Vulnerabilities

18 via 38 paths

Dependencies

144

Source

Group 6 Copy Created with Sketch. Docker

Target OS

ubuntu:21.04
Test your Docker Hub image against our market leading vulnerability database Sign up for free
Severity
  • 5
  • 13
Status
  • 18
  • 0
  • 0

medium severity

Out-of-bounds Read

  • Vulnerable module: sqlite3/libsqlite3-0
  • Introduced through: sqlite3/libsqlite3-0@3.34.1-3

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl sqlite3/libsqlite3-0@3.34.1-3

NVD Description

Note: Versions mentioned in the description apply only to the upstream sqlite3 package and not the sqlite3 package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. A malicious application may cause a denial of service or potentially disclose memory contents.

Remediation

There is no fixed version for Ubuntu:21.04 sqlite3.

References

medium severity

Improper Verification of Cryptographic Signature

medium severity

NULL Pointer Dereference

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.33-0ubuntu5 and glibc/libc6@2.33-0ubuntu5

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl glibc/libc-bin@2.33-0ubuntu5
  • Introduced through: buildpack-deps@21.04-curl glibc/libc6@2.33-0ubuntu5

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.

Remediation

There is no fixed version for Ubuntu:21.04 glibc.

References

medium severity

NULL Pointer Dereference

  • Vulnerable module: krb5/krb5-locales
  • Introduced through: krb5/krb5-locales@1.18.3-4, krb5/libgssapi-krb5-2@1.18.3-4 and others

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl krb5/krb5-locales@1.18.3-4
  • Introduced through: buildpack-deps@21.04-curl krb5/libgssapi-krb5-2@1.18.3-4
  • Introduced through: buildpack-deps@21.04-curl krb5/libk5crypto3@1.18.3-4
  • Introduced through: buildpack-deps@21.04-curl krb5/libkrb5-3@1.18.3-4
  • Introduced through: buildpack-deps@21.04-curl krb5/libkrb5support0@1.18.3-4

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.

Remediation

There is no fixed version for Ubuntu:21.04 krb5.

References

medium severity

Open Redirect

  • Vulnerable module: wget
  • Introduced through: wget@1.21-1ubuntu3

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl wget@1.21-1ubuntu3

NVD Description

Note: Versions mentioned in the description apply only to the upstream wget package and not the wget package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.

Remediation

There is no fixed version for Ubuntu:21.04 wget.

References

low severity

Use After Free

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.33-0ubuntu5 and glibc/libc6@2.33-0ubuntu5

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl glibc/libc-bin@2.33-0ubuntu5
  • Introduced through: buildpack-deps@21.04-curl glibc/libc6@2.33-0ubuntu5

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.

Remediation

There is no fixed version for Ubuntu:21.04 glibc.

References

low severity

Integer Overflow or Wraparound

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.33-0ubuntu5 and glibc/libc6@2.33-0ubuntu5

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl glibc/libc-bin@2.33-0ubuntu5
  • Introduced through: buildpack-deps@21.04-curl glibc/libc6@2.33-0ubuntu5

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

Remediation

There is no fixed version for Ubuntu:21.04 glibc.

References

low severity

Integer Overflow or Wraparound

  • Vulnerable module: gmp/libgmp10
  • Introduced through: gmp/libgmp10@2:6.2.1+dfsg-1ubuntu2

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl gmp/libgmp10@2:6.2.1+dfsg-1ubuntu2

NVD Description

Note: Versions mentioned in the description apply only to the upstream gmp package and not the gmp package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.

Remediation

There is no fixed version for Ubuntu:21.04 gmp.

References

low severity

Integer Overflow or Wraparound

  • Vulnerable module: krb5/krb5-locales
  • Introduced through: krb5/krb5-locales@1.18.3-4, krb5/libgssapi-krb5-2@1.18.3-4 and others

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl krb5/krb5-locales@1.18.3-4
  • Introduced through: buildpack-deps@21.04-curl krb5/libgssapi-krb5-2@1.18.3-4
  • Introduced through: buildpack-deps@21.04-curl krb5/libk5crypto3@1.18.3-4
  • Introduced through: buildpack-deps@21.04-curl krb5/libkrb5-3@1.18.3-4
  • Introduced through: buildpack-deps@21.04-curl krb5/libkrb5support0@1.18.3-4

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

Remediation

There is no fixed version for Ubuntu:21.04 krb5.

References

low severity

Out-of-bounds Read

  • Vulnerable module: pcre3/libpcre3
  • Introduced through: pcre3/libpcre3@2:8.39-13build3

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl pcre3/libpcre3@2:8.39-13build3

NVD Description

Note: Versions mentioned in the description apply only to the upstream pcre3 package and not the pcre3 package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.

Remediation

There is no fixed version for Ubuntu:21.04 pcre3.

References

low severity

Uncontrolled Recursion

  • Vulnerable module: pcre3/libpcre3
  • Introduced through: pcre3/libpcre3@2:8.39-13build3

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl pcre3/libpcre3@2:8.39-13build3

NVD Description

Note: Versions mentioned in the description apply only to the upstream pcre3 package and not the pcre3 package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.

Remediation

There is no fixed version for Ubuntu:21.04 pcre3.

References

low severity

CVE-2020-9991

  • Vulnerable module: sqlite3/libsqlite3-0
  • Introduced through: sqlite3/libsqlite3-0@3.34.1-3

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl sqlite3/libsqlite3-0@3.34.1-3

NVD Description

Note: Versions mentioned in the description apply only to the upstream sqlite3 package and not the sqlite3 package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, iOS 14.0 and iPadOS 14.0, iCloud for Windows 7.21, tvOS 14.0. A remote attacker may be able to cause a denial of service.

Remediation

There is no fixed version for Ubuntu:21.04 sqlite3.

References

low severity

NULL Pointer Dereference

  • Vulnerable module: tar
  • Introduced through: tar@1.34+dfsg-1build1

low severity

Improper Input Validation

  • Vulnerable module: coreutils
  • Introduced through: coreutils@8.32-4ubuntu2

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl coreutils@8.32-4ubuntu2

NVD Description

Note: Versions mentioned in the description apply only to the upstream coreutils package and not the coreutils package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

Remediation

There is no fixed version for Ubuntu:21.04 coreutils.

References

low severity

NULL Pointer Dereference

  • Vulnerable module: heimdal/libasn1-8-heimdal
  • Introduced through: heimdal/libasn1-8-heimdal@7.7.0+dfsg-2, heimdal/libgssapi3-heimdal@7.7.0+dfsg-2 and others

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl heimdal/libasn1-8-heimdal@7.7.0+dfsg-2
  • Introduced through: buildpack-deps@21.04-curl heimdal/libgssapi3-heimdal@7.7.0+dfsg-2
  • Introduced through: buildpack-deps@21.04-curl heimdal/libhcrypto4-heimdal@7.7.0+dfsg-2
  • Introduced through: buildpack-deps@21.04-curl heimdal/libheimbase1-heimdal@7.7.0+dfsg-2
  • Introduced through: buildpack-deps@21.04-curl heimdal/libheimntlm0-heimdal@7.7.0+dfsg-2
  • Introduced through: buildpack-deps@21.04-curl heimdal/libhx509-5-heimdal@7.7.0+dfsg-2
  • Introduced through: buildpack-deps@21.04-curl heimdal/libkrb5-26-heimdal@7.7.0+dfsg-2
  • Introduced through: buildpack-deps@21.04-curl heimdal/libroken18-heimdal@7.7.0+dfsg-2
  • Introduced through: buildpack-deps@21.04-curl heimdal/libwind0-heimdal@7.7.0+dfsg-2

NVD Description

Note: Versions mentioned in the description apply only to the upstream heimdal package and not the heimdal package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.

Remediation

There is no fixed version for Ubuntu:21.04 heimdal.

References

low severity

Information Exposure

  • Vulnerable module: sqlite3/libsqlite3-0
  • Introduced through: sqlite3/libsqlite3-0@3.34.1-3

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl sqlite3/libsqlite3-0@3.34.1-3

NVD Description

Note: Versions mentioned in the description apply only to the upstream sqlite3 package and not the sqlite3 package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

An information disclosure issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0. A remote attacker may be able to leak memory.

Remediation

There is no fixed version for Ubuntu:21.04 sqlite3.

References

low severity

CVE-2018-1000654

  • Vulnerable module: libtasn1-6
  • Introduced through: libtasn1-6@4.16.0-2

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl libtasn1-6@4.16.0-2

NVD Description

Note: Versions mentioned in the description apply only to the upstream libtasn1-6 package and not the libtasn1-6 package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.

Remediation

There is no fixed version for Ubuntu:21.04 libtasn1-6.

References

low severity

Time-of-check Time-of-use (TOCTOU)

  • Vulnerable module: shadow/login
  • Introduced through: shadow/login@1:4.8.1-1ubuntu8.1 and shadow/passwd@1:4.8.1-1ubuntu8.1

Detailed paths

  • Introduced through: buildpack-deps@21.04-curl shadow/login@1:4.8.1-1ubuntu8.1
  • Introduced through: buildpack-deps@21.04-curl shadow/passwd@1:4.8.1-1ubuntu8.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream shadow package and not the shadow package as distributed by Ubuntu. See How to fix? for Ubuntu:21.04 relevant fixed versions and status.

shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees

Remediation

There is no fixed version for Ubuntu:21.04 shadow.

References