.17-6ubuntu4.2",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36222",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS",
"Description": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-36222",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222",
"https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562",
"https://github.com/krb5/krb5/releases",
"https://linux.oracle.com/cve/CVE-2021-36222.html",
"https://linux.oracle.com/errata/ELSA-2021-3576.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-36222",
"https://security.netapp.com/advisory/ntap-20211022-0003/",
"https://security.netapp.com/advisory/ntap-20211104-0007/",
"https://web.mit.edu/kerberos/advisories/",
"https://www.debian.org/security/2021/dsa-4944",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-07-22T18:15:00Z",
"LastModifiedDate": "2021-11-28T23:19:00Z"
},
{
"VulnerabilityID": "CVE-2021-37750",
"PkgID": "libkrb5-3@1.17-6ubuntu4.2",
"PkgName": "libkrb5-3",
"InstalledVersion": "1.17-6ubuntu4.2",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-37750",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field",
"Description": "The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json",
"https://access.redhat.com/security/cve/CVE-2021-37750",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750",
"https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49",
"https://github.com/krb5/krb5/releases",
"https://linux.oracle.com/cve/CVE-2021-37750.html",
"https://linux.oracle.com/errata/ELSA-2021-4788.html",
"https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-37750",
"https://security.netapp.com/advisory/ntap-20210923-0002/",
"https://web.mit.edu/kerberos/advisories/",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.starwindsoftware.com/security/sw-20220817-0004/"
],
"PublishedDate": "2021-08-23T05:15:00Z",
"LastModifiedDate": "2022-10-25T16:57:00Z"
},
{
"VulnerabilityID": "CVE-2021-36222",
"PkgID": "libkrb5support0@1.17-6ubuntu4.2",
"PkgName": "libkrb5support0",
"InstalledVersion": "1.17-6ubuntu4.2",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-36222",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS",
"Description": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-36222",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222",
"https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562",
"https://github.com/krb5/krb5/releases",
"https://linux.oracle.com/cve/CVE-2021-36222.html",
"https://linux.oracle.com/errata/ELSA-2021-3576.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-36222",
"https://security.netapp.com/advisory/ntap-20211022-0003/",
"https://security.netapp.com/advisory/ntap-20211104-0007/",
"https://web.mit.edu/kerberos/advisories/",
"https://www.debian.org/security/2021/dsa-4944",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2021-07-22T18:15:00Z",
"LastModifiedDate": "2021-11-28T23:19:00Z"
},
{
"VulnerabilityID": "CVE-2021-37750",
"PkgID": "libkrb5support0@1.17-6ubuntu4.2",
"PkgName": "libkrb5support0",
"InstalledVersion": "1.17-6ubuntu4.2",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-37750",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field",
"Description": "The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-476"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json",
"https://access.redhat.com/security/cve/CVE-2021-37750",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750",
"https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49",
"https://github.com/krb5/krb5/releases",
"https://linux.oracle.com/cve/CVE-2021-37750.html",
"https://linux.oracle.com/errata/ELSA-2021-4788.html",
"https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/",
"https://nvd.nist.gov/vuln/detail/CVE-2021-37750",
"https://security.netapp.com/advisory/ntap-20210923-0002/",
"https://web.mit.edu/kerberos/advisories/",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.starwindsoftware.com/security/sw-20220817-0004/"
],
"PublishedDate": "2021-08-23T05:15:00Z",
"LastModifiedDate": "2022-10-25T16:57:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgID": "libncurses6@6.2-0ubuntu2",
"PkgName": "libncurses6",
"InstalledVersion": "6.2-0ubuntu2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1\u0026content-type=text/x-cvsweb-markup",
"http://seclists.org/fulldisclosure/2022/Oct/28",
"http://seclists.org/fulldisclosure/2022/Oct/41",
"http://seclists.org/fulldisclosure/2022/Oct/43",
"http://seclists.org/fulldisclosure/2022/Oct/45",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://support.apple.com/kb/HT213443",
"https://support.apple.com/kb/HT213444",
"https://support.apple.com/kb/HT213488",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2022-12-07T01:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgID": "libncurses6@6.2-0ubuntu2",
"PkgName": "libncurses6",
"InstalledVersion": "6.2-0ubuntu2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"http://seclists.org/fulldisclosure/2022/Oct/41",
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://support.apple.com/kb/HT213488",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-11-08T19:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgID": "libncursesw6@6.2-0ubuntu2",
"PkgName": "libncursesw6",
"InstalledVersion": "6.2-0ubuntu2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1\u0026content-type=text/x-cvsweb-markup",
"http://seclists.org/fulldisclosure/2022/Oct/28",
"http://seclists.org/fulldisclosure/2022/Oct/41",
"http://seclists.org/fulldisclosure/2022/Oct/43",
"http://seclists.org/fulldisclosure/2022/Oct/45",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://support.apple.com/kb/HT213443",
"https://support.apple.com/kb/HT213444",
"https://support.apple.com/kb/HT213488",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2022-12-07T01:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgID": "libncursesw6@6.2-0ubuntu2",
"PkgName": "libncursesw6",
"InstalledVersion": "6.2-0ubuntu2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"http://seclists.org/fulldisclosure/2022/Oct/41",
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://support.apple.com/kb/HT213488",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-11-08T19:46:00Z"
},
{
"VulnerabilityID": "CVE-2017-11164",
"PkgID": "libpcre3@2:8.39-12ubuntu0.1",
"PkgName": "libpcre3",
"InstalledVersion": "2:8.39-12ubuntu0.1",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-11164",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "pcre: OP_KETRMAX feature in the match function in pcre_exec.c",
"Description": "In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.",
"Severity": "LOW",
"CweIDs": [
"CWE-674"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 7.8,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"V3Score": 3.3
}
},
"References": [
"http://openwall.com/lists/oss-security/2017/07/11/3",
"http://www.securityfocus.com/bid/99575",
"https://access.redhat.com/security/cve/CVE-2017-11164",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
],
"PublishedDate": "2017-07-11T03:29:00Z",
"LastModifiedDate": "2021-02-25T17:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-45142",
"PkgID": "libroken18-heimdal@7.7.0+dfsg-1ubuntu1.3",
"PkgName": "libroken18-heimdal",
"InstalledVersion": "7.7.0+dfsg-1ubuntu1.3",
"FixedVersion": "7.7.0+dfsg-1ubuntu1.4",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-45142",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "[gsskrb5: fix accidental logic inversions]",
"Description": "signature validation failure",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142",
"https://ubuntu.com/security/notices/USN-5849-1",
"https://www.openwall.com/lists/oss-security/2023/02/08/1"
]
},
{
"VulnerabilityID": "CVE-2023-0286",
"PkgID": "libssl1.1@1.1.1f-1ubuntu2.16",
"PkgName": "libssl1.1",
"InstalledVersion": "1.1.1f-1ubuntu2.16",
"FixedVersion": "1.1.1f-1ubuntu2.17",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-0286",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "There is a type confusion vulnerability relating to X.400 address proc ...",
"Description": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.",
"Severity": "HIGH",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286",
"https://github.com/advisories/GHSA-x4qr-2fvf-3mr5",
"https://github.com/pyca/cryptography/security/advisories/GHSA-x4qr-2fvf-3mr5",
"https://nvd.nist.gov/vuln/detail/CVE-2023-0286",
"https://rustsec.org/advisories/RUSTSEC-2023-0006.html",
"https://ubuntu.com/security/notices/USN-5844-1",
"https://ubuntu.com/security/notices/USN-5845-1",
"https://ubuntu.com/security/notices/USN-5845-2",
"https://www.openssl.org/news/secadv/20230207.txt"
],
"PublishedDate": "2023-02-08T20:15:00Z",
"LastModifiedDate": "2023-02-09T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2022-4304",
"PkgID": "libssl1.1@1.1.1f-1ubuntu2.16",
"PkgName": "libssl1.1",
"InstalledVersion": "1.1.1f-1ubuntu2.16",
"FixedVersion": "1.1.1f-1ubuntu2.17",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-4304",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "A timing based side channel exists in the OpenSSL RSA Decryption imple ...",
"Description": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304",
"https://github.com/advisories/GHSA-p52g-cm5j-mjv4",
"https://nvd.nist.gov/vuln/detail/CVE-2022-4304",
"https://rustsec.org/advisories/RUSTSEC-2023-0007.html",
"https://ubuntu.com/security/notices/USN-5844-1",
"https://www.openssl.org/news/secadv/20230207.txt"
],
"PublishedDate": "2023-02-08T20:15:00Z",
"LastModifiedDate": "2023-02-09T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2022-4450",
"PkgID": "libssl1.1@1.1.1f-1ubuntu2.16",
"PkgName": "libssl1.1",
"InstalledVersion": "1.1.1f-1ubuntu2.16",
"FixedVersion": "1.1.1f-1ubuntu2.17",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-4450",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses ...",
"Description": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450",
"https://github.com/advisories/GHSA-v5w6-wcm8-jm4q",
"https://nvd.nist.gov/vuln/detail/CVE-2022-4450",
"https://rustsec.org/advisories/RUSTSEC-2023-0010.html",
"https://ubuntu.com/security/notices/USN-5844-1",
"https://www.openssl.org/news/secadv/20230207.txt"
],
"PublishedDate": "2023-02-08T20:15:00Z",
"LastModifiedDate": "2023-02-09T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2023-0215",
"PkgID": "libssl1.1@1.1.1f-1ubuntu2.16",
"PkgName": "libssl1.1",
"InstalledVersion": "1.1.1f-1ubuntu2.16",
"FixedVersion": "1.1.1f-1ubuntu2.17",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-0215",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "The public API function BIO_new_NDEF is a helper function used for str ...",
"Description": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215",
"https://github.com/advisories/GHSA-r7jw-wp68-3xch",
"https://nvd.nist.gov/vuln/detail/CVE-2023-0215",
"https://rustsec.org/advisories/RUSTSEC-2023-0009.html",
"https://ubuntu.com/security/notices/USN-5844-1",
"https://ubuntu.com/security/notices/USN-5845-1",
"https://ubuntu.com/security/notices/USN-5845-2",
"https://www.openssl.org/news/secadv/20230207.txt"
],
"PublishedDate": "2023-02-08T20:15:00Z",
"LastModifiedDate": "2023-02-09T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2022-3821",
"PkgID": "libsystemd0@245.4-4ubuntu3.19",
"PkgName": "libsystemd0",
"InstalledVersion": "245.4-4ubuntu3.19",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3821",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "systemd: buffer overrun in format_timespan() function",
"Description": "An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-193"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2023:0336",
"https://access.redhat.com/security/cve/CVE-2022-3821",
"https://bugzilla.redhat.com/2139327",
"https://bugzilla.redhat.com/show_bug.cgi?id=2139327",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3821",
"https://errata.almalinux.org/9/ALSA-2023-0336.html",
"https://errata.rockylinux.org/RLSA-2023:0336",
"https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e",
"https://github.com/systemd/systemd/issues/23928",
"https://github.com/systemd/systemd/pull/23933",
"https://linux.oracle.com/cve/CVE-2022-3821.html",
"https://linux.oracle.com/errata/ELSA-2023-0336.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-3821"
],
"PublishedDate": "2022-11-08T22:15:00Z",
"LastModifiedDate": "2022-12-02T22:45:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgID": "libtinfo6@6.2-0ubuntu2",
"PkgName": "libtinfo6",
"InstalledVersion": "6.2-0ubuntu2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1\u0026content-type=text/x-cvsweb-markup",
"http://seclists.org/fulldisclosure/2022/Oct/28",
"http://seclists.org/fulldisclosure/2022/Oct/41",
"http://seclists.org/fulldisclosure/2022/Oct/43",
"http://seclists.org/fulldisclosure/2022/Oct/45",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://support.apple.com/kb/HT213443",
"https://support.apple.com/kb/HT213444",
"https://support.apple.com/kb/HT213488",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2022-12-07T01:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgID": "libtinfo6@6.2-0ubuntu2",
"PkgName": "libtinfo6",
"InstalledVersion": "6.2-0ubuntu2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"http://seclists.org/fulldisclosure/2022/Oct/41",
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://support.apple.com/kb/HT213488",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-11-08T19:46:00Z"
},
{
"VulnerabilityID": "CVE-2022-3821",
"PkgID": "libudev1@245.4-4ubuntu3.19",
"PkgName": "libudev1",
"InstalledVersion": "245.4-4ubuntu3.19",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3821",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "systemd: buffer overrun in format_timespan() function",
"Description": "An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-193"
],
"CVSS": {
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/errata/RHSA-2023:0336",
"https://access.redhat.com/security/cve/CVE-2022-3821",
"https://bugzilla.redhat.com/2139327",
"https://bugzilla.redhat.com/show_bug.cgi?id=2139327",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3821",
"https://errata.almalinux.org/9/ALSA-2023-0336.html",
"https://errata.rockylinux.org/RLSA-2023:0336",
"https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e",
"https://github.com/systemd/systemd/issues/23928",
"https://github.com/systemd/systemd/pull/23933",
"https://linux.oracle.com/cve/CVE-2022-3821.html",
"https://linux.oracle.com/errata/ELSA-2023-0336.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/",
"https://nvd.nist.gov/vuln/detail/CVE-2022-3821"
],
"PublishedDate": "2022-11-08T22:15:00Z",
"LastModifiedDate": "2022-12-02T22:45:00Z"
},
{
"VulnerabilityID": "CVE-2022-45142",
"PkgID": "libwind0-heimdal@7.7.0+dfsg-1ubuntu1.3",
"PkgName": "libwind0-heimdal",
"InstalledVersion": "7.7.0+dfsg-1ubuntu1.3",
"FixedVersion": "7.7.0+dfsg-1ubuntu1.4",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-45142",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "[gsskrb5: fix accidental logic inversions]",
"Description": "signature validation failure",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142",
"https://ubuntu.com/security/notices/USN-5849-1",
"https://www.openwall.com/lists/oss-security/2023/02/08/1"
]
},
{
"VulnerabilityID": "CVE-2013-4235",
"PkgID": "login@1:4.8.1-1ubuntu5.20.04.4",
"PkgName": "login",
"InstalledVersion": "1:4.8.1-1ubuntu5.20.04.4",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4235",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "shadow-utils: TOCTOU race conditions by copying and removing directory trees",
"Description": "shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees",
"Severity": "LOW",
"CweIDs": [
"CWE-367"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 3.3,
"V3Score": 4.7
},
"redhat": {
"V2Vector": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
"V2Score": 3.7,
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2013-4235",
"https://access.redhat.com/security/cve/cve-2013-4235",
"https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1998169",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235",
"https://github.com/shadow-maint/shadow/issues/317",
"https://github.com/shadow-maint/shadow/pull/545",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
"https://security-tracker.debian.org/tracker/CVE-2013-4235",
"https://security.gentoo.org/glsa/202210-26",
"https://ubuntu.com/security/notices/USN-5745-1",
"https://ubuntu.com/security/notices/USN-5745-2"
],
"PublishedDate": "2019-12-03T15:15:00Z",
"LastModifiedDate": "2023-02-13T00:28:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgID": "ncurses-base@6.2-0ubuntu2",
"PkgName": "ncurses-base",
"InstalledVersion": "6.2-0ubuntu2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1\u0026content-type=text/x-cvsweb-markup",
"http://seclists.org/fulldisclosure/2022/Oct/28",
"http://seclists.org/fulldisclosure/2022/Oct/41",
"http://seclists.org/fulldisclosure/2022/Oct/43",
"http://seclists.org/fulldisclosure/2022/Oct/45",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://support.apple.com/kb/HT213443",
"https://support.apple.com/kb/HT213444",
"https://support.apple.com/kb/HT213488",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2022-12-07T01:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgID": "ncurses-base@6.2-0ubuntu2",
"PkgName": "ncurses-base",
"InstalledVersion": "6.2-0ubuntu2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"http://seclists.org/fulldisclosure/2022/Oct/41",
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://support.apple.com/kb/HT213488",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-11-08T19:46:00Z"
},
{
"VulnerabilityID": "CVE-2021-39537",
"PkgID": "ncurses-bin@6.2-0ubuntu2",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.2-0ubuntu2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-39537",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c",
"Description": "An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.",
"Severity": "LOW",
"CweIDs": [
"CWE-787"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"V2Score": 6.8,
"V3Score": 8.8
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"V3Score": 5.5
}
},
"References": [
"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1\u0026content-type=text/x-cvsweb-markup",
"http://seclists.org/fulldisclosure/2022/Oct/28",
"http://seclists.org/fulldisclosure/2022/Oct/41",
"http://seclists.org/fulldisclosure/2022/Oct/43",
"http://seclists.org/fulldisclosure/2022/Oct/45",
"https://access.redhat.com/security/cve/CVE-2021-39537",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537",
"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-39537",
"https://support.apple.com/kb/HT213443",
"https://support.apple.com/kb/HT213444",
"https://support.apple.com/kb/HT213488",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2021-09-20T16:15:00Z",
"LastModifiedDate": "2022-12-07T01:38:00Z"
},
{
"VulnerabilityID": "CVE-2022-29458",
"PkgID": "ncurses-bin@6.2-0ubuntu2",
"PkgName": "ncurses-bin",
"InstalledVersion": "6.2-0ubuntu2",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-29458",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "ncurses: segfaulting OOB read",
"Description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"Severity": "LOW",
"CweIDs": [
"CWE-125"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"V2Score": 5.8,
"V3Score": 7.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"V3Score": 6.1
}
},
"References": [
"http://seclists.org/fulldisclosure/2022/Oct/41",
"https://access.redhat.com/security/cve/CVE-2022-29458",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458",
"https://invisible-island.net/ncurses/NEWS.html#t20220416",
"https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://support.apple.com/kb/HT213488",
"https://ubuntu.com/security/notices/USN-5477-1"
],
"PublishedDate": "2022-04-18T21:15:00Z",
"LastModifiedDate": "2022-11-08T19:46:00Z"
},
{
"VulnerabilityID": "CVE-2023-0286",
"PkgID": "openssl@1.1.1f-1ubuntu2.16",
"PkgName": "openssl",
"InstalledVersion": "1.1.1f-1ubuntu2.16",
"FixedVersion": "1.1.1f-1ubuntu2.17",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-0286",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "There is a type confusion vulnerability relating to X.400 address proc ...",
"Description": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.",
"Severity": "HIGH",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286",
"https://github.com/advisories/GHSA-x4qr-2fvf-3mr5",
"https://github.com/pyca/cryptography/security/advisories/GHSA-x4qr-2fvf-3mr5",
"https://nvd.nist.gov/vuln/detail/CVE-2023-0286",
"https://rustsec.org/advisories/RUSTSEC-2023-0006.html",
"https://ubuntu.com/security/notices/USN-5844-1",
"https://ubuntu.com/security/notices/USN-5845-1",
"https://ubuntu.com/security/notices/USN-5845-2",
"https://www.openssl.org/news/secadv/20230207.txt"
],
"PublishedDate": "2023-02-08T20:15:00Z",
"LastModifiedDate": "2023-02-09T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2022-4304",
"PkgID": "openssl@1.1.1f-1ubuntu2.16",
"PkgName": "openssl",
"InstalledVersion": "1.1.1f-1ubuntu2.16",
"FixedVersion": "1.1.1f-1ubuntu2.17",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-4304",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "A timing based side channel exists in the OpenSSL RSA Decryption imple ...",
"Description": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304",
"https://github.com/advisories/GHSA-p52g-cm5j-mjv4",
"https://nvd.nist.gov/vuln/detail/CVE-2022-4304",
"https://rustsec.org/advisories/RUSTSEC-2023-0007.html",
"https://ubuntu.com/security/notices/USN-5844-1",
"https://www.openssl.org/news/secadv/20230207.txt"
],
"PublishedDate": "2023-02-08T20:15:00Z",
"LastModifiedDate": "2023-02-09T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2022-4450",
"PkgID": "openssl@1.1.1f-1ubuntu2.16",
"PkgName": "openssl",
"InstalledVersion": "1.1.1f-1ubuntu2.16",
"FixedVersion": "1.1.1f-1ubuntu2.17",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-4450",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses ...",
"Description": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450",
"https://github.com/advisories/GHSA-v5w6-wcm8-jm4q",
"https://nvd.nist.gov/vuln/detail/CVE-2022-4450",
"https://rustsec.org/advisories/RUSTSEC-2023-0010.html",
"https://ubuntu.com/security/notices/USN-5844-1",
"https://www.openssl.org/news/secadv/20230207.txt"
],
"PublishedDate": "2023-02-08T20:15:00Z",
"LastModifiedDate": "2023-02-09T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2023-0215",
"PkgID": "openssl@1.1.1f-1ubuntu2.16",
"PkgName": "openssl",
"InstalledVersion": "1.1.1f-1ubuntu2.16",
"FixedVersion": "1.1.1f-1ubuntu2.17",
"Layer": {
"DiffID": "sha256:6cca0b8c667f1582f510418b14eeaf3742404422e8600d5d8cbbe1dc8355319a"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-0215",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "The public API function BIO_new_NDEF is a helper function used for str ...",
"Description": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.",
"Severity": "MEDIUM",
"References": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215",
"https://github.com/advisories/GHSA-r7jw-wp68-3xch",
"https://nvd.nist.gov/vuln/detail/CVE-2023-0215",
"https://rustsec.org/advisories/RUSTSEC-2023-0009.html",
"https://ubuntu.com/security/notices/USN-5844-1",
"https://ubuntu.com/security/notices/USN-5845-1",
"https://ubuntu.com/security/notices/USN-5845-2",
"https://www.openssl.org/news/secadv/20230207.txt"
],
"PublishedDate": "2023-02-08T20:15:00Z",
"LastModifiedDate": "2023-02-09T14:26:00Z"
},
{
"VulnerabilityID": "CVE-2013-4235",
"PkgID": "passwd@1:4.8.1-1ubuntu5.20.04.4",
"PkgName": "passwd",
"InstalledVersion": "1:4.8.1-1ubuntu5.20.04.4",
"Layer": {
"DiffID": "sha256:cada6679d1ed42e9ca8fe7a15aaafb82e453d11eb38e742f6a052e3e8f9aeb17"
},
"SeveritySource": "ubuntu",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4235",
"DataSource": {
"ID": "ubuntu",
"Name": "Ubuntu CVE Tracker",
"URL": "https://git.launchpad.net/ubuntu-cve-tracker"
},
"Title": "shadow-utils: TOCTOU race conditions by copying and removing directory trees",
"Description": "shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees",
"Severity": "LOW",
"CweIDs": [
"CWE-367"
],
"CVSS": {
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"V2Score": 3.3,
"V3Score": 4.7
},
"redhat": {
"V2Vector": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
"V2Score": 3.7,
"V3Score": 4.4
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2013-4235",
"https://access.redhat.com/security/cve/cve-2013-4235",
"https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1998169",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235",
"https://github.com/shadow-maint/shadow/issues/317",
"https://github.com/shadow-maint/shadow/pull/545",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
"https://security-tracker.debian.org/tracker/CVE-2013-4235",
"https://security.gentoo.org/glsa/202210-26",
"https://ubuntu.com/security/notices/USN-5745-1",
"https://ubuntu.com/security/notices/USN-5745-2"
],
"PublishedDate": "2019-12-03T15:15:00Z",
"LastModifiedDate": "2023-02-13T00:28:00Z"
}
]
},
{
"Target": "Java",
"Class": "lang-pkgs",
"Type": "jar",
"Vulnerabilities": [
{
"VulnerabilityID": "CVE-2018-10237",
"PkgName": "com.google.guava:guava",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-identity-provider/guava-19.0.jar",
"InstalledVersion": "19.0",
"FixedVersion": "24.1.1-jre, 24.1.1-android",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-10237",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service",
"Description": "Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.9
},
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.9
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.9
}
},
"References": [
"http://www.securitytracker.com/id/1041707",
"https://access.redhat.com/errata/RHSA-2018:2423",
"https://access.redhat.com/errata/RHSA-2018:2424",
"https://access.redhat.com/errata/RHSA-2018:2425",
"https://access.redhat.com/errata/RHSA-2018:2428",
"https://access.redhat.com/errata/RHSA-2018:2598",
"https://access.redhat.com/errata/RHSA-2018:2643",
"https://access.redhat.com/errata/RHSA-2018:2740",
"https://access.redhat.com/errata/RHSA-2018:2741",
"https://access.redhat.com/errata/RHSA-2018:2742",
"https://access.redhat.com/errata/RHSA-2018:2743",
"https://access.redhat.com/errata/RHSA-2018:2927",
"https://access.redhat.com/errata/RHSA-2019:2858",
"https://access.redhat.com/errata/RHSA-2019:3149",
"https://access.redhat.com/security/cve/CVE-2018-10237",
"https://github.com/advisories/GHSA-mvr2-9pj6-7w5j",
"https://github.com/google/guava/wiki/CVE-2018-10237",
"https://groups.google.com/d/topic/guava-announce/xqWALw4W1vs/discussion",
"https://groups.google.com/forum/#!topic/guava-announce/xqWALw4W1vs/discussion",
"https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E",
"https://lists.apache.org/thread.html/19fa48533bc7ea1accf6b12746a74ed888ae6e49a5cf81ae4f807495@%3Ccommon-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/33c6bccfeb7adf644d4d79894ca8f09370be6ed4b20632c2e228d085@%3Ccommits.cassandra.apache.org%3E",
"https://lists.apache.org/thread.html/3d5dbdd92ac9ceaef90e40f78599f9109f2f345252e0ac9d98e7e084@%3Cgitbox.activemq.apache.org%3E",
"https://lists.apache.org/thread.html/3ddd79c801edd99c0978e83dbe2168ebd36fd42acfa5dac38fb03dd6@%3Cissues.activemq.apache.org%3E",
"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/cc48fe770c45a74dc3b37ed0817393e0c96701fc49bc431ed922f3cc@%3Chdfs-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E",
"https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E",
"https://lists.apache.org/thread.html/r223bc776a077d0795786c38cbc6e7dd808fce1a9161b00ba9c0a5d55@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r22c8173b804cd4a420c43064ba4e363d0022aa421008b1989f7354d4@%3Cissues.flink.apache.org%3E",
"https://lists.apache.org/thread.html/r27eb79a87a760335226dbfa6a7b7bffea539a535f8e80c41e482106d@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/r2ea4e5e5aa8ad73b001a466c582899620961f47d77a40af712c1fdf9@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/r30e7d7b6bfa630dacc41649a0e96dad75165d50474c1241068aa0f94@%3Cissues.storm.apache.org%3E",
"https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E",
"https://lists.apache.org/thread.html/r38e2ab87528d3c904e7fac496e8fd766b9277656ff95b97d6b6b6dcd@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r43491b25b2e5c368c34b106a82eff910a5cea3e90de82ad75cc16540@%3Cdev.syncope.apache.org%3E",
"https://lists.apache.org/thread.html/r50fc0bcc734dd82e691d36d209258683141bfc0083739a77e56ad92d@%3Cdev.flink.apache.org%3E",
"https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r95799427b335807a4c54776908125c3e66597b65845ae50096d9278a@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/ra4f44016926dcb034b3b230280a18102062f94ae55b8a31bb92fed84@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/ra8906723927aef2a599398c238eacfc845b74d812e0093ec2fc70a7d@%3Cissues.flink.apache.org%3E",
"https://lists.apache.org/thread.html/rb3da574c34bc6bd37972d2266af3093b90d7e437460423c24f477919@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc78f6e84f82cc662860e96526d8ab969f34dbe12dc560e22d9d147a3@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/rc8467f357b943ceaa86f289f8bc1a5d1c7955b75d3bac1426f2d4ac1@%3Ccommon-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E",
"https://lists.apache.org/thread.html/rd0c8ec6e044aa2958dd0549ebf8ecead7f5968c9474ba73a504161b2@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/rdc56c15693c236e31e1e95f847b8e5e74fc0a05741d47488e7fc8c45@%3Cissues.flink.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2018-10237",
"https://security.netapp.com/advisory/ntap-20220629-0008/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujan2021.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2018-04-26T21:29:00Z",
"LastModifiedDate": "2022-06-29T19:15:00Z"
},
{
"VulnerabilityID": "CVE-2018-10237",
"PkgName": "com.google.guava:guava",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-security/guava-19.0.jar",
"InstalledVersion": "19.0",
"FixedVersion": "24.1.1-jre, 24.1.1-android",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-10237",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service",
"Description": "Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-770"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.9
},
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 4.3,
"V3Score": 5.9
},
"redhat": {
"V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 5.9
}
},
"References": [
"http://www.securitytracker.com/id/1041707",
"https://access.redhat.com/errata/RHSA-2018:2423",
"https://access.redhat.com/errata/RHSA-2018:2424",
"https://access.redhat.com/errata/RHSA-2018:2425",
"https://access.redhat.com/errata/RHSA-2018:2428",
"https://access.redhat.com/errata/RHSA-2018:2598",
"https://access.redhat.com/errata/RHSA-2018:2643",
"https://access.redhat.com/errata/RHSA-2018:2740",
"https://access.redhat.com/errata/RHSA-2018:2741",
"https://access.redhat.com/errata/RHSA-2018:2742",
"https://access.redhat.com/errata/RHSA-2018:2743",
"https://access.redhat.com/errata/RHSA-2018:2927",
"https://access.redhat.com/errata/RHSA-2019:2858",
"https://access.redhat.com/errata/RHSA-2019:3149",
"https://access.redhat.com/security/cve/CVE-2018-10237",
"https://github.com/advisories/GHSA-mvr2-9pj6-7w5j",
"https://github.com/google/guava/wiki/CVE-2018-10237",
"https://groups.google.com/d/topic/guava-announce/xqWALw4W1vs/discussion",
"https://groups.google.com/forum/#!topic/guava-announce/xqWALw4W1vs/discussion",
"https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E",
"https://lists.apache.org/thread.html/19fa48533bc7ea1accf6b12746a74ed888ae6e49a5cf81ae4f807495@%3Ccommon-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/33c6bccfeb7adf644d4d79894ca8f09370be6ed4b20632c2e228d085@%3Ccommits.cassandra.apache.org%3E",
"https://lists.apache.org/thread.html/3d5dbdd92ac9ceaef90e40f78599f9109f2f345252e0ac9d98e7e084@%3Cgitbox.activemq.apache.org%3E",
"https://lists.apache.org/thread.html/3ddd79c801edd99c0978e83dbe2168ebd36fd42acfa5dac38fb03dd6@%3Cissues.activemq.apache.org%3E",
"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/cc48fe770c45a74dc3b37ed0817393e0c96701fc49bc431ed922f3cc@%3Chdfs-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E",
"https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E",
"https://lists.apache.org/thread.html/r223bc776a077d0795786c38cbc6e7dd808fce1a9161b00ba9c0a5d55@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r22c8173b804cd4a420c43064ba4e363d0022aa421008b1989f7354d4@%3Cissues.flink.apache.org%3E",
"https://lists.apache.org/thread.html/r27eb79a87a760335226dbfa6a7b7bffea539a535f8e80c41e482106d@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/r2ea4e5e5aa8ad73b001a466c582899620961f47d77a40af712c1fdf9@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/r30e7d7b6bfa630dacc41649a0e96dad75165d50474c1241068aa0f94@%3Cissues.storm.apache.org%3E",
"https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E",
"https://lists.apache.org/thread.html/r38e2ab87528d3c904e7fac496e8fd766b9277656ff95b97d6b6b6dcd@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r43491b25b2e5c368c34b106a82eff910a5cea3e90de82ad75cc16540@%3Cdev.syncope.apache.org%3E",
"https://lists.apache.org/thread.html/r50fc0bcc734dd82e691d36d209258683141bfc0083739a77e56ad92d@%3Cdev.flink.apache.org%3E",
"https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r95799427b335807a4c54776908125c3e66597b65845ae50096d9278a@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E",
"https://lists.apache.org/thread.html/ra4f44016926dcb034b3b230280a18102062f94ae55b8a31bb92fed84@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/ra8906723927aef2a599398c238eacfc845b74d812e0093ec2fc70a7d@%3Cissues.flink.apache.org%3E",
"https://lists.apache.org/thread.html/rb3da574c34bc6bd37972d2266af3093b90d7e437460423c24f477919@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc78f6e84f82cc662860e96526d8ab969f34dbe12dc560e22d9d147a3@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/rc8467f357b943ceaa86f289f8bc1a5d1c7955b75d3bac1426f2d4ac1@%3Ccommon-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E",
"https://lists.apache.org/thread.html/rd0c8ec6e044aa2958dd0549ebf8ecead7f5968c9474ba73a504161b2@%3Cdev.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/rdc56c15693c236e31e1e95f847b8e5e74fc0a05741d47488e7fc8c45@%3Cissues.flink.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2018-10237",
"https://security.netapp.com/advisory/ntap-20220629-0008/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujan2021.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2018-04-26T21:29:00Z",
"LastModifiedDate": "2022-06-29T19:15:00Z"
},
{
"VulnerabilityID": "CVE-2020-8908",
"PkgName": "com.google.guava:guava",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-identity-provider/guava-19.0.jar",
"InstalledVersion": "19.0",
"FixedVersion": "30.0",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-8908",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "guava: local information disclosure via temporary directory created with unsafe permissions",
"Description": "A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.",
"Severity": "LOW",
"CweIDs": [
"CWE-732"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 3.3
},
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-8908",
"https://github.com/advisories/GHSA-5mg8-w23w-74h3",
"https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40",
"https://github.com/google/guava/issues/4011",
"https://lists.apache.org/thread.html/r007add131977f4f576c232b25e024249a3d16f66aad14a4b52819d21@%3Ccommon-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r037fed1d0ebde50c9caf8d99815db3093c344c3f651c5a49a09824ce@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r07ed3e4417ad043a27bee7bb33322e9bfc7d7e6d1719b8e3dfd95c14@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r161b87f8037bbaff400194a63cd2016c9a69f5949f06dcc79beeab54@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r215b3d50f56faeb2f9383505f3e62faa9f549bb23e8a9848b78a968e@%3Ccommits.ws.apache.org%3E",
"https://lists.apache.org/thread.html/r294be9d31c0312d2c0837087204b5d4bf49d0552890e6eec716fa6a6@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r2fe45d96eea8434b91592ca08109118f6308d60f6d0e21d52438cfb4@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r3dd8881de891598d622227e9840dd7c2ef1d08abbb49e9690c7ae1bc@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/r4776f62dfae4a0006658542f43034a7fc199350e35a66d4e18164ee6@%3Ccommits.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/r49549a8322f62cd3acfa4490d25bfba0be04f3f9ff4d14fe36199d27@%3Cyarn-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r58a8775205ab1839dba43054b09a9ab3b25b423a4170b2413c4067ac@%3Ccommon-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r5b3d93dfdfb7708e796e8762ab40edbde8ff8add48aba53e5ea26f44@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/r5d61b98ceb7bba939a651de5900dbd67be3817db6bfcc41c6e04e199@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8c78ff948b24a1104a@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r68d86f4b06c808204f62bcb254fcb5b0432528ee8d37a07ef4bc8222@%3Ccommits.ws.apache.org%3E",
"https://lists.apache.org/thread.html/r79e47ed555bdb1180e528420a7a2bb898541367a29a3bc6bbf0baf2c@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r7b0e81d8367264d6cad98766a469d64d11248eb654417809bfdacf09@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/ra7ab308481ee729f998691e8e3e02e93b1dedfc98f6b1cd3d86923b3@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/rb2364f4cf4d274eab5a7ecfaf64bf575cedf8b0173551997c749d322@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rb8c0f1b7589864396690fe42a91a71dea9412e86eec66dc85bbacaaf@%3Ccommits.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E",
"https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E",
"https://lists.apache.org/thread.html/rc607bc52f3507b8b9c28c6a747c3122f51ac24afe80af2a670785b97@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/rcafc3a637d82bdc9a24036b2ddcad1e519dd0e6f848fcc3d606fd78f@%3Cdev.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E",
"https://lists.apache.org/thread.html/rd2704306ec729ccac726e50339b8a8f079515cc29ccb77713b16e7c5@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E",
"https://lists.apache.org/thread.html/rd7e12d56d49d73e2b8549694974b07561b79b05455f7f781954231bf@%3Cdev.pig.apache.org%3E",
"https://lists.apache.org/thread.html/re120f6b3d2f8222121080342c5801fdafca2f5188ceeb3b49c8a1d27@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449d1af48e52d47c9e85@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/rf00b688ffa620c990597f829ff85fdbba8bf73ee7bfb34783e1f0d4e@%3Cyarn-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/rf9f0fa84b8ae1a285f0210bafec6de2a9eba083007d04640b82aa625@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2020-8908",
"https://security.netapp.com/advisory/ntap-20220210-0003/",
"https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2020-12-10T23:15:00Z",
"LastModifiedDate": "2022-05-10T15:21:00Z"
},
{
"VulnerabilityID": "CVE-2020-8908",
"PkgName": "com.google.guava:guava",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-security/guava-19.0.jar",
"InstalledVersion": "19.0",
"FixedVersion": "30.0",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-8908",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "guava: local information disclosure via temporary directory created with unsafe permissions",
"Description": "A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.",
"Severity": "LOW",
"CweIDs": [
"CWE-732"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 3.3
},
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-8908",
"https://github.com/advisories/GHSA-5mg8-w23w-74h3",
"https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40",
"https://github.com/google/guava/issues/4011",
"https://lists.apache.org/thread.html/r007add131977f4f576c232b25e024249a3d16f66aad14a4b52819d21@%3Ccommon-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r037fed1d0ebde50c9caf8d99815db3093c344c3f651c5a49a09824ce@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r07ed3e4417ad043a27bee7bb33322e9bfc7d7e6d1719b8e3dfd95c14@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r161b87f8037bbaff400194a63cd2016c9a69f5949f06dcc79beeab54@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r215b3d50f56faeb2f9383505f3e62faa9f549bb23e8a9848b78a968e@%3Ccommits.ws.apache.org%3E",
"https://lists.apache.org/thread.html/r294be9d31c0312d2c0837087204b5d4bf49d0552890e6eec716fa6a6@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r2fe45d96eea8434b91592ca08109118f6308d60f6d0e21d52438cfb4@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r3dd8881de891598d622227e9840dd7c2ef1d08abbb49e9690c7ae1bc@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/r4776f62dfae4a0006658542f43034a7fc199350e35a66d4e18164ee6@%3Ccommits.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/r49549a8322f62cd3acfa4490d25bfba0be04f3f9ff4d14fe36199d27@%3Cyarn-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r58a8775205ab1839dba43054b09a9ab3b25b423a4170b2413c4067ac@%3Ccommon-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r5b3d93dfdfb7708e796e8762ab40edbde8ff8add48aba53e5ea26f44@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/r5d61b98ceb7bba939a651de5900dbd67be3817db6bfcc41c6e04e199@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8c78ff948b24a1104a@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r68d86f4b06c808204f62bcb254fcb5b0432528ee8d37a07ef4bc8222@%3Ccommits.ws.apache.org%3E",
"https://lists.apache.org/thread.html/r79e47ed555bdb1180e528420a7a2bb898541367a29a3bc6bbf0baf2c@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r7b0e81d8367264d6cad98766a469d64d11248eb654417809bfdacf09@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/ra7ab308481ee729f998691e8e3e02e93b1dedfc98f6b1cd3d86923b3@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/rb2364f4cf4d274eab5a7ecfaf64bf575cedf8b0173551997c749d322@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rb8c0f1b7589864396690fe42a91a71dea9412e86eec66dc85bbacaaf@%3Ccommits.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E",
"https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E",
"https://lists.apache.org/thread.html/rc607bc52f3507b8b9c28c6a747c3122f51ac24afe80af2a670785b97@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/rcafc3a637d82bdc9a24036b2ddcad1e519dd0e6f848fcc3d606fd78f@%3Cdev.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E",
"https://lists.apache.org/thread.html/rd2704306ec729ccac726e50339b8a8f079515cc29ccb77713b16e7c5@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E",
"https://lists.apache.org/thread.html/rd7e12d56d49d73e2b8549694974b07561b79b05455f7f781954231bf@%3Cdev.pig.apache.org%3E",
"https://lists.apache.org/thread.html/re120f6b3d2f8222121080342c5801fdafca2f5188ceeb3b49c8a1d27@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449d1af48e52d47c9e85@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/rf00b688ffa620c990597f829ff85fdbba8bf73ee7bfb34783e1f0d4e@%3Cyarn-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/rf9f0fa84b8ae1a285f0210bafec6de2a9eba083007d04640b82aa625@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2020-8908",
"https://security.netapp.com/advisory/ntap-20220210-0003/",
"https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2020-12-10T23:15:00Z",
"LastModifiedDate": "2022-05-10T15:21:00Z"
},
{
"VulnerabilityID": "CVE-2020-8908",
"PkgName": "com.google.guava:guava",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-watcher/guava-27.1-jre.jar",
"InstalledVersion": "27.1-jre",
"FixedVersion": "30.0",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-8908",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "guava: local information disclosure via temporary directory created with unsafe permissions",
"Description": "A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.",
"Severity": "LOW",
"CweIDs": [
"CWE-732"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 3.3
},
"nvd": {
"V2Vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V2Score": 2.1,
"V3Score": 3.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"V3Score": 3.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-8908",
"https://github.com/advisories/GHSA-5mg8-w23w-74h3",
"https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40",
"https://github.com/google/guava/issues/4011",
"https://lists.apache.org/thread.html/r007add131977f4f576c232b25e024249a3d16f66aad14a4b52819d21@%3Ccommon-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r037fed1d0ebde50c9caf8d99815db3093c344c3f651c5a49a09824ce@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r07ed3e4417ad043a27bee7bb33322e9bfc7d7e6d1719b8e3dfd95c14@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r161b87f8037bbaff400194a63cd2016c9a69f5949f06dcc79beeab54@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r215b3d50f56faeb2f9383505f3e62faa9f549bb23e8a9848b78a968e@%3Ccommits.ws.apache.org%3E",
"https://lists.apache.org/thread.html/r294be9d31c0312d2c0837087204b5d4bf49d0552890e6eec716fa6a6@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r2fe45d96eea8434b91592ca08109118f6308d60f6d0e21d52438cfb4@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r3dd8881de891598d622227e9840dd7c2ef1d08abbb49e9690c7ae1bc@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/r4776f62dfae4a0006658542f43034a7fc199350e35a66d4e18164ee6@%3Ccommits.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/r49549a8322f62cd3acfa4490d25bfba0be04f3f9ff4d14fe36199d27@%3Cyarn-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r58a8775205ab1839dba43054b09a9ab3b25b423a4170b2413c4067ac@%3Ccommon-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r5b3d93dfdfb7708e796e8762ab40edbde8ff8add48aba53e5ea26f44@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/r5d61b98ceb7bba939a651de5900dbd67be3817db6bfcc41c6e04e199@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8c78ff948b24a1104a@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r68d86f4b06c808204f62bcb254fcb5b0432528ee8d37a07ef4bc8222@%3Ccommits.ws.apache.org%3E",
"https://lists.apache.org/thread.html/r79e47ed555bdb1180e528420a7a2bb898541367a29a3bc6bbf0baf2c@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r7b0e81d8367264d6cad98766a469d64d11248eb654417809bfdacf09@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/ra7ab308481ee729f998691e8e3e02e93b1dedfc98f6b1cd3d86923b3@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/rb2364f4cf4d274eab5a7ecfaf64bf575cedf8b0173551997c749d322@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rb8c0f1b7589864396690fe42a91a71dea9412e86eec66dc85bbacaaf@%3Ccommits.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E",
"https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E",
"https://lists.apache.org/thread.html/rc607bc52f3507b8b9c28c6a747c3122f51ac24afe80af2a670785b97@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/rcafc3a637d82bdc9a24036b2ddcad1e519dd0e6f848fcc3d606fd78f@%3Cdev.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E",
"https://lists.apache.org/thread.html/rd2704306ec729ccac726e50339b8a8f079515cc29ccb77713b16e7c5@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E",
"https://lists.apache.org/thread.html/rd7e12d56d49d73e2b8549694974b07561b79b05455f7f781954231bf@%3Cdev.pig.apache.org%3E",
"https://lists.apache.org/thread.html/re120f6b3d2f8222121080342c5801fdafca2f5188ceeb3b49c8a1d27@%3Cyarn-issues.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449d1af48e52d47c9e85@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/rf00b688ffa620c990597f829ff85fdbba8bf73ee7bfb34783e1f0d4e@%3Cyarn-dev.hadoop.apache.org%3E",
"https://lists.apache.org/thread.html/rf9f0fa84b8ae1a285f0210bafec6de2a9eba083007d04640b82aa625@%3Cissues.geode.apache.org%3E",
"https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2020-8908",
"https://security.netapp.com/advisory/ntap-20220210-0003/",
"https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2020-12-10T23:15:00Z",
"LastModifiedDate": "2022-05-10T15:21:00Z"
},
{
"VulnerabilityID": "CVE-2021-37136",
"PkgName": "io.netty:netty-codec",
"PkgPath": "usr/share/elasticsearch/modules/transport-netty4/netty-codec-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.68",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-37136",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data",
"Description": "The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack",
"Severity": "HIGH",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-37136",
"https://github.com/advisories/GHSA-grg4-wf29-r9vv",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80",
"https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020",
"https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv",
"https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-37136",
"https://security.netapp.com/advisory/ntap-20220210-0012/",
"https://www.debian.org/security/2023/dsa-5316",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2021-10-19T15:15:00Z",
"LastModifiedDate": "2023-01-12T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-37136",
"PkgName": "io.netty:netty-codec",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-core/netty-codec-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.68",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-37136",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data",
"Description": "The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack",
"Severity": "HIGH",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-37136",
"https://github.com/advisories/GHSA-grg4-wf29-r9vv",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80",
"https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020",
"https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv",
"https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-37136",
"https://security.netapp.com/advisory/ntap-20220210-0012/",
"https://www.debian.org/security/2023/dsa-5316",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2021-10-19T15:15:00Z",
"LastModifiedDate": "2023-01-12T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-37137",
"PkgName": "io.netty:netty-codec",
"PkgPath": "usr/share/elasticsearch/modules/transport-netty4/netty-codec-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.68",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-37137",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way",
"Description": "The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.",
"Severity": "HIGH",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-37137",
"https://github.com/advisories/GHSA-9vjp-v76f-g363",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L171",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L185",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L79",
"https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f",
"https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363",
"https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv",
"https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-37137",
"https://security.netapp.com/advisory/ntap-20220210-0012/",
"https://www.debian.org/security/2023/dsa-5316",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2021-10-19T15:15:00Z",
"LastModifiedDate": "2023-01-12T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-37137",
"PkgName": "io.netty:netty-codec",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-core/netty-codec-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.68",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-37137",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way",
"Description": "The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.",
"Severity": "HIGH",
"CweIDs": [
"CWE-400"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-37137",
"https://github.com/advisories/GHSA-9vjp-v76f-g363",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L171",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L185",
"https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L79",
"https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f",
"https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363",
"https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv",
"https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-37137",
"https://security.netapp.com/advisory/ntap-20220210-0012/",
"https://www.debian.org/security/2023/dsa-5316",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2021-10-19T15:15:00Z",
"LastModifiedDate": "2023-01-12T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-24823",
"PkgName": "io.netty:netty-codec",
"PkgPath": "usr/share/elasticsearch/modules/transport-netty4/netty-codec-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.77.Final",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-24823",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty: world readable temporary file containing sensitive data",
"Description": "Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-668",
"CWE-378",
"CWE-379"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
},
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-24823",
"https://github.com/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1",
"https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-24823",
"https://security.netapp.com/advisory/ntap-20220616-0004/",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2022-05-06T12:15:00Z",
"LastModifiedDate": "2022-12-03T14:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-24823",
"PkgName": "io.netty:netty-codec",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-core/netty-codec-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.77.Final",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-24823",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty: world readable temporary file containing sensitive data",
"Description": "Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-668",
"CWE-378",
"CWE-379"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
},
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-24823",
"https://github.com/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1",
"https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-24823",
"https://security.netapp.com/advisory/ntap-20220616-0004/",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2022-05-06T12:15:00Z",
"LastModifiedDate": "2022-12-03T14:25:00Z"
},
{
"VulnerabilityID": "CVE-2021-43797",
"PkgName": "io.netty:netty-codec-http",
"PkgPath": "usr/share/elasticsearch/modules/transport-netty4/netty-codec-http-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.71",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-43797",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty: control chars in header names may lead to HTTP request smuggling",
"Description": "Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers \u0026 clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to \"sanitize\" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-444"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V3Score": 6.5
},
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-43797",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43797",
"https://github.com/advisories/GHSA-wx5j-54mm-rqqq",
"https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323",
"https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323 (netty-4.1.71.Final)",
"https://github.com/netty/netty/pull/11891",
"https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq",
"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-43797",
"https://security.netapp.com/advisory/ntap-20220107-0003/",
"https://www.debian.org/security/2023/dsa-5316",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2021-12-09T19:15:00Z",
"LastModifiedDate": "2023-01-12T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2021-43797",
"PkgName": "io.netty:netty-codec-http",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-core/netty-codec-http-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.71",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-43797",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty: control chars in header names may lead to HTTP request smuggling",
"Description": "Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers \u0026 clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to \"sanitize\" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-444"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V3Score": 6.5
},
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V2Score": 4.3,
"V3Score": 6.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"V3Score": 6.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-43797",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43797",
"https://github.com/advisories/GHSA-wx5j-54mm-rqqq",
"https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323",
"https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323 (netty-4.1.71.Final)",
"https://github.com/netty/netty/pull/11891",
"https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq",
"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-43797",
"https://security.netapp.com/advisory/ntap-20220107-0003/",
"https://www.debian.org/security/2023/dsa-5316",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2021-12-09T19:15:00Z",
"LastModifiedDate": "2023-01-12T04:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-24823",
"PkgName": "io.netty:netty-codec-http",
"PkgPath": "usr/share/elasticsearch/modules/transport-netty4/netty-codec-http-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.77.Final",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-24823",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty: world readable temporary file containing sensitive data",
"Description": "Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-668",
"CWE-378",
"CWE-379"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
},
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-24823",
"https://github.com/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1",
"https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-24823",
"https://security.netapp.com/advisory/ntap-20220616-0004/",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2022-05-06T12:15:00Z",
"LastModifiedDate": "2022-12-03T14:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-24823",
"PkgName": "io.netty:netty-codec-http",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-core/netty-codec-http-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.77.Final",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-24823",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty: world readable temporary file containing sensitive data",
"Description": "Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-668",
"CWE-378",
"CWE-379"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
},
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-24823",
"https://github.com/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1",
"https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-24823",
"https://security.netapp.com/advisory/ntap-20220616-0004/",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2022-05-06T12:15:00Z",
"LastModifiedDate": "2022-12-03T14:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-41915",
"PkgName": "io.netty:netty-codec-http",
"PkgPath": "usr/share/elasticsearch/modules/transport-netty4/netty-codec-http-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.86",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-41915",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "Netty project is an event-driven asynchronous network application fram ...",
"Description": "Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator\u003c?\u003e)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-113",
"CWE-436"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 6.5
},
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 6.5
}
},
"References": [
"https://github.com/advisories/GHSA-hh82-3pmq-7frp",
"https://github.com/netty/netty/commit/c37c637f096e7be3dffd36edee3455c8e90cb1b0",
"https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4",
"https://github.com/netty/netty/issues/13084",
"https://github.com/netty/netty/pull/12760",
"https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp",
"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-41915",
"https://security.netapp.com/advisory/ntap-20230113-0004/",
"https://www.debian.org/security/2023/dsa-5316"
],
"PublishedDate": "2022-12-13T07:15:00Z",
"LastModifiedDate": "2023-01-13T09:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-41915",
"PkgName": "io.netty:netty-codec-http",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-core/netty-codec-http-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.86",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-41915",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "Netty project is an event-driven asynchronous network application fram ...",
"Description": "Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator\u003c?\u003e)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-113",
"CWE-436"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 6.5
},
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"V3Score": 6.5
}
},
"References": [
"https://github.com/advisories/GHSA-hh82-3pmq-7frp",
"https://github.com/netty/netty/commit/c37c637f096e7be3dffd36edee3455c8e90cb1b0",
"https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4",
"https://github.com/netty/netty/issues/13084",
"https://github.com/netty/netty/pull/12760",
"https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp",
"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html",
"https://nvd.nist.gov/vuln/detail/CVE-2022-41915",
"https://security.netapp.com/advisory/ntap-20230113-0004/",
"https://www.debian.org/security/2023/dsa-5316"
],
"PublishedDate": "2022-12-13T07:15:00Z",
"LastModifiedDate": "2023-01-13T09:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-24823",
"PkgName": "io.netty:netty-handler",
"PkgPath": "usr/share/elasticsearch/modules/transport-netty4/netty-handler-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.77.Final",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-24823",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty: world readable temporary file containing sensitive data",
"Description": "Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-668",
"CWE-378",
"CWE-379"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
},
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-24823",
"https://github.com/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1",
"https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-24823",
"https://security.netapp.com/advisory/ntap-20220616-0004/",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2022-05-06T12:15:00Z",
"LastModifiedDate": "2022-12-03T14:25:00Z"
},
{
"VulnerabilityID": "CVE-2022-24823",
"PkgName": "io.netty:netty-handler",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-core/netty-handler-4.1.66.Final.jar",
"InstalledVersion": "4.1.66.Final",
"FixedVersion": "4.1.77.Final",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-24823",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "netty: world readable temporary file containing sensitive data",
"Description": "Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-668",
"CWE-378",
"CWE-379"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
},
"nvd": {
"V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 1.9,
"V3Score": 5.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2022-24823",
"https://github.com/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1",
"https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q",
"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2",
"https://nvd.nist.gov/vuln/detail/CVE-2022-24823",
"https://security.netapp.com/advisory/ntap-20220616-0004/",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2022-05-06T12:15:00Z",
"LastModifiedDate": "2022-12-03T14:25:00Z"
},
{
"VulnerabilityID": "CVE-2020-13956",
"PkgName": "org.apache.httpcomponents:httpclient",
"PkgPath": "usr/share/elasticsearch/modules/ingest-common/httpclient-4.5.10.jar",
"InstalledVersion": "4.5.10",
"FixedVersion": "4.5.13",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-13956",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "apache-httpclient: incorrect handling of malformed authority component in request URIs",
"Description": "Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.",
"Severity": "MEDIUM",
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
},
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-13956",
"https://bugzilla.redhat.com/show_bug.cgi?id=1886587",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956",
"https://errata.almalinux.org/8/ALSA-2022-1861.html",
"https://github.com/advisories/GHSA-7r82-7xv7-xcpj",
"https://linux.oracle.com/cve/CVE-2020-13956.html",
"https://linux.oracle.com/errata/ELSA-2022-1861.html",
"https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E",
"https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E",
"https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E",
"https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E",
"https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2020-13956",
"https://security.netapp.com/advisory/ntap-20220210-0002/",
"https://www.openwall.com/lists/oss-security/2020/10/08/4",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2020-12-02T17:15:00Z",
"LastModifiedDate": "2022-05-12T14:47:00Z"
},
{
"VulnerabilityID": "CVE-2020-13956",
"PkgName": "org.apache.httpcomponents:httpclient",
"PkgPath": "usr/share/elasticsearch/modules/kibana/httpclient-4.5.10.jar",
"InstalledVersion": "4.5.10",
"FixedVersion": "4.5.13",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-13956",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "apache-httpclient: incorrect handling of malformed authority component in request URIs",
"Description": "Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.",
"Severity": "MEDIUM",
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
},
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-13956",
"https://bugzilla.redhat.com/show_bug.cgi?id=1886587",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956",
"https://errata.almalinux.org/8/ALSA-2022-1861.html",
"https://github.com/advisories/GHSA-7r82-7xv7-xcpj",
"https://linux.oracle.com/cve/CVE-2020-13956.html",
"https://linux.oracle.com/errata/ELSA-2022-1861.html",
"https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E",
"https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E",
"https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E",
"https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E",
"https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2020-13956",
"https://security.netapp.com/advisory/ntap-20220210-0002/",
"https://www.openwall.com/lists/oss-security/2020/10/08/4",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2020-12-02T17:15:00Z",
"LastModifiedDate": "2022-05-12T14:47:00Z"
},
{
"VulnerabilityID": "CVE-2020-13956",
"PkgName": "org.apache.httpcomponents:httpclient",
"PkgPath": "usr/share/elasticsearch/modules/reindex/httpclient-4.5.10.jar",
"InstalledVersion": "4.5.10",
"FixedVersion": "4.5.13",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-13956",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "apache-httpclient: incorrect handling of malformed authority component in request URIs",
"Description": "Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.",
"Severity": "MEDIUM",
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
},
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-13956",
"https://bugzilla.redhat.com/show_bug.cgi?id=1886587",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956",
"https://errata.almalinux.org/8/ALSA-2022-1861.html",
"https://github.com/advisories/GHSA-7r82-7xv7-xcpj",
"https://linux.oracle.com/cve/CVE-2020-13956.html",
"https://linux.oracle.com/errata/ELSA-2022-1861.html",
"https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E",
"https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E",
"https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E",
"https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E",
"https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2020-13956",
"https://security.netapp.com/advisory/ntap-20220210-0002/",
"https://www.openwall.com/lists/oss-security/2020/10/08/4",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2020-12-02T17:15:00Z",
"LastModifiedDate": "2022-05-12T14:47:00Z"
},
{
"VulnerabilityID": "CVE-2020-13956",
"PkgName": "org.apache.httpcomponents:httpclient",
"PkgPath": "usr/share/elasticsearch/modules/repository-url/httpclient-4.5.10.jar",
"InstalledVersion": "4.5.10",
"FixedVersion": "4.5.13",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-13956",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "apache-httpclient: incorrect handling of malformed authority component in request URIs",
"Description": "Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.",
"Severity": "MEDIUM",
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
},
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-13956",
"https://bugzilla.redhat.com/show_bug.cgi?id=1886587",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956",
"https://errata.almalinux.org/8/ALSA-2022-1861.html",
"https://github.com/advisories/GHSA-7r82-7xv7-xcpj",
"https://linux.oracle.com/cve/CVE-2020-13956.html",
"https://linux.oracle.com/errata/ELSA-2022-1861.html",
"https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E",
"https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E",
"https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E",
"https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E",
"https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2020-13956",
"https://security.netapp.com/advisory/ntap-20220210-0002/",
"https://www.openwall.com/lists/oss-security/2020/10/08/4",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2020-12-02T17:15:00Z",
"LastModifiedDate": "2022-05-12T14:47:00Z"
},
{
"VulnerabilityID": "CVE-2020-13956",
"PkgName": "org.apache.httpcomponents:httpclient",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-core/httpclient-4.5.10.jar",
"InstalledVersion": "4.5.10",
"FixedVersion": "4.5.13",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-13956",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "apache-httpclient: incorrect handling of malformed authority component in request URIs",
"Description": "Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.",
"Severity": "MEDIUM",
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
},
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V2Score": 5,
"V3Score": 5.3
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"V3Score": 5.3
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-13956",
"https://bugzilla.redhat.com/show_bug.cgi?id=1886587",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956",
"https://errata.almalinux.org/8/ALSA-2022-1861.html",
"https://github.com/advisories/GHSA-7r82-7xv7-xcpj",
"https://linux.oracle.com/cve/CVE-2020-13956.html",
"https://linux.oracle.com/errata/ELSA-2022-1861.html",
"https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E",
"https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E",
"https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E",
"https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E",
"https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E",
"https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E",
"https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E",
"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E",
"https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E",
"https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E",
"https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E",
"https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E",
"https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E",
"https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E",
"https://nvd.nist.gov/vuln/detail/CVE-2020-13956",
"https://security.netapp.com/advisory/ntap-20220210-0002/",
"https://www.openwall.com/lists/oss-security/2020/10/08/4",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"PublishedDate": "2020-12-02T17:15:00Z",
"LastModifiedDate": "2022-05-12T14:47:00Z"
},
{
"VulnerabilityID": "CVE-2021-40690",
"PkgName": "org.apache.santuario:xmlsec",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-identity-provider/xmlsec-2.1.4.jar",
"InstalledVersion": "2.1.4",
"FixedVersion": "2.1.7, 2.2.3",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-40690",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "xml-security: XPath Transform abuse allows for information disclosure",
"Description": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 7.5
},
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-40690",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40690",
"https://github.com/advisories/GHSA-j8wc-gxx9-82hx",
"https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E",
"https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E",
"https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E",
"https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E",
"https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E",
"https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E",
"https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E",
"https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-40690",
"https://santuario.apache.org/secadv.data/CVE-2021-40690.txt.asc",
"https://ubuntu.com/security/notices/USN-5525-1",
"https://www.debian.org/security/2021/dsa-5010",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2021-09-19T18:15:00Z",
"LastModifiedDate": "2022-10-05T02:06:00Z"
},
{
"VulnerabilityID": "CVE-2021-40690",
"PkgName": "org.apache.santuario:xmlsec",
"PkgPath": "usr/share/elasticsearch/modules/x-pack-security/xmlsec-2.1.4.jar",
"InstalledVersion": "2.1.4",
"FixedVersion": "2.1.7, 2.2.3",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-40690",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "xml-security: XPath Transform abuse allows for information disclosure",
"Description": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.",
"Severity": "HIGH",
"CweIDs": [
"CWE-200"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 7.5
},
"nvd": {
"V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 5,
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2021-40690",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40690",
"https://github.com/advisories/GHSA-j8wc-gxx9-82hx",
"https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E",
"https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E",
"https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E",
"https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E",
"https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E",
"https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E",
"https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E",
"https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E",
"https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html",
"https://nvd.nist.gov/vuln/detail/CVE-2021-40690",
"https://santuario.apache.org/secadv.data/CVE-2021-40690.txt.asc",
"https://ubuntu.com/security/notices/USN-5525-1",
"https://www.debian.org/security/2021/dsa-5010",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"PublishedDate": "2021-09-19T18:15:00Z",
"LastModifiedDate": "2022-10-05T02:06:00Z"
},
{
"VulnerabilityID": "CVE-2020-15522",
"PkgName": "org.bouncycastle:bc-fips",
"PkgPath": "usr/share/elasticsearch/lib/tools/plugin-cli/bc-fips-1.0.2.jar",
"InstalledVersion": "1.0.2",
"FixedVersion": "1.0.2.1",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-15522",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "bouncycastle: Timing issue within the EC math library",
"Description": "Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
},
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 4.3,
"V3Score": 5.9
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.9
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-15522",
"https://github.com/advisories/GHSA-6xx3-rg99-gc3p",
"https://github.com/bcgit/bc-csharp/wiki/CVE-2020-15522",
"https://github.com/bcgit/bc-java/wiki/CVE-2020-15522",
"https://nvd.nist.gov/vuln/detail/CVE-2020-15522",
"https://security.netapp.com/advisory/ntap-20210622-0007/",
"https://www.bouncycastle.org/releasenotes.html"
],
"PublishedDate": "2021-05-20T12:15:00Z",
"LastModifiedDate": "2021-06-22T09:15:00Z"
},
{
"VulnerabilityID": "CVE-2022-45146",
"PkgName": "org.bouncycastle:bc-fips",
"PkgPath": "usr/share/elasticsearch/lib/tools/plugin-cli/bc-fips-1.0.2.jar",
"InstalledVersion": "1.0.2",
"FixedVersion": "1.0.2.4",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-45146",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "Garbage collection issue in BC-FJA in Java 13 and later",
"Description": "An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or potential information loss. NOTE: FIPS compliant users are unaffected because the FIPS certification is only for Java 7, 8, and 11.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-416"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
},
"nvd": {
"V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.5
}
},
"References": [
"https://github.com/advisories/GHSA-68m8-v89j-7j2p",
"https://github.com/bcgit/bc-java/wiki/CVE-2022-45146",
"https://nvd.nist.gov/vuln/detail/CVE-2022-45146",
"https://www.bouncycastle.org/latest_releases.html"
],
"PublishedDate": "2022-11-21T10:15:00Z",
"LastModifiedDate": "2022-11-30T15:14:00Z"
},
{
"VulnerabilityID": "CVE-2020-15522",
"PkgName": "org.bouncycastle:bcprov-jdk15on",
"PkgPath": "usr/share/elasticsearch/lib/tools/security-cli/bcprov-jdk15on-1.64.jar",
"InstalledVersion": "1.64",
"FixedVersion": "1.66",
"Layer": {
"DiffID": "sha256:8fcd0d6b5e00e4f77da35c2ed44f942ef6b965e4f44e3aad85bf9017eb3a9de2"
},
"SeveritySource": "nvd",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-15522",
"DataSource": {
"ID": "glad",
"Name": "GitLab Advisory Database Community",
"URL": "https://gitlab.com/gitlab-org/advisories-community"
},
"Title": "bouncycastle: Timing issue within the EC math library",
"Description": "Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-362"
],
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.1
},
"nvd": {
"V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V2Score": 4.3,
"V3Score": 5.9
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"V3Score": 5.9
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2020-15522",
"https://github.com/advisories/GHSA-6xx3-rg99-gc3p",
"https://github.com/bcgit/bc-csharp/wiki/CVE-2020-15522",
"https://github.com/bcgit/bc-java/wiki/CVE-2020-15522",
"https://nvd.nist.gov/vuln/detail/CVE-2020-15522",
"https://security.netapp.com/advisory/ntap-20210622-0007/",
"https://www.bouncycastle.org/releasenotes.html"
],
"PublishedDate": "2021-05-20T12:15:00Z",
"LastModifiedDate": "2021-06-22T09:15:00Z"
}
]
}
]
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment