Docker alpine:3.11.12
Vulnerabilities |
11 via 21 paths |
---|---|
Dependencies |
14 |
Source |
Docker |
Target OS |
alpine:3.11.12 |
critical severity
- Vulnerable module: zlib/zlib
- Introduced through: zlib/zlib@1.2.11-r3
- Fixed in: 1.2.11-r4
Detailed paths
-
Introduced through: alpine@3.11.12 › zlib/zlib@1.2.11-r3
NVD Description
Note: Versions mentioned in the description apply only to the upstream zlib
package and not the zlib
package as distributed by Alpine
.
See How to fix?
for Alpine:3.11
relevant fixed versions and status.
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
Remediation
Upgrade Alpine:3.11
zlib
to version 1.2.11-r4 or higher.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/
- http://seclists.org/fulldisclosure/2022/Oct/37
- http://seclists.org/fulldisclosure/2022/Oct/38
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/42
- http://www.openwall.com/lists/oss-security/2022/08/05/2
- http://www.openwall.com/lists/oss-security/2022/08/09/1
- https://github.com/curl/curl/issues/9271
- https://github.com/ivd38/zlib_overflow
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/
- https://security.netapp.com/advisory/ntap-20220901-0005/
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213494
- https://www.debian.org/security/2022/dsa-5218
high severity
- Vulnerable module: busybox/busybox
- Introduced through: busybox/busybox@1.31.1-r10 and busybox/ssl_client@1.31.1-r10
- Fixed in: 1.31.1-r11
Detailed paths
-
Introduced through: alpine@3.11.12 › busybox/busybox@1.31.1-r10
-
Introduced through: alpine@3.11.12 › busybox/ssl_client@1.31.1-r10
NVD Description
Note: Versions mentioned in the description apply only to the upstream busybox
package and not the busybox
package as distributed by Alpine
.
See How to fix?
for Alpine:3.11
relevant fixed versions and status.
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function
Remediation
Upgrade Alpine:3.11
busybox
to version 1.31.1-r11 or higher.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
- https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://security.netapp.com/advisory/ntap-20211223-0002/
high severity
- Vulnerable module: busybox/busybox
- Introduced through: busybox/busybox@1.31.1-r10 and busybox/ssl_client@1.31.1-r10
- Fixed in: 1.31.1-r11
Detailed paths
-
Introduced through: alpine@3.11.12 › busybox/busybox@1.31.1-r10
-
Introduced through: alpine@3.11.12 › busybox/ssl_client@1.31.1-r10
NVD Description
Note: Versions mentioned in the description apply only to the upstream busybox
package and not the busybox
package as distributed by Alpine
.
See How to fix?
for Alpine:3.11
relevant fixed versions and status.
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function
Remediation
Upgrade Alpine:3.11
busybox
to version 1.31.1-r11 or higher.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
- https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://security.netapp.com/advisory/ntap-20211223-0002/
high severity
- Vulnerable module: busybox/busybox
- Introduced through: busybox/busybox@1.31.1-r10 and busybox/ssl_client@1.31.1-r10
- Fixed in: 1.31.1-r11
Detailed paths
-
Introduced through: alpine@3.11.12 › busybox/busybox@1.31.1-r10
-
Introduced through: alpine@3.11.12 › busybox/ssl_client@1.31.1-r10
NVD Description
Note: Versions mentioned in the description apply only to the upstream busybox
package and not the busybox
package as distributed by Alpine
.
See How to fix?
for Alpine:3.11
relevant fixed versions and status.
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function
Remediation
Upgrade Alpine:3.11
busybox
to version 1.31.1-r11 or higher.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
- https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://security.netapp.com/advisory/ntap-20211223-0002/
high severity
- Vulnerable module: busybox/busybox
- Introduced through: busybox/busybox@1.31.1-r10 and busybox/ssl_client@1.31.1-r10
- Fixed in: 1.31.1-r11
Detailed paths
-
Introduced through: alpine@3.11.12 › busybox/busybox@1.31.1-r10
-
Introduced through: alpine@3.11.12 › busybox/ssl_client@1.31.1-r10
NVD Description
Note: Versions mentioned in the description apply only to the upstream busybox
package and not the busybox
package as distributed by Alpine
.
See How to fix?
for Alpine:3.11
relevant fixed versions and status.
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function
Remediation
Upgrade Alpine:3.11
busybox
to version 1.31.1-r11 or higher.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
- https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://security.netapp.com/advisory/ntap-20211223-0002/
high severity
- Vulnerable module: busybox/busybox
- Introduced through: busybox/busybox@1.31.1-r10 and busybox/ssl_client@1.31.1-r10
- Fixed in: 1.31.1-r11
Detailed paths
-
Introduced through: alpine@3.11.12 › busybox/busybox@1.31.1-r10
-
Introduced through: alpine@3.11.12 › busybox/ssl_client@1.31.1-r10
NVD Description
Note: Versions mentioned in the description apply only to the upstream busybox
package and not the busybox
package as distributed by Alpine
.
See How to fix?
for Alpine:3.11
relevant fixed versions and status.
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function
Remediation
Upgrade Alpine:3.11
busybox
to version 1.31.1-r11 or higher.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
- https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://security.netapp.com/advisory/ntap-20211223-0002/
high severity
- Vulnerable module: busybox/busybox
- Introduced through: busybox/busybox@1.31.1-r10 and busybox/ssl_client@1.31.1-r10
- Fixed in: 1.31.1-r11
Detailed paths
-
Introduced through: alpine@3.11.12 › busybox/busybox@1.31.1-r10
-
Introduced through: alpine@3.11.12 › busybox/ssl_client@1.31.1-r10
NVD Description
Note: Versions mentioned in the description apply only to the upstream busybox
package and not the busybox
package as distributed by Alpine
.
See How to fix?
for Alpine:3.11
relevant fixed versions and status.
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function
Remediation
Upgrade Alpine:3.11
busybox
to version 1.31.1-r11 or higher.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
- https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://security.netapp.com/advisory/ntap-20211223-0002/
high severity
- Vulnerable module: busybox/busybox
- Introduced through: busybox/busybox@1.31.1-r10 and busybox/ssl_client@1.31.1-r10
- Fixed in: 1.31.1-r11
Detailed paths
-
Introduced through: alpine@3.11.12 › busybox/busybox@1.31.1-r10
-
Introduced through: alpine@3.11.12 › busybox/ssl_client@1.31.1-r10
NVD Description
Note: Versions mentioned in the description apply only to the upstream busybox
package and not the busybox
package as distributed by Alpine
.
See How to fix?
for Alpine:3.11
relevant fixed versions and status.
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function
Remediation
Upgrade Alpine:3.11
busybox
to version 1.31.1-r11 or higher.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
- https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://security.netapp.com/advisory/ntap-20211223-0002/
high severity
- Vulnerable module: busybox/busybox
- Introduced through: busybox/busybox@1.31.1-r10 and busybox/ssl_client@1.31.1-r10
- Fixed in: 1.31.1-r11
Detailed paths
-
Introduced through: alpine@3.11.12 › busybox/busybox@1.31.1-r10
-
Introduced through: alpine@3.11.12 › busybox/ssl_client@1.31.1-r10
NVD Description
Note: Versions mentioned in the description apply only to the upstream busybox
package and not the busybox
package as distributed by Alpine
.
See How to fix?
for Alpine:3.11
relevant fixed versions and status.
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function
Remediation
Upgrade Alpine:3.11
busybox
to version 1.31.1-r11 or higher.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
- https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://security.netapp.com/advisory/ntap-20211223-0002/
high severity
- Vulnerable module: busybox/busybox
- Introduced through: busybox/busybox@1.31.1-r10 and busybox/ssl_client@1.31.1-r10
- Fixed in: 1.31.1-r11
Detailed paths
-
Introduced through: alpine@3.11.12 › busybox/busybox@1.31.1-r10
-
Introduced through: alpine@3.11.12 › busybox/ssl_client@1.31.1-r10
NVD Description
Note: Versions mentioned in the description apply only to the upstream busybox
package and not the busybox
package as distributed by Alpine
.
See How to fix?
for Alpine:3.11
relevant fixed versions and status.
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function
Remediation
Upgrade Alpine:3.11
busybox
to version 1.31.1-r11 or higher.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
- https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://security.netapp.com/advisory/ntap-20211223-0002/
medium severity
- Vulnerable module: busybox/busybox
- Introduced through: busybox/busybox@1.31.1-r10 and busybox/ssl_client@1.31.1-r10
- Fixed in: 1.31.1-r11
Detailed paths
-
Introduced through: alpine@3.11.12 › busybox/busybox@1.31.1-r10
-
Introduced through: alpine@3.11.12 › busybox/ssl_client@1.31.1-r10
NVD Description
Note: Versions mentioned in the description apply only to the upstream busybox
package and not the busybox
package as distributed by Alpine
.
See How to fix?
for Alpine:3.11
relevant fixed versions and status.
An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that
Remediation
Upgrade Alpine:3.11
busybox
to version 1.31.1-r11 or higher.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
- https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://security.netapp.com/advisory/ntap-20211223-0002/