SAST bandit container vulnerabilities
At the point of this issues creation there are over 900 vulnerabilities found by klar in the docker image.
Implementation plan
-
Update base image to use alpine. -
Document before_scriptlimitations (link).
Curated list of container vulnerabilities
The Security dashboard contains a lot of duplicates. Below is the curated list of vulnerabilities, based upon a fresh pipeline run against master. There are 83 total to be addressed, most of which are of a Low severity.
[WARN] [klar] [2020-06-25T13:50:56Z] ▶ Encountered error while reading Dockerfile for remediation, halting remediation processing. Error: Dockerfile does not exist
[WARN] [klar] [2020-06-25T13:50:56Z] ▶ Image [registry.gitlab.com/gitlab-org/security-products/analyzers/bandit/tmp:6ba6341f803adfeb1d6781f9b9f4e8cf8f122693] contains 83 total vulnerabilities
[ERRO] [klar] [2020-06-25T13:50:56Z] ▶ Image [registry.gitlab.com/gitlab-org/security-products/analyzers/bandit/tmp:6ba6341f803adfeb1d6781f9b9f4e8cf8f122693] contains 83 unapproved vulnerabilities
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| STATUS | CVE SEVERITY | PACKAGE NAME | PACKAGE VERSION | CVE DESCRIPTION |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | High CVE-2020-14155 | pcre3 | 2:8.39-12 | libpcre in PCRE before 8.44 allows an integer |
| | | | | overflow via a large number after a (?C substring. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-14155 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | High CVE-2020-10878 | perl | 5.28.1-6 | Perl before 5.30.3 has an integer overflow related to |
| | | | | mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. |
| | | | | A crafted regular expression could lead to malformed |
| | | | | bytecode with a possibility of instruction injection. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-10878 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2018-12886 | gcc-8 | 8.3.0-6 | stack_protect_prologue in cfgexpand.c and |
| | | | | stack_protect_epilogue in function.c in GNU Compiler |
| | | | | Collection (GCC) 4.1 through 8 (under certain |
| | | | | circumstances) generate instruction sequences when |
| | | | | targeting ARM targets that spill the address of |
| | | | | the stack protector guard, which allows an attacker |
| | | | | to bypass the protection of -fstack-protector, |
| | | | | -fstack-protector-all, -fstack-protector-strong, and |
| | | | | -fstack-protector-explicit against stack overflow by |
| | | | | controlling what the stack canary is compared against. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2018-12886 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2020-1751 | glibc | 2.28-10 | An out-of-bounds write vulnerability was found in |
| | | | | glibc before 2.31 when handling signal trampolines |
| | | | | on PowerPC. Specifically, the backtrace function |
| | | | | did not properly check the array bounds when storing |
| | | | | the frame address, resulting in a denial of service |
| | | | | or potential code execution. The highest threat |
| | | | | from this vulnerability is to system availability. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-1751 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2019-12290 | libidn2 | 2.0.5-1+deb10u1 | GNU libidn2 before 2.2.0 fails to perform the roundtrip |
| | | | | checks specified in RFC3490 Section 4.2 when converting |
| | | | | A-labels to U-labels. This makes it possible in some |
| | | | | circumstances for one domain to impersonate another. |
| | | | | By creating a malicious domain that matches a target |
| | | | | domain except for the inclusion of certain punycoded |
| | | | | Unicode characters (that would be discarded when |
| | | | | converted first to a Unicode label and then back to an |
| | | | | ASCII label), arbitrary domains can be impersonated. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-12290 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2019-13115 | libssh2 | 1.8.0-2.1 | In libssh2 before 1.9.0, |
| | | | | kex_method_diffie_hellman_group_exchange_sha256_key_exchange |
| | | | | in kex.c has an integer overflow that could lead to an |
| | | | | out-of-bounds read in the way packets are read from the |
| | | | | server. A remote attacker who compromises a SSH server |
| | | | | may be able to disclose sensitive information or cause |
| | | | | a denial of service condition on the client system when |
| | | | | a user connects to the server. This is related to an |
| | | | | _libssh2_check_length mistake, and is different from the |
| | | | | various issues fixed in 1.8.1, such as CVE-2019-3855. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-13115 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2019-20454 | pcre2 | 10.32-5 | An out-of-bounds read was discovered in PCRE before |
| | | | | 10.34 when the pattern \X is JIT compiled and used |
| | | | | to match specially crafted subjects in non-UTF |
| | | | | mode. Applications that use PCRE to parse untrusted |
| | | | | input may be vulnerable to this flaw, which would |
| | | | | allow an attacker to crash the application. The flaw |
| | | | | occurs in do_extuni_no_utf in pcre2_jit_compile.c. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-20454 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2020-10543 | perl | 5.28.1-6 | Perl before 5.30.3 on 32-bit platforms allows a |
| | | | | heap-based buffer overflow because nested regular |
| | | | | expression quantifiers have an integer overflow. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-10543 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2020-12723 | perl | 5.28.1-6 | regcomp.c in Perl before 5.30.3 allows a buffer |
| | | | | overflow via a crafted regular expression |
| | | | | because of recursive S_study_chunk calls. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-12723 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2019-16168 | sqlite3 | 3.27.2-3 | In SQLite through 3.29.0, whereLoopAddBtreeIndex in |
| | | | | sqlite3.c can crash a browser or other application |
| | | | | because of missing validation of a sqlite_stat1 sz field, |
| | | | | aka a "severe division by zero in the query planner." |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-16168 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2019-19603 | sqlite3 | 3.27.2-3 | SQLite 3.30.1 mishandles certain SELECT statements with |
| | | | | a nonexistent VIEW, leading to an application crash. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-19603 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2019-20218 | sqlite3 | 3.27.2-3 | selectExpander in select.c in SQLite 3.30.1 proceeds |
| | | | | with WITH stack unwinding even after a parsing error. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-20218 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2020-11655 | sqlite3 | 3.27.2-3 | SQLite through 3.31.1 allows attackers to cause |
| | | | | a denial of service (segmentation fault) via |
| | | | | a malformed window-function query because the |
| | | | | AggInfo object's initialization is mishandled. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-11655 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Medium CVE-2020-13871 | sqlite3 | 3.27.2-3 | SQLite 3.32.2 has a use-after-free in |
| | | | | resetAccumulator in select.c because the parse |
| | | | | tree rewrite for window functions is too late. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-13871 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2011-3374 | apt | 1.8.2.1 | It was found that apt-key in apt, all versions, do not |
| | | | | correctly validate gpg keys with the master keyring, |
| | | | | leading to a potential man-in-the-middle attack. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2011-3374 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-18276 | bash | 5.0-4 | An issue was discovered in disable_priv_mode in shell.c in |
| | | | | GNU Bash through 5.0 patch 11. By default, if Bash is run |
| | | | | with its effective UID not equal to its real UID, it will |
| | | | | drop privileges by setting its effective UID to its real |
| | | | | UID. However, it does so incorrectly. On Linux and other |
| | | | | systems that support "saved UID" functionality, the saved |
| | | | | UID is not dropped. An attacker with command execution in |
| | | | | the shell can use "enable -f" for runtime loading of a new |
| | | | | builtin, which can be a shared object that calls setuid() |
| | | | | and therefore regains privileges. However, binaries |
| | | | | running with an effective UID of 0 are unaffected. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-18276 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2016-2781 | coreutils | 8.30-3 | chroot in GNU coreutils, when used with --userspec, |
| | | | | allows local users to escape to the parent session |
| | | | | via a crafted TIOCSTI ioctl call, which pushes |
| | | | | characters to the terminal's input buffer. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2016-2781 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2017-18018 | coreutils | 8.30-3 | In GNU Coreutils through 8.29, chown-core.c in chown |
| | | | | and chgrp does not prevent replacement of a plain file |
| | | | | with a symlink during use of the POSIX "-R -L" options, |
| | | | | which allows local users to modify the ownership |
| | | | | of arbitrary files by leveraging a race condition. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2017-18018 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2013-0340 | expat | 2.2.6-2+deb10u1 | expat 2.1.0 and earlier does not properly handle |
| | | | | entities expansion unless an application developer |
| | | | | uses the XML_SetEntityDeclHandler function, which |
| | | | | allows remote attackers to cause a denial of service |
| | | | | (resource consumption), send HTTP requests to intranet |
| | | | | servers, or read arbitrary files via a crafted XML |
| | | | | document, aka an XML External Entity (XXE) issue. |
| | | | | NOTE: it could be argued that because expat already |
| | | | | provides the ability to disable external entity |
| | | | | expansion, the responsibility for resolving this |
| | | | | issue lies with application developers; according |
| | | | | to this argument, this entry should be REJECTed, and |
| | | | | each affected application would need its own CVE. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2013-0340 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-15847 | gcc-8 | 8.3.0-6 | The POWER9 backend in GNU Compiler Collection (GCC) |
| | | | | before version 10 could optimize multiple calls of |
| | | | | the __builtin_darn intrinsic into a single call, thus |
| | | | | reducing the entropy of the random number generator. This |
| | | | | occurred because a volatile operation was not specified. |
| | | | | For example, within a single execution of a program, the |
| | | | | output of every __builtin_darn() call may be the same. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-15847 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2018-1000021 | git | 1:2.20.1-2+deb10u3 | GIT version 2.15.1 and earlier contains a Input |
| | | | | Validation Error vulnerability in Client that can result |
| | | | | in problems including messing up terminal configuration |
| | | | | to RCE. This attack appear to be exploitable via |
| | | | | The user must interact with a malicious git server, |
| | | | | (or have their traffic modified in a MITM attack). |
| | | | | https://security-tracker.debian.org/tracker/CVE-2018-1000021 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2010-4051 | glibc | 2.28-10 | The regcomp implementation in the GNU C Library (aka |
| | | | | glibc or libc6) through 2.11.3, and 2.12.x through |
| | | | | 2.12.2, allows context-dependent attackers to cause |
| | | | | a denial of service (application crash) via a regular |
| | | | | expression containing adjacent bounded repetitions |
| | | | | that bypass the intended RE_DUP_MAX limitation, |
| | | | | as demonstrated by a {10,}{10,}{10,}{10,}{10,} |
| | | | | sequence in the proftpd.gnu.c exploit for |
| | | | | ProFTPD, related to a "RE_DUP_MAX overflow." |
| | | | | https://security-tracker.debian.org/tracker/CVE-2010-4051 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2010-4052 | glibc | 2.28-10 | Stack consumption vulnerability in the regcomp |
| | | | | implementation in the GNU C Library (aka glibc or |
| | | | | libc6) through 2.11.3, and 2.12.x through 2.12.2, |
| | | | | allows context-dependent attackers to cause a |
| | | | | denial of service (resource exhaustion) via a |
| | | | | regular expression containing adjacent repetition |
| | | | | operators, as demonstrated by a {10,}{10,}{10,}{10,} |
| | | | | sequence in the proftpd.gnu.c exploit for ProFTPD. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2010-4052 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2010-4756 | glibc | 2.28-10 | The glob implementation in the GNU C Library (aka |
| | | | | glibc or libc6) allows remote authenticated users |
| | | | | to cause a denial of service (CPU and memory |
| | | | | consumption) via crafted glob expressions that do |
| | | | | not match any pathnames, as demonstrated by glob |
| | | | | expressions in STAT commands to an FTP daemon, |
| | | | | a different vulnerability than CVE-2010-2632. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2010-4756 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2016-10228 | glibc | 2.28-10 | The iconv program in the GNU C Library (aka glibc or |
| | | | | libc6) 2.25 and earlier, when invoked with the -c option, |
| | | | | enters an infinite loop when processing invalid multi-byte |
| | | | | input sequences, leading to a denial of service. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2016-10228 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2018-20796 | glibc | 2.28-10 | In the GNU C Library (aka glibc or libc6) through |
| | | | | 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c |
| | | | | has Uncontrolled Recursion, as demonstrated |
| | | | | by '(\227|)(\\1\\1|t1|\\\2537)+' in grep. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2018-20796 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-1010022 | glibc | 2.28-10 | GNU Libc current is affected by: Mitigation bypass. |
| | | | | The impact is: Attacker may bypass stack guard |
| | | | | protection. The component is: nptl. The attack vector |
| | | | | is: Exploit stack buffer overflow vulnerability and |
| | | | | use this bypass vulnerability to bypass stack guard. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-1010022 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-1010023 | glibc | 2.28-10 | GNU Libc current is affected by: Re-mapping current loaded |
| | | | | libray with malicious ELF file. The impact is: In worst |
| | | | | case attacker may evaluate privileges. The component is: |
| | | | | libld. The attack vector is: Attacker sends 2 ELF files |
| | | | | to victim and asks to run ldd on it. ldd execute code. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-1010023 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-1010024 | glibc | 2.28-10 | GNU Libc current is affected by: Mitigation bypass. |
| | | | | The impact is: Attacker may bypass ASLR using cache |
| | | | | of thread stack and heap. The component is: glibc. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-1010024 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-1010025 | glibc | 2.28-10 | ** DISPUTED ** GNU Libc current is affected by: |
| | | | | Mitigation bypass. The impact is: Attacker may guess |
| | | | | the heap addresses of pthread_created thread. The |
| | | | | component is: glibc. NOTE: the vendor's position |
| | | | | is "ASLR bypass itself is not a vulnerability." |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-1010025 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-19126 | glibc | 2.28-10 | On the x86-64 architecture, the GNU C Library (aka glibc) |
| | | | | before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC |
| | | | | environment variable during program execution after |
| | | | | a security transition, allowing local attackers to |
| | | | | restrict the possible mapping addresses for loaded |
| | | | | libraries and thus bypass ASLR for a setuid program. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-19126 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-9192 | glibc | 2.28-10 | ** DISPUTED ** In the GNU C Library (aka glibc or |
| | | | | libc6) through 2.29, check_dst_limits_calc_pos_1 |
| | | | | in posix/regexec.c has Uncontrolled Recursion, as |
| | | | | demonstrated by '(|)(\\1\\1)*' in grep, a different |
| | | | | issue than CVE-2018-20796. NOTE: the software |
| | | | | maintainer disputes that this is a vulnerability because |
| | | | | the behavior occurs only with a crafted pattern. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-9192 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2020-10029 | glibc | 2.28-10 | The GNU C Library (aka glibc or libc6) before 2.32 could |
| | | | | overflow an on-stack buffer during range reduction if |
| | | | | an input to an 80-bit long double function contains |
| | | | | a non-canonical bit pattern, a seen when passing a |
| | | | | 0x5d414141414141410000 value to sinl on x86 targets. This |
| | | | | is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-10029 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2020-1752 | glibc | 2.28-10 | A use-after-free vulnerability introduced in glibc |
| | | | | upstream version 2.14 was found in the way the tilde |
| | | | | expansion was carried out. Directory paths containing an |
| | | | | initial tilde followed by a valid username were affected |
| | | | | by this issue. A local attacker could exploit this flaw |
| | | | | by creating a specially crafted path that, when processed |
| | | | | by the glob function, would potentially lead to arbitrary |
| | | | | code execution. This was fixed in version 2.32. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-1752 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2020-6096 | glibc | 2.28-10 | An exploitable signed comparison vulnerability exists in |
| | | | | the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. |
| | | | | Calling memcpy() (on ARMv7 targets that utilize the GNU |
| | | | | glibc implementation) with a negative value for the 'num' |
| | | | | parameter results in a signed comparison vulnerability. |
| | | | | If an attacker underflows the 'num' parameter to |
| | | | | memcpy(), this vulnerability could lead to undefined |
| | | | | behavior such as writing to out-of-bounds memory and |
| | | | | potentially remote code execution. Furthermore, this |
| | | | | memcpy() implementation allows for program execution |
| | | | | to continue in scenarios where a segmentation fault |
| | | | | or crash should have occurred. The dangers occur |
| | | | | in that subsequent execution and iterations of this |
| | | | | code will be executed with this corrupted data. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-6096 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-14855 | gnupg2 | 2.2.12-1+deb10u1 | A flaw was found in the way certificate signatures |
| | | | | could be forged using collisions found in the |
| | | | | SHA-1 algorithm. An attacker could use this |
| | | | | weakness to create forged certificate signatures. |
| | | | | This issue affects GnuPG versions before 2.2.18. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-14855 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2011-3389 | gnutls28 | 3.6.7-4+deb10u4 | The SSL protocol, as used in certain configurations |
| | | | | in Microsoft Windows and Microsoft Internet |
| | | | | Explorer, Mozilla Firefox, Google Chrome, Opera, |
| | | | | and other products, encrypts data by using CBC mode |
| | | | | with chained initialization vectors, which allows |
| | | | | man-in-the-middle attackers to obtain plaintext |
| | | | | HTTP headers via a blockwise chosen-boundary attack |
| | | | | (BCBA) on an HTTPS session, in conjunction with |
| | | | | JavaScript code that uses (1) the HTML5 WebSocket |
| | | | | API, (2) the Java URLConnection API, or (3) the |
| | | | | Silverlight WebClient API, aka a "BEAST" attack. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2011-3389 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2004-0971 | krb5 | 1.17-3 | The krb5-send-pr script in the kerberos5 (krb5) package |
| | | | | in Trustix Secure Linux 1.5 through 2.1, and possibly |
| | | | | other operating systems, allows local users to overwrite |
| | | | | files via a symlink attack on temporary files. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2004-0971 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2018-5709 | krb5 | 1.17-3 | An issue was discovered in MIT Kerberos 5 (aka krb5) |
| | | | | through 1.16. There is a variable "dbentry->n_key_data" |
| | | | | in kadmin/dbutil/dump.c that can store 16-bit |
| | | | | data but unknowingly the developer has assigned |
| | | | | a "u4" variable to it, which is for 32-bit data. |
| | | | | An attacker can use this vulnerability to affect |
| | | | | other artifacts of the database as we know that a |
| | | | | Kerberos database dump file contains trusted data. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2018-5709 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2018-6829 | libgcrypt20 | 1.8.4-5 | cipher/elgamal.c in Libgcrypt through 1.8.2, when |
| | | | | used to encrypt messages directly, improperly encodes |
| | | | | plaintexts, which allows attackers to obtain sensitive |
| | | | | information by reading ciphertext data (i.e., it does |
| | | | | not have semantic security in face of a ciphertext-only |
| | | | | attack). The Decisional Diffie-Hellman (DDH) assumption |
| | | | | does not hold for Libgcrypt's ElGamal implementation. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2018-6829 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-12904 | libgcrypt20 | 1.8.4-5 | In Libgcrypt 1.8.4, the C implementation |
| | | | | of AES is vulnerable to a flush-and-reload |
| | | | | side-channel attack because physical addresses |
| | | | | are available to other processes. (The C |
| | | | | implementation is used on platforms where an |
| | | | | assembly-language implementation is unavailable.) |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-12904 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-13627 | libgcrypt20 | 1.8.4-5 | It was discovered that there was a ECDSA timing attack |
| | | | | in the libgcrypt20 cryptographic library. Version |
| | | | | affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. |
| | | | | Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-13627 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-9893 | libseccomp | 2.3.3-4 | libseccomp before 2.4.0 did not correctly |
| | | | | generate 64-bit syscall argument comparisons |
| | | | | using the arithmetic operators (LT, GT, LE, GE), |
| | | | | which might able to lead to bypassing seccomp |
| | | | | filters and potential privilege escalations. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-9893 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-17498 | libssh2 | 1.8.0-2.1 | In libssh2 v1.9.0 and earlier versions, the |
| | | | | SSH_MSG_DISCONNECT logic in packet.c has an integer |
| | | | | overflow in a bounds check, enabling an attacker |
| | | | | to specify an arbitrary (out-of-bounds) offset |
| | | | | for a subsequent memory read. A crafted SSH server |
| | | | | may be able to disclose sensitive information |
| | | | | or cause a denial of service condition on the |
| | | | | client system when a user connects to the server. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-17498 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2018-1000654 | libtasn1-6 | 4.13-3 | GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, |
| | | | | libtasn1-4.12 contains a DoS, specifically CPU usage |
| | | | | will reach 100% when running asn1Paser against the POC |
| | | | | due to an issue in _asn1_expand_object_id(p_tree), after |
| | | | | a long time, the program will be killed. This attack |
| | | | | appears to be exploitable via parsing a crafted file. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2018-1000654 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-17543 | lz4 | 1.8.3-1 | LZ4 before 1.9.2 has a heap-based buffer overflow |
| | | | | in LZ4_write32 (related to LZ4_compress_destSize), |
| | | | | affecting applications that call LZ4_compress_fast |
| | | | | with a large input. (This issue can also lead to |
| | | | | data corruption.) NOTE: the vendor states "only a few |
| | | | | specific / uncommon usages of the API are at risk." |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-17543 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2015-3276 | openldap | 2.4.47+dfsg-3+deb10u2 | The nss_parse_ciphers function in |
| | | | | libraries/libldap/tls_m.c in OpenLDAP does not |
| | | | | properly parse OpenSSL-style multi-keyword mode |
| | | | | cipher strings, which might cause a weaker than |
| | | | | intended cipher to be used and allow remote attackers |
| | | | | to have unspecified impact via unknown vectors. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2015-3276 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2017-14159 | openldap | 2.4.47+dfsg-3+deb10u2 | slapd in OpenLDAP 2.4.45 and earlier creates a |
| | | | | PID file after dropping privileges to a non-root |
| | | | | account, which might allow local users to kill |
| | | | | arbitrary processes by leveraging access to this |
| | | | | non-root account for PID file modification before |
| | | | | a root script executes a "kill `cat /pathname`" |
| | | | | command, as demonstrated by openldap-initscript. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2017-14159 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2017-17740 | openldap | 2.4.47+dfsg-3+deb10u2 | contrib/slapd-modules/nops/nops.c in OpenLDAP |
| | | | | through 2.4.45, when both the nops module and the |
| | | | | memberof overlay are enabled, attempts to free |
| | | | | a buffer that was allocated on the stack, which |
| | | | | allows remote attackers to cause a denial of |
| | | | | service (slapd crash) via a member MODDN operation. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2017-17740 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2007-6755 | openssl | 1.1.1d-0+deb10u3 | The NIST SP 800-90A default statement of the Dual |
| | | | | Elliptic Curve Deterministic Random Bit Generation |
| | | | | (Dual_EC_DRBG) algorithm contains point Q constants |
| | | | | with a possible relationship to certain "skeleton |
| | | | | key" values, which might allow context-dependent |
| | | | | attackers to defeat cryptographic protection |
| | | | | mechanisms by leveraging knowledge of those values. |
| | | | | NOTE: this is a preliminary CVE for Dual_EC_DRBG; |
| | | | | future research may provide additional details |
| | | | | about point Q and associated attacks, and could |
| | | | | potentially lead to a RECAST or REJECT of this CVE. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2007-6755 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2010-0928 | openssl | 1.1.1d-0+deb10u3 | OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC |
| | | | | on the Xilinx Virtex-II Pro FPGA uses a Fixed Width |
| | | | | Exponentiation (FWE) algorithm for certain signature |
| | | | | calculations, and does not verify the signature |
| | | | | before providing it to a caller, which makes it easier |
| | | | | for physically proximate attackers to determine the |
| | | | | private key via a modified supply voltage for the |
| | | | | microprocessor, related to a "fault-based attack." |
| | | | | https://security-tracker.debian.org/tracker/CVE-2010-0928 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-1551 | openssl | 1.1.1d-0+deb10u3 | There is an overflow bug in the x64_64 Montgomery |
| | | | | squaring procedure used in exponentiation with 512-bit |
| | | | | moduli. No EC algorithms are affected. Analysis suggests |
| | | | | that attacks against 2-prime RSA1024, 3-prime RSA1536, |
| | | | | and DSA1024 as a result of this defect would be very |
| | | | | difficult to perform and are not believed likely. |
| | | | | Attacks against DH512 are considered just feasible. |
| | | | | However, for an attack the target would have to re-use |
| | | | | the DH512 private key, which is not recommended anyway. |
| | | | | Also applications directly using the low level API |
| | | | | BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. |
| | | | | Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). |
| | | | | Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t). |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-1551 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2017-11164 | pcre3 | 2:8.39-12 | In PCRE 8.41, the OP_KETRMAX feature in the match function |
| | | | | in pcre_exec.c allows stack exhaustion (uncontrolled |
| | | | | recursion) when processing a crafted regular expression. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2017-11164 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2017-16231 | pcre3 | 2:8.39-12 | ** DISPUTED ** In PCRE 8.41, after compiling, a pcretest |
| | | | | load test PoC produces a crash overflow in the function |
| | | | | match() in pcre_exec.c because of a self-recursive |
| | | | | call. NOTE: third parties dispute the relevance of |
| | | | | this report, noting that there are options that can |
| | | | | be used to limit the amount of stack that is used. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2017-16231 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2017-7245 | pcre3 | 2:8.39-12 | Stack-based buffer overflow in the pcre32_copy_substring |
| | | | | function in pcre_get.c in libpcre1 in PCRE |
| | | | | 8.40 allows remote attackers to cause a denial |
| | | | | of service (WRITE of size 4) or possibly have |
| | | | | unspecified other impact via a crafted file. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2017-7245 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2017-7246 | pcre3 | 2:8.39-12 | Stack-based buffer overflow in the pcre32_copy_substring |
| | | | | function in pcre_get.c in libpcre1 in PCRE 8.40 |
| | | | | allows remote attackers to cause a denial of |
| | | | | service (WRITE of size 268) or possibly have |
| | | | | unspecified other impact via a crafted file. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2017-7246 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-20838 | pcre3 | 2:8.39-12 | libpcre in PCRE before 8.43 allows a subject |
| | | | | buffer over-read in JIT when UTF is disabled, |
| | | | | and \X or \R has more than one fixed |
| | | | | quantifier, a related issue to CVE-2019-20454. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-20838 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2011-4116 | perl | 5.28.1-6 | _is_safe in the File::Temp module for |
| | | | | Perl does not properly handle symlinks. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2011-4116 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2007-5686 | shadow | 1:4.5-1.1 | initscripts in rPath Linux 1 sets insecure permissions |
| | | | | for the /var/log/btmp file, which allows local |
| | | | | users to obtain sensitive information regarding |
| | | | | authentication attempts. NOTE: because sshd detects |
| | | | | the insecure permissions and does not log certain |
| | | | | events, this also prevents sshd from logging failed |
| | | | | authentication attempts by remote attackers. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2007-5686 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2013-4235 | shadow | 1:4.5-1.1 | shadow: TOCTOU (time-of-check time-of-use) race |
| | | | | condition when copying and removing directory trees |
| | | | | https://security-tracker.debian.org/tracker/CVE-2013-4235 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2018-7169 | shadow | 1:4.5-1.1 | An issue was discovered in shadow 4.5. newgidmap (in |
| | | | | shadow-utils) is setuid and allows an unprivileged |
| | | | | user to be placed in a user namespace where |
| | | | | setgroups(2) is permitted. This allows an attacker |
| | | | | to remove themselves from a supplementary group, |
| | | | | which may allow access to certain filesystem paths |
| | | | | if the administrator has used "group blacklisting" |
| | | | | (e.g., chmod g-rwx) to restrict access to paths. |
| | | | | This flaw effectively reverts a security feature in |
| | | | | the kernel (in particular, the /proc/self/setgroups |
| | | | | knob) to prevent this sort of privilege escalation. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2018-7169 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-19882 | shadow | 1:4.5-1.1 | shadow 4.8, in certain circumstances affecting at |
| | | | | least Gentoo, Arch Linux, and Void Linux, allows local |
| | | | | users to obtain root access because setuid programs |
| | | | | are misconfigured. Specifically, this affects shadow |
| | | | | 4.8 when compiled using --with-libpam but without |
| | | | | explicitly passing --disable-account-tools-setuid, |
| | | | | and without a PAM configuration suitable for use with |
| | | | | setuid account management tools. This combination |
| | | | | leads to account management tools (groupadd, groupdel, |
| | | | | groupmod, useradd, userdel, usermod) that can easily |
| | | | | be used by unprivileged local users to escalate |
| | | | | privileges to root in multiple ways. This issue became |
| | | | | much more relevant in approximately December 2019 |
| | | | | when an unrelated bug was fixed (i.e., the chmod calls |
| | | | | to suidusbins were fixed in the upstream Makefile |
| | | | | which is now included in the release version 4.8). |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-19882 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-19242 | sqlite3 | 3.27.2-3 | SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated |
| | | | | by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-19242 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-19244 | sqlite3 | 3.27.2-3 | sqlite3Select in select.c in SQLite 3.30.1 allows a |
| | | | | crash if a sub-select uses both DISTINCT and window |
| | | | | functions, and also has certain ORDER BY usage. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-19244 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-19645 | sqlite3 | 3.27.2-3 | alter.c in SQLite through 3.30.1 allows |
| | | | | attackers to trigger infinite recursion via |
| | | | | certain types of self-referential views in |
| | | | | conjunction with ALTER TABLE statements. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-19645 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-19923 | sqlite3 | 3.27.2-3 | flattenSubquery in select.c in SQLite 3.30.1 mishandles |
| | | | | certain uses of SELECT DISTINCT involving a LEFT JOIN |
| | | | | in which the right-hand side is a view. This can cause |
| | | | | a NULL pointer dereference (or incorrect results). |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-19923 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-19924 | sqlite3 | 3.27.2-3 | SQLite 3.30.1 mishandles certain parser-tree rewriting, |
| | | | | related to expr.c, vdbeaux.c, and window.c. This is caused |
| | | | | by incorrect sqlite3WindowRewrite() error handling. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-19924 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-19925 | sqlite3 | 3.27.2-3 | zipfileUpdate in ext/misc/zipfile.c in |
| | | | | SQLite 3.30.1 mishandles a NULL pathname |
| | | | | during an update of a ZIP archive. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-19925 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-19959 | sqlite3 | 3.27.2-3 | ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain |
| | | | | uses of INSERT INTO in situations involving embedded '\0' |
| | | | | characters in filenames, leading to a memory-management |
| | | | | error that can be detected by (for example) valgrind. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-19959 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2020-11656 | sqlite3 | 3.27.2-3 | In SQLite through 3.31.1, the ALTER TABLE implementation |
| | | | | has a use-after-free, as demonstrated by an ORDER BY |
| | | | | clause that belongs to a compound SELECT statement. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-11656 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2020-13434 | sqlite3 | 3.27.2-3 | SQLite through 3.32.0 has an integer overflow |
| | | | | in sqlite3_str_vappendf in printf.c. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-13434 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2020-13435 | sqlite3 | 3.27.2-3 | SQLite through 3.32.0 has a segmentation |
| | | | | fault in sqlite3ExprCodeTarget in expr.c. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-13435 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2020-13630 | sqlite3 | 3.27.2-3 | ext/fts3/fts3.c in SQLite before 3.32.0 |
| | | | | has a use-after-free in fts3EvalNextRow, |
| | | | | related to the snippet feature. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-13630 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2020-13631 | sqlite3 | 3.27.2-3 | SQLite before 3.32.0 allows a virtual table |
| | | | | to be renamed to the name of one of its shadow |
| | | | | tables, related to alter.c and build.c. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-13631 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2020-13632 | sqlite3 | 3.27.2-3 | ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a |
| | | | | NULL pointer dereference via a crafted matchinfo() query. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-13632 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2020-9327 | sqlite3 | 3.27.2-3 | In SQLite 3.31.1, isAuxiliaryVtabOperator |
| | | | | allows attackers to trigger a NULL pointer |
| | | | | dereference and segmentation fault because |
| | | | | of generated column optimizations. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-9327 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2013-4392 | systemd | 241-7~deb10u4 | systemd, when updating file permissions, allows |
| | | | | local users to change the permissions and |
| | | | | SELinux security contexts for arbitrary files |
| | | | | via a symlink attack on unspecified files. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2013-4392 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-20386 | systemd | 241-7~deb10u4 | An issue was discovered in button_open |
| | | | | in login/logind-button.c in systemd |
| | | | | before 243. When executing the udevadm |
| | | | | trigger command, a memory leak may occur. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-20386 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-3843 | systemd | 241-7~deb10u4 | It was discovered that a systemd service that uses |
| | | | | DynamicUser property can create a SUID/SGID binary |
| | | | | that would be allowed to run as the transient service |
| | | | | UID/GID even after the service is terminated. A local |
| | | | | attacker may use this flaw to access resources that |
| | | | | will be owned by a potentially different service |
| | | | | in the future, when the UID/GID will be recycled. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-3843 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-3844 | systemd | 241-7~deb10u4 | It was discovered that a systemd service that |
| | | | | uses DynamicUser property can get new privileges |
| | | | | through the execution of SUID binaries, which |
| | | | | would allow to create binaries owned by the service |
| | | | | transient group with the setgid bit set. A local |
| | | | | attacker may use this flaw to access resources that |
| | | | | will be owned by a potentially different service |
| | | | | in the future, when the GID will be recycled. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-3844 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2020-13776 | systemd | 241-7~deb10u4 | systemd through v245 mishandles numerical usernames |
| | | | | such as ones composed of decimal digits or 0x |
| | | | | followed by hex digits, as demonstrated by use of |
| | | | | root privileges when privileges of the 0x0 user |
| | | | | account were intended. NOTE: this issue exists |
| | | | | because of an incomplete fix for CVE-2017-1000082. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2020-13776 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2005-2541 | tar | 1.30+dfsg-6 | Tar 1.15.1 does not properly warn the user when |
| | | | | extracting setuid or setgid files, which may allow |
| | | | | local users or remote attackers to gain privileges. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2005-2541 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
| Unapproved | Low CVE-2019-9923 | tar | 1.30+dfsg-6 | pax_decode_header in sparse.c in GNU Tar before 1.32 |
| | | | | had a NULL pointer dereference when parsing certain |
| | | | | archives that have malformed extended headers. |
| | | | | https://security-tracker.debian.org/tracker/CVE-2019-9923 |
+------------+-----------------------+--------------+-----------------------+--------------------------------------------------------------+
Edited by Taylor McCaslin