From c1d21bcc81ed025ca958e6287dab14194de71fab Mon Sep 17 00:00:00 2001 From: NeilHanlon Date: Wed, 22 Feb 2023 13:06:47 +0000 Subject: [PATCH] deploy: 8ccce7fd31973e438889a894e0b29e70f8459500 --- index.html | 844 +++++++++++++++++--------------------------- trivy-results.sarif | 540 ++++++---------------------- 2 files changed, 434 insertions(+), 950 deletions(-) diff --git a/index.html b/index.html index 507468c..2727798 100644 --- a/index.html +++ b/index.html @@ -51,7 +51,7 @@ } a.toggle-more-links { cursor: pointer; } - docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2023-02-20 13:06:23.699980968 +0000 UTC m=+0.790736468 + docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2023-02-22 13:06:46.685386942 +0000 UTC m=+1.390952176 -

docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2023-02-20 13:06:23.700012968 +0000 UTC m=+0.790768468

+

docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2023-02-22 13:06:46.685416043 +0000 UTC m=+1.390981377

@@ -93,569 +93,377 @@ - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/trivy-results.sarif b/trivy-results.sarif index 711fec0..bb3ec08 100644 --- a/trivy-results.sarif +++ b/trivy-results.sarif @@ -10,21 +10,21 @@ "name": "Trivy", "rules": [ { - "id": "CVE-2022-42010", + "id": "CVE-2020-10735", "name": "OsPackageVulnerability", "shortDescription": { - "text": "dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets" + "text": "python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS" }, "fullDescription": { - "text": "An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures." + "text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\u0026#34;text\u0026#34;), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability." }, "defaultConfiguration": { "level": "warning" }, - "helpUri": "https://avd.aquasec.com/nvd/cve-2022-42010", + "helpUri": "https://avd.aquasec.com/nvd/cve-2020-10735", "help": { - "text": "Vulnerability CVE-2022-42010\nSeverity: MEDIUM\nPackage: dbus-tools\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42010](https://avd.aquasec.com/nvd/cve-2022-42010)\nAn issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.", - "markdown": "**Vulnerability CVE-2022-42010**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|dbus-tools|1:1.12.8-23.el8_7.1|[CVE-2022-42010](https://avd.aquasec.com/nvd/cve-2022-42010)|\n\nAn issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures." + "text": "Vulnerability CVE-2020-10735\nSeverity: MEDIUM\nPackage: python3-libs\nFixed Version: 3.6.8-48.el8_7.1.rocky.0\nLink: [CVE-2020-10735](https://avd.aquasec.com/nvd/cve-2020-10735)\nA flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.", + "markdown": "**Vulnerability CVE-2020-10735**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|python3-libs|3.6.8-48.el8_7.1.rocky.0|[CVE-2020-10735](https://avd.aquasec.com/nvd/cve-2020-10735)|\n\nA flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability." }, "properties": { "precision": "very-high", @@ -37,21 +37,21 @@ } }, { - "id": "CVE-2022-42011", + "id": "CVE-2021-28861", "name": "OsPackageVulnerability", "shortDescription": { - "text": "dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type" + "text": "python: open redirection vulnerability in lib/http/server.py may lead to information disclosure" }, "fullDescription": { - "text": "An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type." + "text": "** DISPUTED ** Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \u0026#34;Warning: http.server is not recommended for production. It only implements basic security checks.\u0026#34;" }, "defaultConfiguration": { "level": "warning" }, - "helpUri": "https://avd.aquasec.com/nvd/cve-2022-42011", + "helpUri": "https://avd.aquasec.com/nvd/cve-2021-28861", "help": { - "text": "Vulnerability CVE-2022-42011\nSeverity: MEDIUM\nPackage: dbus-tools\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42011](https://avd.aquasec.com/nvd/cve-2022-42011)\nAn issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.", - "markdown": "**Vulnerability CVE-2022-42011**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|dbus-tools|1:1.12.8-23.el8_7.1|[CVE-2022-42011](https://avd.aquasec.com/nvd/cve-2022-42011)|\n\nAn issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type." + "text": "Vulnerability CVE-2021-28861\nSeverity: MEDIUM\nPackage: python3-libs\nFixed Version: 3.6.8-48.el8_7.1.rocky.0\nLink: [CVE-2021-28861](https://avd.aquasec.com/nvd/cve-2021-28861)\n** DISPUTED ** Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"", + "markdown": "**Vulnerability CVE-2021-28861**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|python3-libs|3.6.8-48.el8_7.1.rocky.0|[CVE-2021-28861](https://avd.aquasec.com/nvd/cve-2021-28861)|\n\n** DISPUTED ** Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"" }, "properties": { "precision": "very-high", @@ -64,21 +64,21 @@ } }, { - "id": "CVE-2022-42012", + "id": "CVE-2022-45061", "name": "OsPackageVulnerability", "shortDescription": { - "text": "dbus: `_dbus_marshal_byteswap` doesn\u0026#39;t process fds in messages with \u0026#34;foreign\u0026#34; endianness correctly" + "text": "Python: CPU denial of service via inefficient IDNA decoder" }, "fullDescription": { - "text": "An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format." + "text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16." }, "defaultConfiguration": { "level": "warning" }, - "helpUri": "https://avd.aquasec.com/nvd/cve-2022-42012", + "helpUri": "https://avd.aquasec.com/nvd/cve-2022-45061", "help": { - "text": "Vulnerability CVE-2022-42012\nSeverity: MEDIUM\nPackage: dbus-tools\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42012](https://avd.aquasec.com/nvd/cve-2022-42012)\nAn issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.", - "markdown": "**Vulnerability CVE-2022-42012**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|dbus-tools|1:1.12.8-23.el8_7.1|[CVE-2022-42012](https://avd.aquasec.com/nvd/cve-2022-42012)|\n\nAn issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format." + "text": "Vulnerability CVE-2022-45061\nSeverity: MEDIUM\nPackage: python3-libs\nFixed Version: 3.6.8-48.el8_7.1.rocky.0\nLink: [CVE-2022-45061](https://avd.aquasec.com/nvd/cve-2022-45061)\nAn issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.", + "markdown": "**Vulnerability CVE-2022-45061**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|python3-libs|3.6.8-48.el8_7.1.rocky.0|[CVE-2022-45061](https://avd.aquasec.com/nvd/cve-2022-45061)|\n\nAn issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16." }, "properties": { "precision": "very-high", @@ -91,21 +91,21 @@ } }, { - "id": "CVE-2022-43680", + "id": "CVE-2022-4415", "name": "OsPackageVulnerability", "shortDescription": { - "text": "expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate" + "text": "systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting" }, "fullDescription": { - "text": "In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations." + "text": "A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting." }, "defaultConfiguration": { "level": "warning" }, - "helpUri": "https://avd.aquasec.com/nvd/cve-2022-43680", + "helpUri": "https://avd.aquasec.com/nvd/cve-2022-4415", "help": { - "text": "Vulnerability CVE-2022-43680\nSeverity: MEDIUM\nPackage: expat\nFixed Version: 2.2.5-10.el8_7.1\nLink: [CVE-2022-43680](https://avd.aquasec.com/nvd/cve-2022-43680)\nIn libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.", - "markdown": "**Vulnerability CVE-2022-43680**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|expat|2.2.5-10.el8_7.1|[CVE-2022-43680](https://avd.aquasec.com/nvd/cve-2022-43680)|\n\nIn libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations." + "text": "Vulnerability CVE-2022-4415\nSeverity: MEDIUM\nPackage: systemd-pam\nFixed Version: 239-68.el8_7.4\nLink: [CVE-2022-4415](https://avd.aquasec.com/nvd/cve-2022-4415)\nA vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.", + "markdown": "**Vulnerability CVE-2022-4415**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|systemd-pam|239-68.el8_7.4|[CVE-2022-4415](https://avd.aquasec.com/nvd/cve-2022-4415)|\n\nA vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting." }, "properties": { "precision": "very-high", @@ -118,129 +118,21 @@ } }, { - "id": "CVE-2022-47629", + "id": "CVE-2022-48303", "name": "OsPackageVulnerability", "shortDescription": { - "text": "libksba: integer overflow to code execution" + "text": "tar: heap buffer overflow at from_header() in list.c via specially crafted checksum" }, "fullDescription": { - "text": "Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser." - }, - "defaultConfiguration": { - "level": "error" - }, - "helpUri": "https://avd.aquasec.com/nvd/cve-2022-47629", - "help": { - "text": "Vulnerability CVE-2022-47629\nSeverity: HIGH\nPackage: libksba\nFixed Version: 1.3.5-9.el8_7\nLink: [CVE-2022-47629](https://avd.aquasec.com/nvd/cve-2022-47629)\nLibksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.", - "markdown": "**Vulnerability CVE-2022-47629**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|HIGH|libksba|1.3.5-9.el8_7|[CVE-2022-47629](https://avd.aquasec.com/nvd/cve-2022-47629)|\n\nLibksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser." - }, - "properties": { - "precision": "very-high", - "security-severity": "8.0", - "tags": [ - "vulnerability", - "security", - "HIGH" - ] - } - }, - { - "id": "CVE-2021-46848", - "name": "OsPackageVulnerability", - "shortDescription": { - "text": "libtasn1: Out-of-bound access in ETYPE_OK" - }, - "fullDescription": { - "text": "GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der." + "text": "GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters." }, "defaultConfiguration": { "level": "warning" }, - "helpUri": "https://avd.aquasec.com/nvd/cve-2021-46848", + "helpUri": "https://avd.aquasec.com/nvd/cve-2022-48303", "help": { - "text": "Vulnerability CVE-2021-46848\nSeverity: MEDIUM\nPackage: libtasn1\nFixed Version: 4.13-4.el8_7\nLink: [CVE-2021-46848](https://avd.aquasec.com/nvd/cve-2021-46848)\nGNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.", - "markdown": "**Vulnerability CVE-2021-46848**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|libtasn1|4.13-4.el8_7|[CVE-2021-46848](https://avd.aquasec.com/nvd/cve-2021-46848)|\n\nGNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der." - }, - "properties": { - "precision": "very-high", - "security-severity": "5.5", - "tags": [ - "vulnerability", - "security", - "MEDIUM" - ] - } - }, - { - "id": "CVE-2022-40303", - "name": "OsPackageVulnerability", - "shortDescription": { - "text": "libxml2: integer overflows with XML_PARSE_HUGE" - }, - "fullDescription": { - "text": "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault." - }, - "defaultConfiguration": { - "level": "warning" - }, - "helpUri": "https://avd.aquasec.com/nvd/cve-2022-40303", - "help": { - "text": "Vulnerability CVE-2022-40303\nSeverity: MEDIUM\nPackage: libxml2\nFixed Version: 2.9.7-15.el8_7.1\nLink: [CVE-2022-40303](https://avd.aquasec.com/nvd/cve-2022-40303)\nAn issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.", - "markdown": "**Vulnerability CVE-2022-40303**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|libxml2|2.9.7-15.el8_7.1|[CVE-2022-40303](https://avd.aquasec.com/nvd/cve-2022-40303)|\n\nAn issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault." - }, - "properties": { - "precision": "very-high", - "security-severity": "5.5", - "tags": [ - "vulnerability", - "security", - "MEDIUM" - ] - } - }, - { - "id": "CVE-2022-40304", - "name": "OsPackageVulnerability", - "shortDescription": { - "text": "libxml2: dict corruption caused by entity reference cycles" - }, - "fullDescription": { - "text": "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked." - }, - "defaultConfiguration": { - "level": "warning" - }, - "helpUri": "https://avd.aquasec.com/nvd/cve-2022-40304", - "help": { - "text": "Vulnerability CVE-2022-40304\nSeverity: MEDIUM\nPackage: libxml2\nFixed Version: 2.9.7-15.el8_7.1\nLink: [CVE-2022-40304](https://avd.aquasec.com/nvd/cve-2022-40304)\nAn issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.", - "markdown": "**Vulnerability CVE-2022-40304**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|libxml2|2.9.7-15.el8_7.1|[CVE-2022-40304](https://avd.aquasec.com/nvd/cve-2022-40304)|\n\nAn issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked." - }, - "properties": { - "precision": "very-high", - "security-severity": "5.5", - "tags": [ - "vulnerability", - "security", - "MEDIUM" - ] - } - }, - { - "id": "CVE-2022-35737", - "name": "OsPackageVulnerability", - "shortDescription": { - "text": "sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API" - }, - "fullDescription": { - "text": "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API." - }, - "defaultConfiguration": { - "level": "warning" - }, - "helpUri": "https://avd.aquasec.com/nvd/cve-2022-35737", - "help": { - "text": "Vulnerability CVE-2022-35737\nSeverity: MEDIUM\nPackage: sqlite-libs\nFixed Version: 3.26.0-17.el8_7\nLink: [CVE-2022-35737](https://avd.aquasec.com/nvd/cve-2022-35737)\nSQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.", - "markdown": "**Vulnerability CVE-2022-35737**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|sqlite-libs|3.26.0-17.el8_7|[CVE-2022-35737](https://avd.aquasec.com/nvd/cve-2022-35737)|\n\nSQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API." + "text": "Vulnerability CVE-2022-48303\nSeverity: MEDIUM\nPackage: tar\nFixed Version: 2:1.30-6.el8_7.1\nLink: [CVE-2022-48303](https://avd.aquasec.com/nvd/cve-2022-48303)\nGNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.", + "markdown": "**Vulnerability CVE-2022-48303**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|MEDIUM|tar|2:1.30-6.el8_7.1|[CVE-2022-48303](https://avd.aquasec.com/nvd/cve-2022-48303)|\n\nGNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters." }, "properties": { "precision": "very-high", @@ -258,11 +150,11 @@ }, "results": [ { - "ruleId": "CVE-2022-42010", + "ruleId": "CVE-2020-10735", "ruleIndex": 0, "level": "warning", "message": { - "text": "Package: dbus\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42010\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42010](https://avd.aquasec.com/nvd/cve-2022-42010)" + "text": "Package: platform-python\nInstalled Version: 3.6.8-48.el8_7.rocky.0\nVulnerability CVE-2020-10735\nSeverity: MEDIUM\nFixed Version: 3.6.8-48.el8_7.1.rocky.0\nLink: [CVE-2020-10735](https://avd.aquasec.com/nvd/cve-2020-10735)" }, "locations": [ { @@ -279,17 +171,17 @@ } }, "message": { - "text": "rockylinux/rockylinux: dbus@1:1.12.8-23.el8" + "text": "rockylinux/rockylinux: platform-python@3.6.8-48.el8_7.rocky.0" } } ] }, { - "ruleId": "CVE-2022-42011", + "ruleId": "CVE-2021-28861", "ruleIndex": 1, "level": "warning", "message": { - "text": "Package: dbus\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42011\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42011](https://avd.aquasec.com/nvd/cve-2022-42011)" + "text": "Package: platform-python\nInstalled Version: 3.6.8-48.el8_7.rocky.0\nVulnerability CVE-2021-28861\nSeverity: MEDIUM\nFixed Version: 3.6.8-48.el8_7.1.rocky.0\nLink: [CVE-2021-28861](https://avd.aquasec.com/nvd/cve-2021-28861)" }, "locations": [ { @@ -306,17 +198,17 @@ } }, "message": { - "text": "rockylinux/rockylinux: dbus@1:1.12.8-23.el8" + "text": "rockylinux/rockylinux: platform-python@3.6.8-48.el8_7.rocky.0" } } ] }, { - "ruleId": "CVE-2022-42012", + "ruleId": "CVE-2022-45061", "ruleIndex": 2, "level": "warning", "message": { - "text": "Package: dbus\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42012\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42012](https://avd.aquasec.com/nvd/cve-2022-42012)" + "text": "Package: platform-python\nInstalled Version: 3.6.8-48.el8_7.rocky.0\nVulnerability CVE-2022-45061\nSeverity: MEDIUM\nFixed Version: 3.6.8-48.el8_7.1.rocky.0\nLink: [CVE-2022-45061](https://avd.aquasec.com/nvd/cve-2022-45061)" }, "locations": [ { @@ -333,17 +225,17 @@ } }, "message": { - "text": "rockylinux/rockylinux: dbus@1:1.12.8-23.el8" + "text": "rockylinux/rockylinux: platform-python@3.6.8-48.el8_7.rocky.0" } } ] }, { - "ruleId": "CVE-2022-42010", + "ruleId": "CVE-2020-10735", "ruleIndex": 0, "level": "warning", "message": { - "text": "Package: dbus-daemon\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42010\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42010](https://avd.aquasec.com/nvd/cve-2022-42010)" + "text": "Package: python3-libs\nInstalled Version: 3.6.8-48.el8_7.rocky.0\nVulnerability CVE-2020-10735\nSeverity: MEDIUM\nFixed Version: 3.6.8-48.el8_7.1.rocky.0\nLink: [CVE-2020-10735](https://avd.aquasec.com/nvd/cve-2020-10735)" }, "locations": [ { @@ -360,17 +252,17 @@ } }, "message": { - "text": "rockylinux/rockylinux: dbus-daemon@1:1.12.8-23.el8" + "text": "rockylinux/rockylinux: python3-libs@3.6.8-48.el8_7.rocky.0" } } ] }, { - "ruleId": "CVE-2022-42011", + "ruleId": "CVE-2021-28861", "ruleIndex": 1, "level": "warning", "message": { - "text": "Package: dbus-daemon\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42011\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42011](https://avd.aquasec.com/nvd/cve-2022-42011)" + "text": "Package: python3-libs\nInstalled Version: 3.6.8-48.el8_7.rocky.0\nVulnerability CVE-2021-28861\nSeverity: MEDIUM\nFixed Version: 3.6.8-48.el8_7.1.rocky.0\nLink: [CVE-2021-28861](https://avd.aquasec.com/nvd/cve-2021-28861)" }, "locations": [ { @@ -387,17 +279,17 @@ } }, "message": { - "text": "rockylinux/rockylinux: dbus-daemon@1:1.12.8-23.el8" + "text": "rockylinux/rockylinux: python3-libs@3.6.8-48.el8_7.rocky.0" } } ] }, { - "ruleId": "CVE-2022-42012", + "ruleId": "CVE-2022-45061", "ruleIndex": 2, "level": "warning", "message": { - "text": "Package: dbus-daemon\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42012\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42012](https://avd.aquasec.com/nvd/cve-2022-42012)" + "text": "Package: python3-libs\nInstalled Version: 3.6.8-48.el8_7.rocky.0\nVulnerability CVE-2022-45061\nSeverity: MEDIUM\nFixed Version: 3.6.8-48.el8_7.1.rocky.0\nLink: [CVE-2022-45061](https://avd.aquasec.com/nvd/cve-2022-45061)" }, "locations": [ { @@ -414,179 +306,17 @@ } }, "message": { - "text": "rockylinux/rockylinux: dbus-daemon@1:1.12.8-23.el8" + "text": "rockylinux/rockylinux: python3-libs@3.6.8-48.el8_7.rocky.0" } } ] }, { - "ruleId": "CVE-2022-42010", - "ruleIndex": 0, - "level": "warning", - "message": { - "text": "Package: dbus-libs\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42010\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42010](https://avd.aquasec.com/nvd/cve-2022-42010)" - }, - "locations": [ - { - "physicalLocation": { - "artifactLocation": { - "uri": "rockylinux/rockylinux", - "uriBaseId": "ROOTPATH" - }, - "region": { - "startLine": 1, - "startColumn": 1, - "endLine": 1, - "endColumn": 1 - } - }, - "message": { - "text": "rockylinux/rockylinux: dbus-libs@1:1.12.8-23.el8" - } - } - ] - }, - { - "ruleId": "CVE-2022-42011", - "ruleIndex": 1, - "level": "warning", - "message": { - "text": "Package: dbus-libs\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42011\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42011](https://avd.aquasec.com/nvd/cve-2022-42011)" - }, - "locations": [ - { - "physicalLocation": { - "artifactLocation": { - "uri": "rockylinux/rockylinux", - "uriBaseId": "ROOTPATH" - }, - "region": { - "startLine": 1, - "startColumn": 1, - "endLine": 1, - "endColumn": 1 - } - }, - "message": { - "text": "rockylinux/rockylinux: dbus-libs@1:1.12.8-23.el8" - } - } - ] - }, - { - "ruleId": "CVE-2022-42012", - "ruleIndex": 2, - "level": "warning", - "message": { - "text": "Package: dbus-libs\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42012\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42012](https://avd.aquasec.com/nvd/cve-2022-42012)" - }, - "locations": [ - { - "physicalLocation": { - "artifactLocation": { - "uri": "rockylinux/rockylinux", - "uriBaseId": "ROOTPATH" - }, - "region": { - "startLine": 1, - "startColumn": 1, - "endLine": 1, - "endColumn": 1 - } - }, - "message": { - "text": "rockylinux/rockylinux: dbus-libs@1:1.12.8-23.el8" - } - } - ] - }, - { - "ruleId": "CVE-2022-42010", - "ruleIndex": 0, - "level": "warning", - "message": { - "text": "Package: dbus-tools\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42010\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42010](https://avd.aquasec.com/nvd/cve-2022-42010)" - }, - "locations": [ - { - "physicalLocation": { - "artifactLocation": { - "uri": "rockylinux/rockylinux", - "uriBaseId": "ROOTPATH" - }, - "region": { - "startLine": 1, - "startColumn": 1, - "endLine": 1, - "endColumn": 1 - } - }, - "message": { - "text": "rockylinux/rockylinux: dbus-tools@1:1.12.8-23.el8" - } - } - ] - }, - { - "ruleId": "CVE-2022-42011", - "ruleIndex": 1, - "level": "warning", - "message": { - "text": "Package: dbus-tools\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42011\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42011](https://avd.aquasec.com/nvd/cve-2022-42011)" - }, - "locations": [ - { - "physicalLocation": { - "artifactLocation": { - "uri": "rockylinux/rockylinux", - "uriBaseId": "ROOTPATH" - }, - "region": { - "startLine": 1, - "startColumn": 1, - "endLine": 1, - "endColumn": 1 - } - }, - "message": { - "text": "rockylinux/rockylinux: dbus-tools@1:1.12.8-23.el8" - } - } - ] - }, - { - "ruleId": "CVE-2022-42012", - "ruleIndex": 2, - "level": "warning", - "message": { - "text": "Package: dbus-tools\nInstalled Version: 1:1.12.8-23.el8\nVulnerability CVE-2022-42012\nSeverity: MEDIUM\nFixed Version: 1:1.12.8-23.el8_7.1\nLink: [CVE-2022-42012](https://avd.aquasec.com/nvd/cve-2022-42012)" - }, - "locations": [ - { - "physicalLocation": { - "artifactLocation": { - "uri": "rockylinux/rockylinux", - "uriBaseId": "ROOTPATH" - }, - "region": { - "startLine": 1, - "startColumn": 1, - "endLine": 1, - "endColumn": 1 - } - }, - "message": { - "text": "rockylinux/rockylinux: dbus-tools@1:1.12.8-23.el8" - } - } - ] - }, - { - "ruleId": "CVE-2022-43680", + "ruleId": "CVE-2022-4415", "ruleIndex": 3, "level": "warning", "message": { - "text": "Package: expat\nInstalled Version: 2.2.5-10.el8\nVulnerability CVE-2022-43680\nSeverity: MEDIUM\nFixed Version: 2.2.5-10.el8_7.1\nLink: [CVE-2022-43680](https://avd.aquasec.com/nvd/cve-2022-43680)" + "text": "Package: systemd\nInstalled Version: 239-68.el8_7.2\nVulnerability CVE-2022-4415\nSeverity: MEDIUM\nFixed Version: 239-68.el8_7.4\nLink: [CVE-2022-4415](https://avd.aquasec.com/nvd/cve-2022-4415)" }, "locations": [ { @@ -603,44 +333,71 @@ } }, "message": { - "text": "rockylinux/rockylinux: expat@2.2.5-10.el8" + "text": "rockylinux/rockylinux: systemd@239-68.el8_7.2" } } ] }, { - "ruleId": "CVE-2022-47629", + "ruleId": "CVE-2022-4415", + "ruleIndex": 3, + "level": "warning", + "message": { + "text": "Package: systemd-libs\nInstalled Version: 239-68.el8_7.2\nVulnerability CVE-2022-4415\nSeverity: MEDIUM\nFixed Version: 239-68.el8_7.4\nLink: [CVE-2022-4415](https://avd.aquasec.com/nvd/cve-2022-4415)" + }, + "locations": [ + { + "physicalLocation": { + "artifactLocation": { + "uri": "rockylinux/rockylinux", + "uriBaseId": "ROOTPATH" + }, + "region": { + "startLine": 1, + "startColumn": 1, + "endLine": 1, + "endColumn": 1 + } + }, + "message": { + "text": "rockylinux/rockylinux: systemd-libs@239-68.el8_7.2" + } + } + ] + }, + { + "ruleId": "CVE-2022-4415", + "ruleIndex": 3, + "level": "warning", + "message": { + "text": "Package: systemd-pam\nInstalled Version: 239-68.el8_7.2\nVulnerability CVE-2022-4415\nSeverity: MEDIUM\nFixed Version: 239-68.el8_7.4\nLink: [CVE-2022-4415](https://avd.aquasec.com/nvd/cve-2022-4415)" + }, + "locations": [ + { + "physicalLocation": { + "artifactLocation": { + "uri": "rockylinux/rockylinux", + "uriBaseId": "ROOTPATH" + }, + "region": { + "startLine": 1, + "startColumn": 1, + "endLine": 1, + "endColumn": 1 + } + }, + "message": { + "text": "rockylinux/rockylinux: systemd-pam@239-68.el8_7.2" + } + } + ] + }, + { + "ruleId": "CVE-2022-48303", "ruleIndex": 4, - "level": "error", - "message": { - "text": "Package: libksba\nInstalled Version: 1.3.5-8.el8_6\nVulnerability CVE-2022-47629\nSeverity: HIGH\nFixed Version: 1.3.5-9.el8_7\nLink: [CVE-2022-47629](https://avd.aquasec.com/nvd/cve-2022-47629)" - }, - "locations": [ - { - "physicalLocation": { - "artifactLocation": { - "uri": "rockylinux/rockylinux", - "uriBaseId": "ROOTPATH" - }, - "region": { - "startLine": 1, - "startColumn": 1, - "endLine": 1, - "endColumn": 1 - } - }, - "message": { - "text": "rockylinux/rockylinux: libksba@1.3.5-8.el8_6" - } - } - ] - }, - { - "ruleId": "CVE-2021-46848", - "ruleIndex": 5, "level": "warning", "message": { - "text": "Package: libtasn1\nInstalled Version: 4.13-3.el8\nVulnerability CVE-2021-46848\nSeverity: MEDIUM\nFixed Version: 4.13-4.el8_7\nLink: [CVE-2021-46848](https://avd.aquasec.com/nvd/cve-2021-46848)" + "text": "Package: tar\nInstalled Version: 2:1.30-6.el8\nVulnerability CVE-2022-48303\nSeverity: MEDIUM\nFixed Version: 2:1.30-6.el8_7.1\nLink: [CVE-2022-48303](https://avd.aquasec.com/nvd/cve-2022-48303)" }, "locations": [ { @@ -657,88 +414,7 @@ } }, "message": { - "text": "rockylinux/rockylinux: libtasn1@4.13-3.el8" - } - } - ] - }, - { - "ruleId": "CVE-2022-40303", - "ruleIndex": 6, - "level": "warning", - "message": { - "text": "Package: libxml2\nInstalled Version: 2.9.7-15.el8\nVulnerability CVE-2022-40303\nSeverity: MEDIUM\nFixed Version: 2.9.7-15.el8_7.1\nLink: [CVE-2022-40303](https://avd.aquasec.com/nvd/cve-2022-40303)" - }, - "locations": [ - { - "physicalLocation": { - "artifactLocation": { - "uri": "rockylinux/rockylinux", - "uriBaseId": "ROOTPATH" - }, - "region": { - "startLine": 1, - "startColumn": 1, - "endLine": 1, - "endColumn": 1 - } - }, - "message": { - "text": "rockylinux/rockylinux: libxml2@2.9.7-15.el8" - } - } - ] - }, - { - "ruleId": "CVE-2022-40304", - "ruleIndex": 7, - "level": "warning", - "message": { - "text": "Package: libxml2\nInstalled Version: 2.9.7-15.el8\nVulnerability CVE-2022-40304\nSeverity: MEDIUM\nFixed Version: 2.9.7-15.el8_7.1\nLink: [CVE-2022-40304](https://avd.aquasec.com/nvd/cve-2022-40304)" - }, - "locations": [ - { - "physicalLocation": { - "artifactLocation": { - "uri": "rockylinux/rockylinux", - "uriBaseId": "ROOTPATH" - }, - "region": { - "startLine": 1, - "startColumn": 1, - "endLine": 1, - "endColumn": 1 - } - }, - "message": { - "text": "rockylinux/rockylinux: libxml2@2.9.7-15.el8" - } - } - ] - }, - { - "ruleId": "CVE-2022-35737", - "ruleIndex": 8, - "level": "warning", - "message": { - "text": "Package: sqlite-libs\nInstalled Version: 3.26.0-16.el8_6\nVulnerability CVE-2022-35737\nSeverity: MEDIUM\nFixed Version: 3.26.0-17.el8_7\nLink: [CVE-2022-35737](https://avd.aquasec.com/nvd/cve-2022-35737)" - }, - "locations": [ - { - "physicalLocation": { - "artifactLocation": { - "uri": "rockylinux/rockylinux", - "uriBaseId": "ROOTPATH" - }, - "region": { - "startLine": 1, - "startColumn": 1, - "endLine": 1, - "endColumn": 1 - } - }, - "message": { - "text": "rockylinux/rockylinux: sqlite-libs@3.26.0-16.el8_6" + "text": "rockylinux/rockylinux: tar@2:1.30-6.el8" } } ]
rocky
Links
dbusCVE-2022-42010platform-pythonCVE-2020-10735 MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.13.6.8-48.el8_7.rocky.03.6.8-48.el8_7.1.rocky.0
dbusCVE-2022-42011platform-pythonCVE-2021-28861 MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.13.6.8-48.el8_7.rocky.03.6.8-48.el8_7.1.rocky.0
dbusCVE-2022-42012platform-pythonCVE-2022-45061 MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.13.6.8-48.el8_7.rocky.03.6.8-48.el8_7.1.rocky.0
dbus-daemonCVE-2022-42010python3-libsCVE-2020-10735 MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.13.6.8-48.el8_7.rocky.03.6.8-48.el8_7.1.rocky.0
dbus-daemonCVE-2022-42011python3-libsCVE-2021-28861 MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.13.6.8-48.el8_7.rocky.03.6.8-48.el8_7.1.rocky.0
dbus-daemonCVE-2022-42012python3-libsCVE-2022-45061 MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.13.6.8-48.el8_7.rocky.03.6.8-48.el8_7.1.rocky.0
dbus-libsCVE-2022-42010systemdCVE-2022-4415 MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.1239-68.el8_7.2239-68.el8_7.4
dbus-libsCVE-2022-42011systemd-libsCVE-2022-4415 MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.1239-68.el8_7.2239-68.el8_7.4
dbus-libsCVE-2022-42012systemd-pamCVE-2022-4415 MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.1239-68.el8_7.2239-68.el8_7.4
dbus-toolsCVE-2022-42010tarCVE-2022-48303 MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.12:1.30-6.el82:1.30-6.el8_7.1
dbus-toolsCVE-2022-42011MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.1
dbus-toolsCVE-2022-42012MEDIUM1:1.12.8-23.el81:1.12.8-23.el8_7.1
expatCVE-2022-43680MEDIUM2.2.5-10.el82.2.5-10.el8_7.1
libksbaCVE-2022-47629HIGH1.3.5-8.el8_61.3.5-9.el8_7
libtasn1CVE-2021-46848MEDIUM4.13-3.el84.13-4.el8_7
libxml2CVE-2022-40303MEDIUM2.9.7-15.el82.9.7-15.el8_7.1
libxml2CVE-2022-40304MEDIUM2.9.7-15.el82.9.7-15.el8_7.1
sqlite-libsCVE-2022-35737MEDIUM3.26.0-16.el8_63.26.0-17.el8_7
No Misconfigurations found