Vulnerabilities

55 via 126 paths

Dependencies

401

Source

Group 6 Copy Created with Sketch. Docker

Target OS

ubuntu:22.04
Test your Docker Hub image against our market leading vulnerability database Sign up for free
Severity
  • 1
  • 24
  • 30
Status
  • 55
  • 0
  • 0

high severity

Out-of-bounds Write

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1
  • Fixed in: 2.35-0ubuntu3.4

Detailed paths

  • Introduced through: concourse/concourse@ubuntu glibc/libc-bin@2.35-0ubuntu3.1
  • Introduced through: concourse/concourse@ubuntu glibc/libc6@2.35-0ubuntu3.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

Remediation

Upgrade Ubuntu:22.04 glibc to version 2.35-0ubuntu3.4 or higher.

References

medium severity

Improper Certificate Validation

  • Vulnerable module: perl/perl-base
  • Introduced through: perl/perl-base@5.34.0-3ubuntu1.1
  • Fixed in: 5.34.0-3ubuntu1.2

Detailed paths

  • Introduced through: concourse/concourse@ubuntu perl/perl-base@5.34.0-3ubuntu1.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream perl package and not the perl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.

Remediation

Upgrade Ubuntu:22.04 perl to version 5.34.0-3ubuntu1.2 or higher.

References

medium severity

Out-of-bounds Write

  • Vulnerable module: bash
  • Introduced through: bash@5.1-6ubuntu1
  • Fixed in: 5.1-6ubuntu1.1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu bash@5.1-6ubuntu1

NVD Description

Note: Versions mentioned in the description apply only to the upstream bash package and not the bash package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.

Remediation

Upgrade Ubuntu:22.04 bash to version 5.1-6ubuntu1.1 or higher.

References

medium severity

Integer Overflow or Wraparound

  • Vulnerable module: libcap2
  • Introduced through: libcap2@1:2.44-1build3, libcap2/libcap2-bin@1:2.44-1build3 and others
  • Fixed in: 1:2.44-1ubuntu0.22.04.1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu libcap2@1:2.44-1build3
  • Introduced through: concourse/concourse@ubuntu libcap2/libcap2-bin@1:2.44-1build3
  • Introduced through: concourse/concourse@ubuntu libcap2/libpam-cap@1:2.44-1build3

NVD Description

Note: Versions mentioned in the description apply only to the upstream libcap2 package and not the libcap2 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.

Remediation

Upgrade Ubuntu:22.04 libcap2 to version 1:2.44-1ubuntu0.22.04.1 or higher.

References

medium severity

Out-of-bounds Write

  • Vulnerable module: ncurses/libncurses6
  • Introduced through: ncurses/libncurses6@6.3-2, ncurses/libncursesw6@6.3-2 and others
  • Fixed in: 6.3-2ubuntu0.1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu ncurses/libncurses6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/libncursesw6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/libtinfo6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/ncurses-base@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/ncurses-bin@6.3-2

NVD Description

Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.

Remediation

Upgrade Ubuntu:22.04 ncurses to version 6.3-2ubuntu0.1 or higher.

References

medium severity

Out-of-bounds Write

  • Vulnerable module: perl/perl-base
  • Introduced through: perl/perl-base@5.34.0-3ubuntu1.1
  • Fixed in: 5.34.0-3ubuntu1.3

Detailed paths

  • Introduced through: concourse/concourse@ubuntu perl/perl-base@5.34.0-3ubuntu1.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream perl package and not the perl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A vulnerability was found in perl. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.

Remediation

Upgrade Ubuntu:22.04 perl to version 5.34.0-3ubuntu1.3 or higher.

References

medium severity

Memory Leak

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1
  • Fixed in: 2.35-0ubuntu3.5

Detailed paths

  • Introduced through: concourse/concourse@ubuntu glibc/libc-bin@2.35-0ubuntu3.1
  • Introduced through: concourse/concourse@ubuntu glibc/libc6@2.35-0ubuntu3.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.

Remediation

Upgrade Ubuntu:22.04 glibc to version 2.35-0ubuntu3.5 or higher.

References

medium severity

Improper Verification of Cryptographic Signature

  • Vulnerable module: gnutls28/libgnutls30
  • Introduced through: gnutls28/libgnutls30@3.7.3-4ubuntu1.2
  • Fixed in: 3.7.3-4ubuntu1.4

Detailed paths

  • Introduced through: concourse/concourse@ubuntu gnutls28/libgnutls30@3.7.3-4ubuntu1.2

NVD Description

Note: Versions mentioned in the description apply only to the upstream gnutls28 package and not the gnutls28 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.

Remediation

Upgrade Ubuntu:22.04 gnutls28 to version 3.7.3-4ubuntu1.4 or higher.

References

medium severity

Information Exposure

  • Vulnerable module: gnutls28/libgnutls30
  • Introduced through: gnutls28/libgnutls30@3.7.3-4ubuntu1.2
  • Fixed in: 3.7.3-4ubuntu1.4

Detailed paths

  • Introduced through: concourse/concourse@ubuntu gnutls28/libgnutls30@3.7.3-4ubuntu1.2

NVD Description

Note: Versions mentioned in the description apply only to the upstream gnutls28 package and not the gnutls28 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.

Remediation

Upgrade Ubuntu:22.04 gnutls28 to version 3.7.3-4ubuntu1.4 or higher.

References

medium severity

CVE-2023-5363

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.12

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers.

Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes.

When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB.

For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse.

Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical.

Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary.

OpenSSL 3.1 and 3.0 are vulnerable to this issue.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.12 or higher.

References

medium severity

Access of Uninitialized Pointer

  • Vulnerable module: krb5/libgssapi-krb5-2
  • Introduced through: krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1, krb5/libk5crypto3@1.19.2-2ubuntu0.1 and others
  • Fixed in: 1.19.2-2ubuntu0.3

Detailed paths

  • Introduced through: concourse/concourse@ubuntu krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libk5crypto3@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libkrb5-3@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libkrb5support0@1.19.2-2ubuntu0.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.

Remediation

Upgrade Ubuntu:22.04 krb5 to version 1.19.2-2ubuntu0.3 or higher.

References

medium severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.10

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow.

Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service.

An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods.

When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(n^2) with 'n' being the size of the sub-identifiers in bytes (*).

With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms.

Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data.

Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low.

In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature.

The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer's certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication.

In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.10 or higher.

References

medium severity

Information Exposure

  • Vulnerable module: gnutls28/libgnutls30
  • Introduced through: gnutls28/libgnutls30@3.7.3-4ubuntu1.2
  • Fixed in: 3.7.3-4ubuntu1.3

Detailed paths

  • Introduced through: concourse/concourse@ubuntu gnutls28/libgnutls30@3.7.3-4ubuntu1.2

NVD Description

Note: Versions mentioned in the description apply only to the upstream gnutls28 package and not the gnutls28 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

Remediation

Upgrade Ubuntu:22.04 gnutls28 to version 3.7.3-4ubuntu1.3 or higher.

References

medium severity

Out-of-bounds Read

  • Vulnerable module: file
  • Introduced through: file@1:5.41-3, file/libmagic-mgc@1:5.41-3 and others
  • Fixed in: 1:5.41-3ubuntu0.1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu file@1:5.41-3
  • Introduced through: concourse/concourse@ubuntu file/libmagic-mgc@1:5.41-3
  • Introduced through: concourse/concourse@ubuntu file/libmagic1@1:5.41-3

NVD Description

Note: Versions mentioned in the description apply only to the upstream file package and not the file package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.

Remediation

Upgrade Ubuntu:22.04 file to version 1:5.41-3ubuntu0.1 or higher.

References

medium severity

CVE-2024-22365

  • Vulnerable module: pam/libpam-modules
  • Introduced through: pam/libpam-modules@1.4.0-11ubuntu2.3, pam/libpam-modules-bin@1.4.0-11ubuntu2.3 and others
  • Fixed in: 1.4.0-11ubuntu2.4

Detailed paths

  • Introduced through: concourse/concourse@ubuntu pam/libpam-modules@1.4.0-11ubuntu2.3
  • Introduced through: concourse/concourse@ubuntu pam/libpam-modules-bin@1.4.0-11ubuntu2.3
  • Introduced through: concourse/concourse@ubuntu pam/libpam-runtime@1.4.0-11ubuntu2.3
  • Introduced through: concourse/concourse@ubuntu pam/libpam0g@1.4.0-11ubuntu2.3

NVD Description

Note: Versions mentioned in the description apply only to the upstream pam package and not the pam package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.

Remediation

Upgrade Ubuntu:22.04 pam to version 1.4.0-11ubuntu2.4 or higher.

References

medium severity

CVE-2020-22916

  • Vulnerable module: xz-utils/liblzma5
  • Introduced through: xz-utils/liblzma5@5.2.5-2ubuntu1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu xz-utils/liblzma5@5.2.5-2ubuntu1

NVD Description

Note: Versions mentioned in the description apply only to the upstream xz-utils package and not the xz-utils package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

An issue discovered in XZ 5.2.5 allows attackers to cause a denial of service via decompression of a crafted file. NOTE: the vendor disputes the claims of "endless output" and "denial of service" because decompression of the 17,486 bytes always results in 114,881,179 bytes, which is often a reasonable size increase.

Remediation

There is no fixed version for Ubuntu:22.04 xz-utils.

References

medium severity
new

CVE-2024-2961

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1
  • Fixed in: 2.35-0ubuntu3.7

Detailed paths

  • Introduced through: concourse/concourse@ubuntu glibc/libc-bin@2.35-0ubuntu3.1
  • Introduced through: concourse/concourse@ubuntu glibc/libc6@2.35-0ubuntu3.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.

Remediation

Upgrade Ubuntu:22.04 glibc to version 2.35-0ubuntu3.7 or higher.

References

medium severity

Information Exposure

  • Vulnerable module: gnutls28/libgnutls30
  • Introduced through: gnutls28/libgnutls30@3.7.3-4ubuntu1.2
  • Fixed in: 3.7.3-4ubuntu1.5

Detailed paths

  • Introduced through: concourse/concourse@ubuntu gnutls28/libgnutls30@3.7.3-4ubuntu1.2

NVD Description

Note: Versions mentioned in the description apply only to the upstream gnutls28 package and not the gnutls28 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.

Remediation

Upgrade Ubuntu:22.04 gnutls28 to version 3.7.3-4ubuntu1.5 or higher.

References

medium severity

Uncaught Exception

  • Vulnerable module: gnutls28/libgnutls30
  • Introduced through: gnutls28/libgnutls30@3.7.3-4ubuntu1.2
  • Fixed in: 3.7.3-4ubuntu1.5

Detailed paths

  • Introduced through: concourse/concourse@ubuntu gnutls28/libgnutls30@3.7.3-4ubuntu1.2

NVD Description

Note: Versions mentioned in the description apply only to the upstream gnutls28 package and not the gnutls28 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.

Remediation

Upgrade Ubuntu:22.04 gnutls28 to version 3.7.3-4ubuntu1.5 or higher.

References

medium severity

CVE-2024-26458

  • Vulnerable module: krb5/libgssapi-krb5-2
  • Introduced through: krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1, krb5/libk5crypto3@1.19.2-2ubuntu0.1 and others

Detailed paths

  • Introduced through: concourse/concourse@ubuntu krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libk5crypto3@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libkrb5-3@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libkrb5support0@1.19.2-2ubuntu0.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.

Remediation

There is no fixed version for Ubuntu:22.04 krb5.

References

medium severity

CVE-2024-26461

  • Vulnerable module: krb5/libgssapi-krb5-2
  • Introduced through: krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1, krb5/libk5crypto3@1.19.2-2ubuntu0.1 and others

Detailed paths

  • Introduced through: concourse/concourse@ubuntu krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libk5crypto3@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libkrb5-3@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libkrb5support0@1.19.2-2ubuntu0.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.

Remediation

There is no fixed version for Ubuntu:22.04 krb5.

References

medium severity

CVE-2024-26462

  • Vulnerable module: krb5/libgssapi-krb5-2
  • Introduced through: krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1, krb5/libk5crypto3@1.19.2-2ubuntu0.1 and others

Detailed paths

  • Introduced through: concourse/concourse@ubuntu krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libk5crypto3@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libkrb5-3@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libkrb5support0@1.19.2-2ubuntu0.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.

Remediation

There is no fixed version for Ubuntu:22.04 krb5.

References

medium severity

Information Exposure

  • Vulnerable module: libgcrypt20
  • Introduced through: libgcrypt20@1.9.4-3ubuntu3

Detailed paths

  • Introduced through: concourse/concourse@ubuntu libgcrypt20@1.9.4-3ubuntu3

NVD Description

Note: Versions mentioned in the description apply only to the upstream libgcrypt20 package and not the libgcrypt20 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.

Remediation

There is no fixed version for Ubuntu:22.04 libgcrypt20.

References

medium severity

CVE-2023-39804

  • Vulnerable module: tar
  • Introduced through: tar@1.34+dfsg-1ubuntu0.1.22.04.1
  • Fixed in: 1.34+dfsg-1ubuntu0.1.22.04.2

Detailed paths

  • Introduced through: concourse/concourse@ubuntu tar@1.34+dfsg-1ubuntu0.1.22.04.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.

Remediation

Upgrade Ubuntu:22.04 tar to version 1.34+dfsg-1ubuntu0.1.22.04.2 or higher.

References

medium severity
new

CVE-2024-28085

  • Vulnerable module: util-linux
  • Introduced through: util-linux@2.37.2-4ubuntu3, util-linux/libblkid1@2.37.2-4ubuntu3 and others
  • Fixed in: 2.37.2-4ubuntu3.3

Detailed paths

  • Introduced through: concourse/concourse@ubuntu util-linux@2.37.2-4ubuntu3
  • Introduced through: concourse/concourse@ubuntu util-linux/libblkid1@2.37.2-4ubuntu3
  • Introduced through: concourse/concourse@ubuntu util-linux/libmount1@2.37.2-4ubuntu3
  • Introduced through: concourse/concourse@ubuntu util-linux/libsmartcols1@2.37.2-4ubuntu3
  • Introduced through: concourse/concourse@ubuntu util-linux/libuuid1@2.37.2-4ubuntu3
  • Introduced through: concourse/concourse@ubuntu util-linux/mount@2.37.2-4ubuntu3

NVD Description

Note: Versions mentioned in the description apply only to the upstream util-linux package and not the util-linux package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.

Remediation

Upgrade Ubuntu:22.04 util-linux to version 2.37.2-4ubuntu3.3 or higher.

References

low severity

Out-of-bounds Write

  • Vulnerable module: perl/perl-base
  • Introduced through: perl/perl-base@5.34.0-3ubuntu1.1
  • Fixed in: 5.34.0-3ubuntu1.3

Detailed paths

  • Introduced through: concourse/concourse@ubuntu perl/perl-base@5.34.0-3ubuntu1.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream perl package and not the perl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.

Remediation

Upgrade Ubuntu:22.04 perl to version 5.34.0-3ubuntu1.3 or higher.

References

low severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu glibc/libc-bin@2.35-0ubuntu3.1
  • Introduced through: concourse/concourse@ubuntu glibc/libc6@2.35-0ubuntu3.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

Remediation

There is no fixed version for Ubuntu:22.04 glibc.

References

low severity

Integer Overflow or Wraparound

  • Vulnerable module: krb5/libgssapi-krb5-2
  • Introduced through: krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1, krb5/libk5crypto3@1.19.2-2ubuntu0.1 and others

Detailed paths

  • Introduced through: concourse/concourse@ubuntu krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libk5crypto3@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libkrb5-3@1.19.2-2ubuntu0.1
  • Introduced through: concourse/concourse@ubuntu krb5/libkrb5support0@1.19.2-2ubuntu0.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5 package and not the krb5 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

Remediation

There is no fixed version for Ubuntu:22.04 krb5.

References

low severity

Resource Exhaustion

  • Vulnerable module: libzstd/libzstd1
  • Introduced through: libzstd/libzstd1@1.4.8+dfsg-3build1

low severity

Improper Certificate Validation

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.9

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A security vulnerability has been identified in all supported versions

of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.

Policy processing is disabled by default but can be enabled by passing the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.9 or higher.

References

low severity

Improper Locking

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.9

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup.

Policy processing is enabled by passing the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function.

Update (31 March 2023): The description of the policy processing enablement was corrected based on CVE-2023-0466.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.9 or higher.

References

low severity

Uncontrolled Recursion

  • Vulnerable module: pcre3/libpcre3
  • Introduced through: pcre3/libpcre3@2:8.39-13ubuntu0.22.04.1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu pcre3/libpcre3@2:8.39-13ubuntu0.22.04.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream pcre3 package and not the pcre3 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.

Remediation

There is no fixed version for Ubuntu:22.04 pcre3.

References

low severity

Out-of-bounds Read

  • Vulnerable module: ncurses/libncurses6
  • Introduced through: ncurses/libncurses6@6.3-2, ncurses/libncursesw6@6.3-2 and others
  • Fixed in: 6.3-2ubuntu0.1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu ncurses/libncurses6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/libncursesw6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/libtinfo6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/ncurses-base@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/ncurses-bin@6.3-2

NVD Description

Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.

Remediation

Upgrade Ubuntu:22.04 ncurses to version 6.3-2ubuntu0.1 or higher.

References

low severity

Improper Input Validation

  • Vulnerable module: coreutils
  • Introduced through: coreutils@8.32-4.1ubuntu1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu coreutils@8.32-4.1ubuntu1

NVD Description

Note: Versions mentioned in the description apply only to the upstream coreutils package and not the coreutils package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

Remediation

There is no fixed version for Ubuntu:22.04 coreutils.

References

low severity

CVE-2023-50495

  • Vulnerable module: ncurses/libncurses6
  • Introduced through: ncurses/libncurses6@6.3-2, ncurses/libncursesw6@6.3-2 and others

Detailed paths

  • Introduced through: concourse/concourse@ubuntu ncurses/libncurses6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/libncursesw6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/libtinfo6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/ncurses-base@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/ncurses-bin@6.3-2

NVD Description

Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().

Remediation

There is no fixed version for Ubuntu:22.04 ncurses.

References

low severity

Out-of-bounds Write

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.14

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions.

Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences.

The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions.

The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However unless the compiler uses the vector registers for storing pointers, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service.

The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3. If this cipher is enabled on the server a malicious client can influence whether this AEAD cipher is used. This implies that TLS server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.14 or higher.

References

low severity

Use After Free

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1
  • Fixed in: 2.35-0ubuntu3.5

Detailed paths

  • Introduced through: concourse/concourse@ubuntu glibc/libc-bin@2.35-0ubuntu3.1
  • Introduced through: concourse/concourse@ubuntu glibc/libc6@2.35-0ubuntu3.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

Remediation

Upgrade Ubuntu:22.04 glibc to version 2.35-0ubuntu3.5 or higher.

References

low severity

Use After Free

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1
  • Fixed in: 2.35-0ubuntu3.5

Detailed paths

  • Introduced through: concourse/concourse@ubuntu glibc/libc-bin@2.35-0ubuntu3.1
  • Introduced through: concourse/concourse@ubuntu glibc/libc6@2.35-0ubuntu3.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the nss_gethostbyname2_r and nss_getcanonname_r hooks without implementing the nss*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

Remediation

Upgrade Ubuntu:22.04 glibc to version 2.35-0ubuntu3.5 or higher.

References

low severity

Out-of-bounds Read

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.10

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash.

Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption.

The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16 byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service.

If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.10 or higher.

References

low severity

CVE-2023-7008

  • Vulnerable module: systemd/libsystemd0
  • Introduced through: systemd/libsystemd0@249.11-0ubuntu3.7 and systemd/libudev1@249.11-0ubuntu3.7

Detailed paths

  • Introduced through: concourse/concourse@ubuntu systemd/libsystemd0@249.11-0ubuntu3.7
  • Introduced through: concourse/concourse@ubuntu systemd/libudev1@249.11-0ubuntu3.7

NVD Description

Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.

Remediation

There is no fixed version for Ubuntu:22.04 systemd.

References

low severity

Uncontrolled Recursion

  • Vulnerable module: gcc-12/gcc-12-base
  • Introduced through: gcc-12/gcc-12-base@12.1.0-2ubuntu1~22.04, gcc-12/libgcc-s1@12.1.0-2ubuntu1~22.04 and others

Detailed paths

  • Introduced through: concourse/concourse@ubuntu gcc-12/gcc-12-base@12.1.0-2ubuntu1~22.04
  • Introduced through: concourse/concourse@ubuntu gcc-12/libgcc-s1@12.1.0-2ubuntu1~22.04
  • Introduced through: concourse/concourse@ubuntu gcc-12/libstdc++6@12.1.0-2ubuntu1~22.04

NVD Description

Note: Versions mentioned in the description apply only to the upstream gcc-12 package and not the gcc-12 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.

Remediation

There is no fixed version for Ubuntu:22.04 gcc-12.

References

low severity

CVE-2024-0727

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.14

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack

Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly.

A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue.

OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass().

We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant.

The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.14 or higher.

References

low severity

Improper Authentication

  • Vulnerable module: shadow/login
  • Introduced through: shadow/login@1:4.8.1-2ubuntu2.1 and shadow/passwd@1:4.8.1-2ubuntu2.1
  • Fixed in: 1:4.8.1-2ubuntu2.2

Detailed paths

  • Introduced through: concourse/concourse@ubuntu shadow/login@1:4.8.1-2ubuntu2.1
  • Introduced through: concourse/concourse@ubuntu shadow/passwd@1:4.8.1-2ubuntu2.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream shadow package and not the shadow package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.

Remediation

Upgrade Ubuntu:22.04 shadow to version 1:4.8.1-2ubuntu2.2 or higher.

References

low severity

Excessive Iteration

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.12

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p.

An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.12 or higher.

References

low severity

Improper Authentication

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.12

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence.

Impact summary: Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be mislead by removing adding or reordering such empty entries as these are ignored by the OpenSSL implementation. We are currently unaware of any such applications.

The AES-SIV algorithm allows for authentication of multiple associated data entries along with the encryption. To authenticate empty data the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL just returns success for such a call instead of performing the associated data authentication operation. The empty data thus will not be authenticated.

As this issue does not affect non-empty associated data authentication and we expect it to be rare for an application to use empty associated data entries this is qualified as Low severity issue.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.12 or higher.

References

low severity

Improper Certificate Validation

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.9

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification.

As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function.

Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument.

Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.9 or higher.

References

low severity

Improper Certificate Validation

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.9

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks.

Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether.

Policy processing is disabled by default but can be enabled by passing the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.9 or higher.

References

low severity

Improper Check for Unusual or Exceptional Conditions

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.14

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.

While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters.

Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q.

An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.

DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().

Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.14 or higher.

References

low severity

Inefficient Regular Expression Complexity

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.12

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length.

However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large.

An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option.

The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.12 or higher.

References

low severity

Out-of-bounds Write

  • Vulnerable module: gnupg2/gpgv
  • Introduced through: gnupg2/gpgv@2.2.27-3ubuntu2.1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu gnupg2/gpgv@2.2.27-3ubuntu2.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.

Remediation

There is no fixed version for Ubuntu:22.04 gnupg2.

References

low severity

Memory Leak

  • Vulnerable module: libcap2
  • Introduced through: libcap2@1:2.44-1build3, libcap2/libcap2-bin@1:2.44-1build3 and others
  • Fixed in: 1:2.44-1ubuntu0.22.04.1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu libcap2@1:2.44-1build3
  • Introduced through: concourse/concourse@ubuntu libcap2/libcap2-bin@1:2.44-1build3
  • Introduced through: concourse/concourse@ubuntu libcap2/libpam-cap@1:2.44-1build3

NVD Description

Note: Versions mentioned in the description apply only to the upstream libcap2 package and not the libcap2 package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.

Remediation

Upgrade Ubuntu:22.04 libcap2 to version 1:2.44-1ubuntu0.22.04.1 or higher.

References

low severity

Out-of-bounds Write

  • Vulnerable module: procps
  • Introduced through: procps@2:3.3.17-6ubuntu2 and procps/libprocps8@2:3.3.17-6ubuntu2
  • Fixed in: 2:3.3.17-6ubuntu2.1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu procps@2:3.3.17-6ubuntu2
  • Introduced through: concourse/concourse@ubuntu procps/libprocps8@2:3.3.17-6ubuntu2

NVD Description

Note: Versions mentioned in the description apply only to the upstream procps package and not the procps package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.

Remediation

Upgrade Ubuntu:22.04 procps to version 2:3.3.17-6ubuntu2.1 or higher.

References

low severity

Arbitrary Code Injection

  • Vulnerable module: shadow/login
  • Introduced through: shadow/login@1:4.8.1-2ubuntu2.1 and shadow/passwd@1:4.8.1-2ubuntu2.1

Detailed paths

  • Introduced through: concourse/concourse@ubuntu shadow/login@1:4.8.1-2ubuntu2.1
  • Introduced through: concourse/concourse@ubuntu shadow/passwd@1:4.8.1-2ubuntu2.1

NVD Description

Note: Versions mentioned in the description apply only to the upstream shadow package and not the shadow package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

Remediation

There is no fixed version for Ubuntu:22.04 shadow.

References

low severity

CVE-2023-45918

  • Vulnerable module: ncurses/libncurses6
  • Introduced through: ncurses/libncurses6@6.3-2, ncurses/libncursesw6@6.3-2 and others

Detailed paths

  • Introduced through: concourse/concourse@ubuntu ncurses/libncurses6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/libncursesw6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/libtinfo6@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/ncurses-base@6.3-2
  • Introduced through: concourse/concourse@ubuntu ncurses/ncurses-bin@6.3-2

NVD Description

Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.

Remediation

There is no fixed version for Ubuntu:22.04 ncurses.

References

low severity

CVE-2023-6237

  • Vulnerable module: openssl
  • Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
  • Fixed in: 3.0.2-0ubuntu1.14

Detailed paths

  • Introduced through: concourse/concourse@ubuntu openssl@3.0.2-0ubuntu1.8
  • Introduced through: concourse/concourse@ubuntu openssl/libssl3@3.0.2-0ubuntu1.8

NVD Description

This vulnerability has not been analyzed by NVD yet.

Remediation

Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.14 or higher.

References