Vulnerabilities

43 via 102 paths

Dependencies

136

Source

Group 6 Copy Created with Sketch. Docker

Target OS

ubuntu:18.04
Test your Docker Hub image against our market leading vulnerability database Sign up for free
Severity
  • 18
  • 25
Status
  • 43
  • 0
  • 0

medium severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: nghttp2/libnghttp2-14
  • Introduced through: nghttp2/libnghttp2-14@1.30.0-1ubuntu1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl nghttp2/libnghttp2-14@1.30.0-1ubuntu1

NVD Description

Note: Versions mentioned in the description apply only to the upstream nghttp2 package and not the nghttp2 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

Remediation

There is no fixed version for Ubuntu:18.04 nghttp2.

References

medium severity

CVE-2019-9513

  • Vulnerable module: nghttp2/libnghttp2-14
  • Introduced through: nghttp2/libnghttp2-14@1.30.0-1ubuntu1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl nghttp2/libnghttp2-14@1.30.0-1ubuntu1

NVD Description

Note: Versions mentioned in the description apply only to the upstream nghttp2 package and not the nghttp2 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

Remediation

There is no fixed version for Ubuntu:18.04 nghttp2.

References

medium severity

Improper Enforcement of Message or Data Structure

  • Vulnerable module: nghttp2/libnghttp2-14
  • Introduced through: nghttp2/libnghttp2-14@1.30.0-1ubuntu1
  • Fixed in: 1.30.0-1ubuntu1+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl nghttp2/libnghttp2-14@1.30.0-1ubuntu1

NVD Description

Note: Versions mentioned in the description apply only to the upstream nghttp2 package and not the nghttp2 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

Remediation

Upgrade Ubuntu:18.04 nghttp2 to version 1.30.0-1ubuntu1+esm1 or higher.

References

medium severity

Out-of-Bounds

  • Vulnerable module: sqlite3/libsqlite3-0
  • Introduced through: sqlite3/libsqlite3-0@3.22.0-1ubuntu0.7

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl sqlite3/libsqlite3-0@3.22.0-1ubuntu0.7

NVD Description

Note: Versions mentioned in the description apply only to the upstream sqlite3 package and not the sqlite3 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.

Remediation

There is no fixed version for Ubuntu:18.04 sqlite3.

References

medium severity

CVE-2023-46218

  • Vulnerable module: curl
  • Introduced through: curl@7.58.0-2ubuntu3.24 and curl/libcurl4@7.58.0-2ubuntu3.24
  • Fixed in: 7.58.0-2ubuntu3.24+esm3

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl curl@7.58.0-2ubuntu3.24
  • Introduced through: buildpack-deps@18.04-curl curl/libcurl4@7.58.0-2ubuntu3.24

NVD Description

Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains.

It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with domain=co.UK when the URL used a lower case hostname curl.co.uk, even though co.uk is listed as a PSL domain.

Remediation

Upgrade Ubuntu:18.04 curl to version 7.58.0-2ubuntu3.24+esm3 or higher.

References

medium severity

Access of Uninitialized Pointer

  • Vulnerable module: krb5/libgssapi-krb5-2
  • Introduced through: krb5/libgssapi-krb5-2@1.16-2ubuntu0.4, krb5/libk5crypto3@1.16-2ubuntu0.4 and others
  • Fixed in: 1.16-2ubuntu0.4+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl krb5/libgssapi-krb5-2@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libk5crypto3@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libkrb5-3@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libkrb5support0@1.16-2ubuntu0.4

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.

Remediation

Upgrade Ubuntu:18.04 krb5 to version 1.16-2ubuntu0.4+esm1 or higher.

References

medium severity

Out-of-bounds Write

  • Vulnerable module: ncurses/libncurses5
  • Introduced through: ncurses/libncurses5@6.1-1ubuntu1.18.04.1, ncurses/libncursesw5@6.1-1ubuntu1.18.04.1 and others
  • Fixed in: 6.1-1ubuntu1.18.04.1+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl ncurses/libncurses5@6.1-1ubuntu1.18.04.1
  • Introduced through: buildpack-deps@18.04-curl ncurses/libncursesw5@6.1-1ubuntu1.18.04.1
  • Introduced through: buildpack-deps@18.04-curl ncurses/libtinfo5@6.1-1ubuntu1.18.04.1
  • Introduced through: buildpack-deps@18.04-curl ncurses/ncurses-base@6.1-1ubuntu1.18.04.1
  • Introduced through: buildpack-deps@18.04-curl ncurses/ncurses-bin@6.1-1ubuntu1.18.04.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.

Remediation

Upgrade Ubuntu:18.04 ncurses to version 6.1-1ubuntu1.18.04.1+esm1 or higher.

References

medium severity

Open Redirect

  • Vulnerable module: wget
  • Introduced through: wget@1.19.4-1ubuntu2.2

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl wget@1.19.4-1ubuntu2.2

NVD Description

Note: Versions mentioned in the description apply only to the upstream wget package and not the wget package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.

Remediation

There is no fixed version for Ubuntu:18.04 wget.

References

medium severity

Information Exposure

  • Vulnerable module: gnutls28/libgnutls30
  • Introduced through: gnutls28/libgnutls30@3.5.18-1ubuntu1.6
  • Fixed in: 3.5.18-1ubuntu1.6+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl gnutls28/libgnutls30@3.5.18-1ubuntu1.6

NVD Description

Note: Versions mentioned in the description apply only to the upstream gnutls28 package and not the gnutls28 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

Remediation

Upgrade Ubuntu:18.04 gnutls28 to version 3.5.18-1ubuntu1.6+esm1 or higher.

References

medium severity

Information Exposure

  • Vulnerable module: gcc-8/gcc-8-base
  • Introduced through: gcc-8/gcc-8-base@8.4.0-1ubuntu1~18.04, gcc-8/libgcc1@1:8.4.0-1ubuntu1~18.04 and others

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl gcc-8/gcc-8-base@8.4.0-1ubuntu1~18.04
  • Introduced through: buildpack-deps@18.04-curl gcc-8/libgcc1@1:8.4.0-1ubuntu1~18.04
  • Introduced through: buildpack-deps@18.04-curl gcc-8/libstdc++6@8.4.0-1ubuntu1~18.04

NVD Description

Note: Versions mentioned in the description apply only to the upstream gcc-8 package and not the gcc-8 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."

Remediation

There is no fixed version for Ubuntu:18.04 gcc-8.

References

medium severity
new

CVE-2024-22365

  • Vulnerable module: pam/libpam-modules
  • Introduced through: pam/libpam-modules@1.1.8-3.6ubuntu2.18.04.6, pam/libpam-modules-bin@1.1.8-3.6ubuntu2.18.04.6 and others
  • Fixed in: 1.1.8-3.6ubuntu2.18.04.6+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl pam/libpam-modules@1.1.8-3.6ubuntu2.18.04.6
  • Introduced through: buildpack-deps@18.04-curl pam/libpam-modules-bin@1.1.8-3.6ubuntu2.18.04.6
  • Introduced through: buildpack-deps@18.04-curl pam/libpam-runtime@1.1.8-3.6ubuntu2.18.04.6
  • Introduced through: buildpack-deps@18.04-curl pam/libpam0g@1.1.8-3.6ubuntu2.18.04.6

NVD Description

Note: Versions mentioned in the description apply only to the upstream pam package and not the pam package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.

Remediation

Upgrade Ubuntu:18.04 pam to version 1.1.8-3.6ubuntu2.18.04.6+esm1 or higher.

References

medium severity

CVE-2020-22916

  • Vulnerable module: xz-utils/liblzma5
  • Introduced through: xz-utils/liblzma5@5.2.2-1.3ubuntu0.1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl xz-utils/liblzma5@5.2.2-1.3ubuntu0.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream xz-utils package and not the xz-utils package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

An issue discovered in XZ 5.2.5 allows attackers to cause a denial of service via decompression of a crafted file. NOTE: the vendor disputes the claims of "endless output" and "denial of service" because decompression of the 17,486 bytes always results in 114,881,179 bytes, which is often a reasonable size increase.

Remediation

There is no fixed version for Ubuntu:18.04 xz-utils.

References

medium severity
new

CVE-2024-2398

  • Vulnerable module: curl
  • Introduced through: curl@7.58.0-2ubuntu3.24 and curl/libcurl4@7.58.0-2ubuntu3.24
  • Fixed in: 7.58.0-2ubuntu3.24+esm4

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl curl@7.58.0-2ubuntu3.24
  • Introduced through: buildpack-deps@18.04-curl curl/libcurl4@7.58.0-2ubuntu3.24

NVD Description

Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.

Remediation

Upgrade Ubuntu:18.04 curl to version 7.58.0-2ubuntu3.24+esm4 or higher.

References

medium severity

CVE-2024-26458

  • Vulnerable module: krb5/libgssapi-krb5-2
  • Introduced through: krb5/libgssapi-krb5-2@1.16-2ubuntu0.4, krb5/libk5crypto3@1.16-2ubuntu0.4 and others

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl krb5/libgssapi-krb5-2@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libk5crypto3@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libkrb5-3@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libkrb5support0@1.16-2ubuntu0.4

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.

Remediation

There is no fixed version for Ubuntu:18.04 krb5.

References

medium severity

CVE-2024-26461

  • Vulnerable module: krb5/libgssapi-krb5-2
  • Introduced through: krb5/libgssapi-krb5-2@1.16-2ubuntu0.4, krb5/libk5crypto3@1.16-2ubuntu0.4 and others

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl krb5/libgssapi-krb5-2@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libk5crypto3@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libkrb5-3@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libkrb5support0@1.16-2ubuntu0.4

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.

Remediation

There is no fixed version for Ubuntu:18.04 krb5.

References

medium severity

CVE-2024-26462

  • Vulnerable module: krb5/libgssapi-krb5-2
  • Introduced through: krb5/libgssapi-krb5-2@1.16-2ubuntu0.4, krb5/libk5crypto3@1.16-2ubuntu0.4 and others

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl krb5/libgssapi-krb5-2@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libk5crypto3@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libkrb5-3@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libkrb5support0@1.16-2ubuntu0.4

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.

Remediation

There is no fixed version for Ubuntu:18.04 krb5.

References

medium severity

Information Exposure

  • Vulnerable module: libgcrypt20
  • Introduced through: libgcrypt20@1.8.1-4ubuntu1.3

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl libgcrypt20@1.8.1-4ubuntu1.3

NVD Description

Note: Versions mentioned in the description apply only to the upstream libgcrypt20 package and not the libgcrypt20 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.

Remediation

There is no fixed version for Ubuntu:18.04 libgcrypt20.

References

medium severity

CVE-2023-39804

  • Vulnerable module: tar
  • Introduced through: tar@1.29b-2ubuntu0.4
  • Fixed in: 1.29b-2ubuntu0.4+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl tar@1.29b-2ubuntu0.4

NVD Description

Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.

Remediation

Upgrade Ubuntu:18.04 tar to version 1.29b-2ubuntu0.4+esm1 or higher.

References

low severity

Use After Free

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.27-3ubuntu1.6 and glibc/libc6@2.27-3ubuntu1.6

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl glibc/libc-bin@2.27-3ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl glibc/libc6@2.27-3ubuntu1.6

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.

Remediation

There is no fixed version for Ubuntu:18.04 glibc.

References

low severity

CVE-2023-26604

  • Vulnerable module: systemd/libsystemd0
  • Introduced through: systemd/libsystemd0@237-3ubuntu10.57 and systemd/libudev1@237-3ubuntu10.57

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl systemd/libsystemd0@237-3ubuntu10.57
  • Introduced through: buildpack-deps@18.04-curl systemd/libudev1@237-3ubuntu10.57

NVD Description

Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.

Remediation

There is no fixed version for Ubuntu:18.04 systemd.

References

low severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.27-3ubuntu1.6 and glibc/libc6@2.27-3ubuntu1.6

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl glibc/libc-bin@2.27-3ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl glibc/libc6@2.27-3ubuntu1.6

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

Remediation

There is no fixed version for Ubuntu:18.04 glibc.

References

low severity

Improper Data Handling

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.27-3ubuntu1.6 and glibc/libc6@2.27-3ubuntu1.6

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl glibc/libc-bin@2.27-3ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl glibc/libc6@2.27-3ubuntu1.6

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.

Remediation

There is no fixed version for Ubuntu:18.04 glibc.

References

low severity

Integer Overflow or Wraparound

  • Vulnerable module: krb5/libgssapi-krb5-2
  • Introduced through: krb5/libgssapi-krb5-2@1.16-2ubuntu0.4, krb5/libk5crypto3@1.16-2ubuntu0.4 and others

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl krb5/libgssapi-krb5-2@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libk5crypto3@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libkrb5-3@1.16-2ubuntu0.4
  • Introduced through: buildpack-deps@18.04-curl krb5/libkrb5support0@1.16-2ubuntu0.4

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

Remediation

There is no fixed version for Ubuntu:18.04 krb5.

References

low severity

NULL Pointer Dereference

  • Vulnerable module: openldap/libldap-2.4-2
  • Introduced through: openldap/libldap-2.4-2@2.4.45+dfsg-1ubuntu1.11 and openldap/libldap-common@2.4.45+dfsg-1ubuntu1.11
  • Fixed in: 2.4.45+dfsg-1ubuntu1.11+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl openldap/libldap-2.4-2@2.4.45+dfsg-1ubuntu1.11
  • Introduced through: buildpack-deps@18.04-curl openldap/libldap-common@2.4.45+dfsg-1ubuntu1.11

NVD Description

Note: Versions mentioned in the description apply only to the upstream openldap package and not the openldap package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.

Remediation

Upgrade Ubuntu:18.04 openldap to version 2.4.45+dfsg-1ubuntu1.11+esm1 or higher.

References

low severity

Uncontrolled Recursion

  • Vulnerable module: pcre3/libpcre3
  • Introduced through: pcre3/libpcre3@2:8.39-9ubuntu0.1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl pcre3/libpcre3@2:8.39-9ubuntu0.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream pcre3 package and not the pcre3 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.

Remediation

There is no fixed version for Ubuntu:18.04 pcre3.

References

low severity

Improper Input Validation

  • Vulnerable module: coreutils
  • Introduced through: coreutils@8.28-1ubuntu1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl coreutils@8.28-1ubuntu1

NVD Description

Note: Versions mentioned in the description apply only to the upstream coreutils package and not the coreutils package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

Remediation

There is no fixed version for Ubuntu:18.04 coreutils.

References

low severity

CVE-2023-50495

  • Vulnerable module: ncurses/libncurses5
  • Introduced through: ncurses/libncurses5@6.1-1ubuntu1.18.04.1, ncurses/libncursesw5@6.1-1ubuntu1.18.04.1 and others
  • Fixed in: 6.1-1ubuntu1.18.04.1+esm2

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl ncurses/libncurses5@6.1-1ubuntu1.18.04.1
  • Introduced through: buildpack-deps@18.04-curl ncurses/libncursesw5@6.1-1ubuntu1.18.04.1
  • Introduced through: buildpack-deps@18.04-curl ncurses/libtinfo5@6.1-1ubuntu1.18.04.1
  • Introduced through: buildpack-deps@18.04-curl ncurses/ncurses-base@6.1-1ubuntu1.18.04.1
  • Introduced through: buildpack-deps@18.04-curl ncurses/ncurses-bin@6.1-1ubuntu1.18.04.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().

Remediation

Upgrade Ubuntu:18.04 ncurses to version 6.1-1ubuntu1.18.04.1+esm2 or higher.

References

low severity

Improper Certificate Validation

  • Vulnerable module: curl
  • Introduced through: curl@7.58.0-2ubuntu3.24 and curl/libcurl4@7.58.0-2ubuntu3.24
  • Fixed in: 7.58.0-2ubuntu3.24+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl curl@7.58.0-2ubuntu3.24
  • Introduced through: buildpack-deps@18.04-curl curl/libcurl4@7.58.0-2ubuntu3.24

NVD Description

Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with xn-- and should not be allowed to pattern match, but the wildcard check in curl could still check for x*, which would match even though the IDN name most likely contained nothing even resembling an x.

Remediation

Upgrade Ubuntu:18.04 curl to version 7.58.0-2ubuntu3.24+esm1 or higher.

References

low severity

Improper Data Handling

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.27-3ubuntu1.6 and glibc/libc6@2.27-3ubuntu1.6

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl glibc/libc-bin@2.27-3ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl glibc/libc6@2.27-3ubuntu1.6

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.

Remediation

There is no fixed version for Ubuntu:18.04 glibc.

References

low severity

Use After Free

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.27-3ubuntu1.6 and glibc/libc6@2.27-3ubuntu1.6
  • Fixed in: 2.27-3ubuntu1.6+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl glibc/libc-bin@2.27-3ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl glibc/libc6@2.27-3ubuntu1.6

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

Remediation

Upgrade Ubuntu:18.04 glibc to version 2.27-3ubuntu1.6+esm1 or higher.

References

low severity

Use After Free

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.27-3ubuntu1.6 and glibc/libc6@2.27-3ubuntu1.6
  • Fixed in: 2.27-3ubuntu1.6+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl glibc/libc-bin@2.27-3ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl glibc/libc6@2.27-3ubuntu1.6

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the nss_gethostbyname2_r and nss_getcanonname_r hooks without implementing the nss*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

Remediation

Upgrade Ubuntu:18.04 glibc to version 2.27-3ubuntu1.6+esm1 or higher.

References

low severity

Information Exposure

  • Vulnerable module: gnutls28/libgnutls30
  • Introduced through: gnutls28/libgnutls30@3.5.18-1ubuntu1.6

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl gnutls28/libgnutls30@3.5.18-1ubuntu1.6

NVD Description

Note: Versions mentioned in the description apply only to the upstream gnutls28 package and not the gnutls28 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

Remediation

There is no fixed version for Ubuntu:18.04 gnutls28.

References

low severity

CVE-2024-0727

  • Vulnerable module: openssl
  • Introduced through: openssl@1.1.1-1ubuntu2.1~18.04.23 and openssl/libssl1.1@1.1.1-1ubuntu2.1~18.04.23
  • Fixed in: 1.1.1-1ubuntu2.1~18.04.23+esm4

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl openssl@1.1.1-1ubuntu2.1~18.04.23
  • Introduced through: buildpack-deps@18.04-curl openssl/libssl1.1@1.1.1-1ubuntu2.1~18.04.23

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack

Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly.

A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue.

OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass().

We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant.

The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.

Remediation

Upgrade Ubuntu:18.04 openssl to version 1.1.1-1ubuntu2.1~18.04.23+esm4 or higher.

References

low severity

Improper Authentication

  • Vulnerable module: shadow/login
  • Introduced through: shadow/login@1:4.5-1ubuntu2.5 and shadow/passwd@1:4.5-1ubuntu2.5
  • Fixed in: 1:4.5-1ubuntu2.5+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl shadow/login@1:4.5-1ubuntu2.5
  • Introduced through: buildpack-deps@18.04-curl shadow/passwd@1:4.5-1ubuntu2.5

NVD Description

Note: Versions mentioned in the description apply only to the upstream shadow package and not the shadow package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.

Remediation

Upgrade Ubuntu:18.04 shadow to version 1:4.5-1ubuntu2.5+esm1 or higher.

References

low severity

Excessive Iteration

  • Vulnerable module: openssl
  • Introduced through: openssl@1.1.1-1ubuntu2.1~18.04.23 and openssl/libssl1.1@1.1.1-1ubuntu2.1~18.04.23
  • Fixed in: 1.1.1-1ubuntu2.1~18.04.23+esm3

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl openssl@1.1.1-1ubuntu2.1~18.04.23
  • Introduced through: buildpack-deps@18.04-curl openssl/libssl1.1@1.1.1-1ubuntu2.1~18.04.23

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p.

An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Remediation

Upgrade Ubuntu:18.04 openssl to version 1.1.1-1ubuntu2.1~18.04.23+esm3 or higher.

References

low severity

Improper Check for Unusual or Exceptional Conditions

  • Vulnerable module: openssl
  • Introduced through: openssl@1.1.1-1ubuntu2.1~18.04.23 and openssl/libssl1.1@1.1.1-1ubuntu2.1~18.04.23
  • Fixed in: 1.1.1-1ubuntu2.1~18.04.23+esm4

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl openssl@1.1.1-1ubuntu2.1~18.04.23
  • Introduced through: buildpack-deps@18.04-curl openssl/libssl1.1@1.1.1-1ubuntu2.1~18.04.23

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.

While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters.

Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q.

An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.

DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().

Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Remediation

Upgrade Ubuntu:18.04 openssl to version 1.1.1-1ubuntu2.1~18.04.23+esm4 or higher.

References

low severity

Inefficient Regular Expression Complexity

  • Vulnerable module: openssl
  • Introduced through: openssl@1.1.1-1ubuntu2.1~18.04.23 and openssl/libssl1.1@1.1.1-1ubuntu2.1~18.04.23
  • Fixed in: 1.1.1-1ubuntu2.1~18.04.23+esm3

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl openssl@1.1.1-1ubuntu2.1~18.04.23
  • Introduced through: buildpack-deps@18.04-curl openssl/libssl1.1@1.1.1-1ubuntu2.1~18.04.23

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length.

However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large.

An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option.

The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Remediation

Upgrade Ubuntu:18.04 openssl to version 1.1.1-1ubuntu2.1~18.04.23+esm3 or higher.

References

low severity

Time-of-check Time-of-use (TOCTOU)

  • Vulnerable module: shadow/login
  • Introduced through: shadow/login@1:4.5-1ubuntu2.5 and shadow/passwd@1:4.5-1ubuntu2.5

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl shadow/login@1:4.5-1ubuntu2.5
  • Introduced through: buildpack-deps@18.04-curl shadow/passwd@1:4.5-1ubuntu2.5

NVD Description

Note: Versions mentioned in the description apply only to the upstream shadow package and not the shadow package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees

Remediation

There is no fixed version for Ubuntu:18.04 shadow.

References

low severity

CVE-2023-28322

  • Vulnerable module: curl
  • Introduced through: curl@7.58.0-2ubuntu3.24 and curl/libcurl4@7.58.0-2ubuntu3.24
  • Fixed in: 7.58.0-2ubuntu3.24+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl curl@7.58.0-2ubuntu3.24
  • Introduced through: buildpack-deps@18.04-curl curl/libcurl4@7.58.0-2ubuntu3.24

NVD Description

Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set, if the same handle previously wasused to issue a PUT request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

Remediation

Upgrade Ubuntu:18.04 curl to version 7.58.0-2ubuntu3.24+esm1 or higher.

References

low severity

CVE-2023-38546

  • Vulnerable module: curl
  • Introduced through: curl@7.58.0-2ubuntu3.24 and curl/libcurl4@7.58.0-2ubuntu3.24
  • Fixed in: 7.58.0-2ubuntu3.24+esm2

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl curl@7.58.0-2ubuntu3.24
  • Introduced through: buildpack-deps@18.04-curl curl/libcurl4@7.58.0-2ubuntu3.24

NVD Description

Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met.

libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers.

libcurl provides a function call that duplicates en easy handle called curl_easy_duphandle.

If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as none (using the four ASCII letters, no quotes).

Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named none - if such a file exists and is readable in the current directory of the program using libcurl. And if using the correct file format of course.

Remediation

Upgrade Ubuntu:18.04 curl to version 7.58.0-2ubuntu3.24+esm2 or higher.

References

low severity

Out-of-bounds Write

  • Vulnerable module: gnupg2/dirmngr
  • Introduced through: gnupg2/dirmngr@2.2.4-1ubuntu1.6, gnupg2/gnupg@2.2.4-1ubuntu1.6 and others

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl gnupg2/dirmngr@2.2.4-1ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl gnupg2/gnupg@2.2.4-1ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl gnupg2/gnupg-l10n@2.2.4-1ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl gnupg2/gnupg-utils@2.2.4-1ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl gnupg2/gpg@2.2.4-1ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl gnupg2/gpg-agent@2.2.4-1ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl gnupg2/gpg-wks-client@2.2.4-1ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl gnupg2/gpg-wks-server@2.2.4-1ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl gnupg2/gpgconf@2.2.4-1ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl gnupg2/gpgsm@2.2.4-1ubuntu1.6
  • Introduced through: buildpack-deps@18.04-curl gnupg2/gpgv@2.2.4-1ubuntu1.6

NVD Description

Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.

Remediation

There is no fixed version for Ubuntu:18.04 gnupg2.

References

low severity

Out-of-bounds Write

  • Vulnerable module: procps
  • Introduced through: procps@2:3.3.12-3ubuntu1.2 and procps/libprocps6@2:3.3.12-3ubuntu1.2
  • Fixed in: 2:3.3.12-3ubuntu1.2+esm1

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl procps@2:3.3.12-3ubuntu1.2
  • Introduced through: buildpack-deps@18.04-curl procps/libprocps6@2:3.3.12-3ubuntu1.2

NVD Description

Note: Versions mentioned in the description apply only to the upstream procps package and not the procps package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.

Remediation

Upgrade Ubuntu:18.04 procps to version 2:3.3.12-3ubuntu1.2+esm1 or higher.

References

low severity

Arbitrary Code Injection

  • Vulnerable module: shadow/login
  • Introduced through: shadow/login@1:4.5-1ubuntu2.5 and shadow/passwd@1:4.5-1ubuntu2.5

Detailed paths

  • Introduced through: buildpack-deps@18.04-curl shadow/login@1:4.5-1ubuntu2.5
  • Introduced through: buildpack-deps@18.04-curl shadow/passwd@1:4.5-1ubuntu2.5

NVD Description

Note: Versions mentioned in the description apply only to the upstream shadow package and not the shadow package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

Remediation

There is no fixed version for Ubuntu:18.04 shadow.

References