Lots of vulnerabilities in Docker images #460

Closed
opened 2026-02-04 20:39:37 +03:00 by OVERLORD · 22 comments
Owner

Originally created by @AlexandreGohier on GitHub (Oct 24, 2019).

Hello,

First of all: thanks for the great work 👏 !!

I ran a trivy scan on the latest docker amd64 image and there is a bunch of vulnerabilities inherited from upstream images.

I'm considering BW for production password storage and I need a few independent instances, so the docker road was tempting. Any idea on how to improve this? Have you had problems in the past updating to the latest alpine and rust images? I'm guessing this won't fix all the vulns since some of them are many years old...

If you could share your experience with this I would very much appreciate.

Thanks.

FYI, scan results below:

bitwardenrs/server:latest (debian 9.11)
=======================================
Total: 210 (UNKNOWN: 0, LOW: 35, MEDIUM: 127, HIGH: 45, CRITICAL: 3)

+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
|      LIBRARY      |  VULNERABILITY ID   | SEVERITY |   INSTALLED VERSION   | FIXED VERSION |                            TITLE                             |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| apt               | CVE-2011-3374       | LOW      | 1.4.9                 |               |                                                              |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| bash              | TEMP-0841856-B18BAF |          | 4.4-5                 |               |                                                              |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| bsdutils          | CVE-2016-2779       | HIGH     | 2.29.2-1+deb9u1       |               | util-linux: runuser tty hijack                               |
|                   |                     |          |                       |               | via TIOCSTI ioctl                                            |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| coreutils         | CVE-2016-2781       | LOW      | 8.26-3                |               | coreutils: Non-privileged                                    |
|                   |                     |          |                       |               | session can escape to the                                    |
|                   |                     |          |                       |               | parent session in chroot                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-18018      |          |                       |               | coreutils: race condition                                    |
|                   |                     |          |                       |               | vulnerability in chown and                                   |
|                   |                     |          |                       |               | chgrp                                                        |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| curl              | CVE-2019-5481       | HIGH     | 7.52.1-5+deb9u9       |               | curl: double free due to                                     |
|                   |                     |          |                       |               | subsequent call of realloc()                                 |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-5482       |          |                       |               | curl: heap buffer overflow in                                |
|                   |                     |          |                       |               | function tftp_receive_packet()                               |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-5436       | MEDIUM   |                       |               | curl: TFTP receive                                           |
|                   |                     |          |                       |               | heap buffer overflow in                                      |
|                   |                     |          |                       |               | tftp_receive_packet() function                               |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| gcc-6-base        | CVE-2018-12886      |          | 6.3.0-18+deb9u1       |               | gcc: spilling of stack                                       |
|                   |                     |          |                       |               | protection address in                                        |
|                   |                     |          |                       |               | cfgexpand.c and function.c                                   |
|                   |                     |          |                       |               | leads to...                                                  |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| gpgv              | CVE-2018-1000858    |          | 2.1.18-8~deb9u4       |               | gnupg2: Cross site                                           |
|                   |                     |          |                       |               | request forgery in dirmngr                                   |
|                   |                     |          |                       |               | resulting in an information                                  |
|                   |                     |          |                       |               | disclosure...                                                |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-9234       |          |                       |               | GnuPG: Unenforced                                            |
|                   |                     |          |                       |               | configuration allows                                         |
|                   |                     |          |                       |               | for apparently valid                                         |
|                   |                     |          |                       |               | certifications actually signed                               |
|                   |                     |          |                       |               | by signing...                                                |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libapt-pkg5.0     | CVE-2011-3374       | LOW      | 1.4.9                 |               |                                                              |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libblkid1         | CVE-2016-2779       | HIGH     | 2.29.2-1+deb9u1       |               | util-linux: runuser tty hijack                               |
|                   |                     |          |                       |               | via TIOCSTI ioctl                                            |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libbz2-1.0        | CVE-2019-12900      |          | 1.0.6-8.1             |               | bzip2: out-of-bounds write in                                |
|                   |                     |          |                       |               | function BZ2_decompress                                      |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libc-bin          | CVE-2018-6551       |          | 2.24-11+deb9u4        |               | glibc: integer overflow in                                   |
|                   |                     |          |                       |               | malloc functions                                             |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-6485       |          |                       |               | glibc: Integer overflow in                                   |
|                   |                     |          |                       |               | posix_memalign in memalign                                   |
|                   |                     |          |                       |               | functions                                                    |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010022    |          |                       |               | glibc: stack guard protection                                |
|                   |                     |          |                       |               | bypass                                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-9169       |          |                       |               | glibc: regular-expression                                    |
|                   |                     |          |                       |               | match via proceed_next_node                                  |
|                   |                     |          |                       |               | in posix/regexec.c leads to                                  |
|                   |                     |          |                       |               | heap-based buffer over-read...                               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-1000001    |          |                       |               | glibc: realpath() buffer                                     |
|                   |                     |          |                       |               | underflow when getcwd()                                      |
|                   |                     |          |                       |               | returns relative path allows                                 |
|                   |                     |          |                       |               | privilege escalation...                                      |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2016-10739      | MEDIUM   |                       |               | glibc: getaddrinfo should                                    |
|                   |                     |          |                       |               | reject IP addresses with                                     |
|                   |                     |          |                       |               | trailing characters                                          |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20796      |          |                       |               | glibc: uncontrolled                                          |
|                   |                     |          |                       |               | recursion in function                                        |
|                   |                     |          |                       |               | check_dst_limits_calc_pos_1 in                               |
|                   |                     |          |                       |               | posix/regexec.c                                              |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010023    |          |                       |               | GNU Libc current is affected                                 |
|                   |                     |          |                       |               | by: Re-mapping current loaded                                |
|                   |                     |          |                       |               | libray with malicious...                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2015-8985       |          |                       |               | glibc: potential denial of                                   |
|                   |                     |          |                       |               | service in pop_fail_stack()                                  |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010024    |          |                       |               | GNU Libc current is affected                                 |
|                   |                     |          |                       |               | by: Mitigation bypass. The                                   |
|                   |                     |          |                       |               | impact is: Attacker...                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-12132      |          |                       |               | glibc: Fragmentation attacks                                 |
|                   |                     |          |                       |               | possible when EDNS0 is enabled                               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2009-5155       |          |                       |               | glibc: parse_reg_exp in                                      |
|                   |                     |          |                       |               | posix/regcomp.c misparses                                    |
|                   |                     |          |                       |               | alternatives leading to denial                               |
|                   |                     |          |                       |               | of service or...                                             |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010025    |          |                       |               | glibc: information disclosure                                |
|                   |                     |          |                       |               | of heap addresses of                                         |
|                   |                     |          |                       |               | pthread_created thread                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2010-4051       |          |                       |               | CVE-2010-4052 glibc:                                         |
|                   |                     |          |                       |               | De-recursivise regular                                       |
|                   |                     |          |                       |               | expression engine                                            |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2016-10228      |          |                       |               | glibc: iconv program can                                     |
|                   |                     |          |                       |               | hang when invoked with the -c                                |
|                   |                     |          |                       |               | option                                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2010-4052       |          |                       |               | CVE-2010-4051 CVE-2010-4052                                  |
|                   |                     |          |                       |               | glibc: De-recursivise regular                                |
|                   |                     |          |                       |               | expression engine                                            |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-6488       |          |                       |               | glibc: Incorrect attempt to                                  |
|                   |                     |          |                       |               | use a 64-bit register for                                    |
|                   |                     |          |                       |               | size_t in assembly...                                        |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-9192       |          |                       |               | glibc: uncontrolled                                          |
|                   |                     |          |                       |               | recursion in function                                        |
|                   |                     |          |                       |               | check_dst_limits_calc_pos_1 in                               |
|                   |                     |          |                       |               | posix/regexec.c                                              |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2010-4756       |          |                       |               | glibc: glob implementation can                               |
|                   |                     |          |                       |               | cause excessive CPU and memory                               |
|                   |                     |          |                       |               | consumption due to...                                        |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-7309       | LOW      |                       |               | glibc: memcmp function                                       |
|                   |                     |          |                       |               | incorrectly returns zero                                     |
+-------------------+---------------------+----------+                       +---------------+--------------------------------------------------------------+
| libc6             | CVE-2018-6485       | HIGH     |                       |               | glibc: Integer overflow in                                   |
|                   |                     |          |                       |               | posix_memalign in memalign                                   |
|                   |                     |          |                       |               | functions                                                    |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-9169       |          |                       |               | glibc: regular-expression                                    |
|                   |                     |          |                       |               | match via proceed_next_node                                  |
|                   |                     |          |                       |               | in posix/regexec.c leads to                                  |
|                   |                     |          |                       |               | heap-based buffer over-read...                               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-1000001    |          |                       |               | glibc: realpath() buffer                                     |
|                   |                     |          |                       |               | underflow when getcwd()                                      |
|                   |                     |          |                       |               | returns relative path allows                                 |
|                   |                     |          |                       |               | privilege escalation...                                      |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010022    |          |                       |               | glibc: stack guard protection                                |
|                   |                     |          |                       |               | bypass                                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-6551       |          |                       |               | glibc: integer overflow in                                   |
|                   |                     |          |                       |               | malloc functions                                             |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-12132      | MEDIUM   |                       |               | glibc: Fragmentation attacks                                 |
|                   |                     |          |                       |               | possible when EDNS0 is enabled                               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010025    |          |                       |               | glibc: information disclosure                                |
|                   |                     |          |                       |               | of heap addresses of                                         |
|                   |                     |          |                       |               | pthread_created thread                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010023    |          |                       |               | GNU Libc current is affected                                 |
|                   |                     |          |                       |               | by: Re-mapping current loaded                                |
|                   |                     |          |                       |               | libray with malicious...                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2009-5155       |          |                       |               | glibc: parse_reg_exp in                                      |
|                   |                     |          |                       |               | posix/regcomp.c misparses                                    |
|                   |                     |          |                       |               | alternatives leading to denial                               |
|                   |                     |          |                       |               | of service or...                                             |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2016-10739      |          |                       |               | glibc: getaddrinfo should                                    |
|                   |                     |          |                       |               | reject IP addresses with                                     |
|                   |                     |          |                       |               | trailing characters                                          |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-9192       |          |                       |               | glibc: uncontrolled                                          |
|                   |                     |          |                       |               | recursion in function                                        |
|                   |                     |          |                       |               | check_dst_limits_calc_pos_1 in                               |
|                   |                     |          |                       |               | posix/regexec.c                                              |
+                   +---------------------+          +                       +---------------+                                                              +
|                   | CVE-2018-20796      |          |                       |               |                                                              |
|                   |                     |          |                       |               |                                                              |
|                   |                     |          |                       |               |                                                              |
|                   |                     |          |                       |               |                                                              |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2010-4756       |          |                       |               | glibc: glob implementation can                               |
|                   |                     |          |                       |               | cause excessive CPU and memory                               |
|                   |                     |          |                       |               | consumption due to...                                        |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010024    |          |                       |               | GNU Libc current is affected                                 |
|                   |                     |          |                       |               | by: Mitigation bypass. The                                   |
|                   |                     |          |                       |               | impact is: Attacker...                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2010-4052       |          |                       |               | CVE-2010-4051 CVE-2010-4052                                  |
|                   |                     |          |                       |               | glibc: De-recursivise regular                                |
|                   |                     |          |                       |               | expression engine                                            |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2015-8985       |          |                       |               | glibc: potential denial of                                   |
|                   |                     |          |                       |               | service in pop_fail_stack()                                  |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-6488       |          |                       |               | glibc: Incorrect attempt to                                  |
|                   |                     |          |                       |               | use a 64-bit register for                                    |
|                   |                     |          |                       |               | size_t in assembly...                                        |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2016-10228      |          |                       |               | glibc: iconv program can                                     |
|                   |                     |          |                       |               | hang when invoked with the -c                                |
|                   |                     |          |                       |               | option                                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2010-4051       |          |                       |               | CVE-2010-4052 glibc:                                         |
|                   |                     |          |                       |               | De-recursivise regular                                       |
|                   |                     |          |                       |               | expression engine                                            |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-7309       | LOW      |                       |               | glibc: memcmp function                                       |
|                   |                     |          |                       |               | incorrectly returns zero                                     |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libcurl3          | CVE-2019-5482       | HIGH     | 7.52.1-5+deb9u9       |               | curl: heap buffer overflow in                                |
|                   |                     |          |                       |               | function tftp_receive_packet()                               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-5481       |          |                       |               | curl: double free due to                                     |
|                   |                     |          |                       |               | subsequent call of realloc()                                 |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-5436       | MEDIUM   |                       |               | curl: TFTP receive                                           |
|                   |                     |          |                       |               | heap buffer overflow in                                      |
|                   |                     |          |                       |               | tftp_receive_packet() function                               |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libfdisk1         | CVE-2016-2779       | HIGH     | 2.29.2-1+deb9u1       |               | util-linux: runuser tty hijack                               |
|                   |                     |          |                       |               | via TIOCSTI ioctl                                            |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libgcc1           | CVE-2018-12886      | MEDIUM   | 6.3.0-18+deb9u1       |               | gcc: spilling of stack                                       |
|                   |                     |          |                       |               | protection address in                                        |
|                   |                     |          |                       |               | cfgexpand.c and function.c                                   |
|                   |                     |          |                       |               | leads to...                                                  |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libgcrypt20       | CVE-2019-12904      |          | 1.7.6-2+deb9u3        |               | Libgcrypt: physical addresses                                |
|                   |                     |          |                       |               | being available to other                                     |
|                   |                     |          |                       |               | processes leads to a                                         |
|                   |                     |          |                       |               | flush-and-reload...                                          |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-6829       |          |                       |               | libgcrypt: ElGamal                                           |
|                   |                     |          |                       |               | implementation doesn't                                       |
|                   |                     |          |                       |               | have semantic security                                       |
|                   |                     |          |                       |               | due to incorrectly encoded                                   |
|                   |                     |          |                       |               | plaintexts...                                                |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-13627      |          |                       |               | libgcrypt: ECDSA timing                                      |
|                   |                     |          |                       |               | attack in the libgcrypt20                                    |
|                   |                     |          |                       |               | cryptographic library                                        |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libgnutls30       | CVE-2019-3829       |          | 3.5.8-5+deb9u4        |               | gnutls:                                                      |
|                   |                     |          |                       |               | use-after-free/double-free in                                |
|                   |                     |          |                       |               | certificate verification                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-3836       |          |                       |               | gnutls: invalid pointer access                               |
|                   |                     |          |                       |               | upon receiving async handshake                               |
|                   |                     |          |                       |               | messages                                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2011-3389       |          |                       |               | HTTPS: block-wise                                            |
|                   |                     |          |                       |               | chosen-plaintext attack                                      |
|                   |                     |          |                       |               | against SSL/TLS (BEAST)                                      |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-16868      | LOW      |                       |               | gnutls: Bleichenbacher-like                                  |
|                   |                     |          |                       |               | side channel leakage in PKCS#1                               |
|                   |                     |          |                       |               | v1.5 verification and padding                                |
|                   |                     |          |                       |               | oracle...                                                    |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libgssapi-krb5-2  | CVE-2017-15088      | HIGH     | 1.15-1+deb9u1         |               | krb5: Buffer overflow in                                     |
|                   |                     |          |                       |               | get_matching_data()                                          |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-11462      |          |                       |               | krb5: Automatic sec context                                  |
|                   |                     |          |                       |               | deletion could lead to                                       |
|                   |                     |          |                       |               | double-free                                                  |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5709       | MEDIUM   |                       |               | krb5: integer overflow                                       |
|                   |                     |          |                       |               | in dbentry->n_key_data in                                    |
|                   |                     |          |                       |               | kadmin/dbutil/dump.c                                         |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5710       |          |                       |               | krb5: null pointer deference                                 |
|                   |                     |          |                       |               | in strlen function in                                        |
|                   |                     |          |                       |               | plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5729       |          |                       |               | krb5: null dereference in                                    |
|                   |                     |          |                       |               | kadmind or DN container check                                |
|                   |                     |          |                       |               | bypass by supplying...                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5730       |          |                       |               | krb5: DN container check                                     |
|                   |                     |          |                       |               | bypass by supplying special                                  |
|                   |                     |          |                       |               | crafted data                                                 |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20217      | LOW      |                       |               | krb5: Reachable assertion                                    |
|                   |                     |          |                       |               | in the KDC using S4U2Self                                    |
|                   |                     |          |                       |               | requests                                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2004-0971       |          |                       |               | security flaw                                                |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libhogweed4       | CVE-2018-16869      |          | 3.3-1                 |               | nettle: Leaky data conversion                                |
|                   |                     |          |                       |               | exposing a manager oracle                                    |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libidn11          | CVE-2017-14062      | HIGH     | 1.33-1                |               | libidn2: Integer overflow in                                 |
|                   |                     |          |                       |               | puny_decode.c/decode_digit                                   |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libk5crypto3      | CVE-2017-11462      |          | 1.15-1+deb9u1         |               | krb5: Automatic sec context                                  |
|                   |                     |          |                       |               | deletion could lead to                                       |
|                   |                     |          |                       |               | double-free                                                  |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-15088      |          |                       |               | krb5: Buffer overflow in                                     |
|                   |                     |          |                       |               | get_matching_data()                                          |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5730       | MEDIUM   |                       |               | krb5: DN container check                                     |
|                   |                     |          |                       |               | bypass by supplying special                                  |
|                   |                     |          |                       |               | crafted data                                                 |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5710       |          |                       |               | krb5: null pointer deference                                 |
|                   |                     |          |                       |               | in strlen function in                                        |
|                   |                     |          |                       |               | plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5729       |          |                       |               | krb5: null dereference in                                    |
|                   |                     |          |                       |               | kadmind or DN container check                                |
|                   |                     |          |                       |               | bypass by supplying...                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5709       |          |                       |               | krb5: integer overflow                                       |
|                   |                     |          |                       |               | in dbentry->n_key_data in                                    |
|                   |                     |          |                       |               | kadmin/dbutil/dump.c                                         |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2004-0971       | LOW      |                       |               | security flaw                                                |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20217      |          |                       |               | krb5: Reachable assertion                                    |
|                   |                     |          |                       |               | in the KDC using S4U2Self                                    |
|                   |                     |          |                       |               | requests                                                     |
+-------------------+---------------------+----------+                       +---------------+--------------------------------------------------------------+
| libkrb5-3         | CVE-2017-11462      | HIGH     |                       |               | krb5: Automatic sec context                                  |
|                   |                     |          |                       |               | deletion could lead to                                       |
|                   |                     |          |                       |               | double-free                                                  |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-15088      |          |                       |               | krb5: Buffer overflow in                                     |
|                   |                     |          |                       |               | get_matching_data()                                          |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5710       | MEDIUM   |                       |               | krb5: null pointer deference                                 |
|                   |                     |          |                       |               | in strlen function in                                        |
|                   |                     |          |                       |               | plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5709       |          |                       |               | krb5: integer overflow                                       |
|                   |                     |          |                       |               | in dbentry->n_key_data in                                    |
|                   |                     |          |                       |               | kadmin/dbutil/dump.c                                         |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5730       |          |                       |               | krb5: DN container check                                     |
|                   |                     |          |                       |               | bypass by supplying special                                  |
|                   |                     |          |                       |               | crafted data                                                 |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5729       |          |                       |               | krb5: null dereference in                                    |
|                   |                     |          |                       |               | kadmind or DN container check                                |
|                   |                     |          |                       |               | bypass by supplying...                                       |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20217      | LOW      |                       |               | krb5: Reachable assertion                                    |
|                   |                     |          |                       |               | in the KDC using S4U2Self                                    |
|                   |                     |          |                       |               | requests                                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2004-0971       |          |                       |               | security flaw                                                |
+-------------------+---------------------+----------+                       +---------------+--------------------------------------------------------------+
| libkrb5support0   | CVE-2017-11462      | HIGH     |                       |               | krb5: Automatic sec context                                  |
|                   |                     |          |                       |               | deletion could lead to                                       |
|                   |                     |          |                       |               | double-free                                                  |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-15088      |          |                       |               | krb5: Buffer overflow in                                     |
|                   |                     |          |                       |               | get_matching_data()                                          |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5729       | MEDIUM   |                       |               | krb5: null dereference in                                    |
|                   |                     |          |                       |               | kadmind or DN container check                                |
|                   |                     |          |                       |               | bypass by supplying...                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5730       |          |                       |               | krb5: DN container check                                     |
|                   |                     |          |                       |               | bypass by supplying special                                  |
|                   |                     |          |                       |               | crafted data                                                 |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5710       |          |                       |               | krb5: null pointer deference                                 |
|                   |                     |          |                       |               | in strlen function in                                        |
|                   |                     |          |                       |               | plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-5709       |          |                       |               | krb5: integer overflow                                       |
|                   |                     |          |                       |               | in dbentry->n_key_data in                                    |
|                   |                     |          |                       |               | kadmin/dbutil/dump.c                                         |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2004-0971       | LOW      |                       |               | security flaw                                                |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20217      |          |                       |               | krb5: Reachable assertion                                    |
|                   |                     |          |                       |               | in the KDC using S4U2Self                                    |
|                   |                     |          |                       |               | requests                                                     |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libldap-2.4-2     | CVE-2017-17740      | MEDIUM   | 2.4.44+dfsg-5+deb9u3  |               | openldap:                                                    |
|                   |                     |          |                       |               | contrib/slapd-modules/nops/nops.c                            |
|                   |                     |          |                       |               | attempts to free stack buffer                                |
|                   |                     |          |                       |               | allowing remote attackers to                                 |
|                   |                     |          |                       |               | cause...                                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2015-3276       |          |                       |               | openldap: incorrect                                          |
|                   |                     |          |                       |               | multi-keyword mode                                           |
|                   |                     |          |                       |               | cipherstring parsing                                         |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-14159      | LOW      |                       |               | openldap: Privilege escalation                               |
|                   |                     |          |                       |               | via PID file manipulation                                    |
+-------------------+---------------------+----------+                       +---------------+--------------------------------------------------------------+
| libldap-common    | CVE-2017-17740      | MEDIUM   |                       |               | openldap:                                                    |
|                   |                     |          |                       |               | contrib/slapd-modules/nops/nops.c                            |
|                   |                     |          |                       |               | attempts to free stack buffer                                |
|                   |                     |          |                       |               | allowing remote attackers to                                 |
|                   |                     |          |                       |               | cause...                                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2015-3276       |          |                       |               | openldap: incorrect                                          |
|                   |                     |          |                       |               | multi-keyword mode                                           |
|                   |                     |          |                       |               | cipherstring parsing                                         |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-14159      | LOW      |                       |               | openldap: Privilege escalation                               |
|                   |                     |          |                       |               | via PID file manipulation                                    |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| liblz4-1          | CVE-2019-17543      | MEDIUM   | 0.0~r131-2            |               | LZ4 before 1.9.2 has a                                       |
|                   |                     |          |                       |               | heap-based buffer overflow in                                |
|                   |                     |          |                       |               | LZ4_write32 (related to...                                   |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libmount1         | CVE-2016-2779       | HIGH     | 2.29.2-1+deb9u1       |               | util-linux: runuser tty hijack                               |
|                   |                     |          |                       |               | via TIOCSTI ioctl                                            |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libncursesw5      | CVE-2018-19211      | MEDIUM   | 6.0+20161126-1+deb9u2 |               | ncurses: Null pointer                                        |
|                   |                     |          |                       |               | dereference at function                                      |
|                   |                     |          |                       |               | _nc_parse_entry in                                           |
|                   |                     |          |                       |               | parse_entry.c                                                |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-17594      |          |                       |               | There is a heap-based                                        |
|                   |                     |          |                       |               | buffer over-read in the                                      |
|                   |                     |          |                       |               | _nc_find_entry function in                                   |
|                   |                     |          |                       |               | tinfo/comp_hash.c...                                         |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-17595      |          |                       |               | There is a heap-based                                        |
|                   |                     |          |                       |               | buffer over-read in the                                      |
|                   |                     |          |                       |               | fmt_entry function in                                        |
|                   |                     |          |                       |               | tinfo/comp_hash.c...                                         |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libnettle6        | CVE-2018-16869      | LOW      | 3.3-1                 |               | nettle: Leaky data conversion                                |
|                   |                     |          |                       |               | exposing a manager oracle                                    |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libnghttp2-14     | CVE-2018-1000168    | MEDIUM   | 1.18.1-1+deb9u1       |               | nghttp2: Null pointer                                        |
|                   |                     |          |                       |               | dereference when too large                                   |
|                   |                     |          |                       |               | ALTSVC frame is received                                     |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | TEMP-0000000-A4EF31 | LOW      |                       |               |                                                              |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libpcre3          | CVE-2017-11164      | HIGH     | 2:8.39-3              |               | pcre: OP_KETRMAX feature                                     |
|                   |                     |          |                       |               | in the match function in                                     |
|                   |                     |          |                       |               | pcre_exec.c                                                  |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-7245       | MEDIUM   |                       |               | pcre: stack-based                                            |
|                   |                     |          |                       |               | buffer overflow write in                                     |
|                   |                     |          |                       |               | pcre32_copy_substring                                        |
+                   +---------------------+          +                       +---------------+                                                              +
|                   | CVE-2017-7246       |          |                       |               |                                                              |
|                   |                     |          |                       |               |                                                              |
|                   |                     |          |                       |               |                                                              |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-16231      | LOW      |                       |               | pcre: self-recursive call in                                 |
|                   |                     |          |                       |               | match() in pcre_exec.c leads                                 |
|                   |                     |          |                       |               | to denial of service...                                      |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libsmartcols1     | CVE-2016-2779       | HIGH     | 2.29.2-1+deb9u1       |               | util-linux: runuser tty hijack                               |
|                   |                     |          |                       |               | via TIOCSTI ioctl                                            |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libsqlite3-0      | CVE-2019-8457       |          | 3.16.2-5+deb9u1       |               | sqlite3: heap out-of-bound                                   |
|                   |                     |          |                       |               | read in function rtreenode()                                 |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20505      | MEDIUM   |                       |               | CVE-2018-20346 CVE-2018-20505                                |
|                   |                     |          |                       |               | CVE-2018-20506 sqlite:                                       |
|                   |                     |          |                       |               | Multiple flaws in sqlite which                               |
|                   |                     |          |                       |               | can be triggered...                                          |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-16168      |          |                       |               | In SQLite through 3.29.0,                                    |
|                   |                     |          |                       |               | whereLoopAddBtreeIndex in                                    |
|                   |                     |          |                       |               | sqlite3.c can crash a browser                                |
|                   |                     |          |                       |               | or...                                                        |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-9937       |          |                       |               | sqlite: null-pointer                                         |
|                   |                     |          |                       |               | dereference in function                                      |
|                   |                     |          |                       |               | fts5ChunkIterate in sqlite3.c                                |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-9936       |          |                       |               | sqlite: heap-based buffer                                    |
|                   |                     |          |                       |               | over-read in function                                        |
|                   |                     |          |                       |               | fts5HashEntrySort in sqlite3.c                               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-13685      |          |                       |               | sqlite: Local DoS via                                        |
|                   |                     |          |                       |               | dump_callback function                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-5827       |          |                       |               | chromium-browser:                                            |
|                   |                     |          |                       |               | out-of-bounds access in SQLite                               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20506      |          |                       |               | CVE-2018-20346 CVE-2018-20505                                |
|                   |                     |          |                       |               | CVE-2018-20506 sqlite:                                       |
|                   |                     |          |                       |               | Multiple flaws in sqlite which                               |
|                   |                     |          |                       |               | can be triggered...                                          |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-8740       |          |                       |               | sqlite: NULL pointer                                         |
|                   |                     |          |                       |               | dereference with databases                                   |
|                   |                     |          |                       |               | with schema corrupted with                                   |
|                   |                     |          |                       |               | CREATE TABLE...                                              |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20346      |          |                       |               | CVE-2018-20505 CVE-2018-20506                                |
|                   |                     |          |                       |               | sqlite: Multiple flaws in                                    |
|                   |                     |          |                       |               | sqlite which can be triggered                                |
|                   |                     |          |                       |               | via...                                                       |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libssh2-1         | CVE-2019-13115      |          | 1.7.0-1+deb9u1        |               | libssh2: integer overflow in                                 |
|                   |                     |          |                       |               | kex_method_diffie_hellman_group_exchange_sha256_key_exchange |
|                   |                     |          |                       |               | in kex.c leads to out-of-bounds write                        |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libssl1.1         | CVE-2010-0928       |          | 1.1.0l-1~deb9u1       |               | openssl: RSA authentication                                  |
|                   |                     |          |                       |               | weakness                                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2007-6755       |          |                       |               | Dual_EC_DRBG: weak pseudo                                    |
|                   |                     |          |                       |               | random number generator                                      |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libstdc++6        | CVE-2018-12886      |          | 6.3.0-18+deb9u1       |               | gcc: spilling of stack                                       |
|                   |                     |          |                       |               | protection address in                                        |
|                   |                     |          |                       |               | cfgexpand.c and function.c                                   |
|                   |                     |          |                       |               | leads to...                                                  |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libsystemd0       | CVE-2017-1000082    | CRITICAL | 232-25+deb9u12        |               | systemd: fails to parse                                      |
|                   |                     |          |                       |               | usernames that start with                                    |
|                   |                     |          |                       |               | digits                                                       |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-6954       | HIGH     |                       |               | systemd: Mishandled symlinks                                 |
|                   |                     |          |                       |               | in systemd-tmpfiles allows                                   |
|                   |                     |          |                       |               | local users to obtain                                        |
|                   |                     |          |                       |               | ownership of...                                              |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-3843       | MEDIUM   |                       |               | systemd: services with                                       |
|                   |                     |          |                       |               | DynamicUser can create                                       |
|                   |                     |          |                       |               | SUID/SGID binaries                                           |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-18078      |          |                       |               | systemd: Unsafe handling of                                  |
|                   |                     |          |                       |               | hard links allowing privilege                                |
|                   |                     |          |                       |               | escalation                                                   |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20839      |          |                       |               | systemd: mishandling of the                                  |
|                   |                     |          |                       |               | current keyboard mode check                                  |
|                   |                     |          |                       |               | leading to passwords being...                                |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-3844       |          |                       |               | systemd: services with                                       |
|                   |                     |          |                       |               | DynamicUser can get new                                      |
|                   |                     |          |                       |               | privileges and create SGID                                   |
|                   |                     |          |                       |               | binaries...                                                  |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2013-4392       | LOW      |                       |               | systemd: TOCTOU race condition                               |
|                   |                     |          |                       |               | when updating file permissions                               |
|                   |                     |          |                       |               | and SELinux security                                         |
|                   |                     |          |                       |               | contexts...                                                  |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-16888      |          |                       |               | systemd: kills privileged                                    |
|                   |                     |          |                       |               | process if unprivileged                                      |
|                   |                     |          |                       |               | PIDFile was tampered                                         |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libtasn1-6        | CVE-2018-1000654    | HIGH     | 4.10-1.1+deb9u1       |               | libtasn1: Infinite loop in                                   |
|                   |                     |          |                       |               | _asn1_expand_object_id(ptree)                                |
|                   |                     |          |                       |               | leads to memory exhaustion                                   |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libtinfo5         | CVE-2019-17595      | MEDIUM   | 6.0+20161126-1+deb9u2 |               | There is a heap-based                                        |
|                   |                     |          |                       |               | buffer over-read in the                                      |
|                   |                     |          |                       |               | fmt_entry function in                                        |
|                   |                     |          |                       |               | tinfo/comp_hash.c...                                         |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-19211      |          |                       |               | ncurses: Null pointer                                        |
|                   |                     |          |                       |               | dereference at function                                      |
|                   |                     |          |                       |               | _nc_parse_entry in                                           |
|                   |                     |          |                       |               | parse_entry.c                                                |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-17594      |          |                       |               | There is a heap-based                                        |
|                   |                     |          |                       |               | buffer over-read in the                                      |
|                   |                     |          |                       |               | _nc_find_entry function in                                   |
|                   |                     |          |                       |               | tinfo/comp_hash.c...                                         |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libudev1          | CVE-2017-1000082    | CRITICAL | 232-25+deb9u12        |               | systemd: fails to parse                                      |
|                   |                     |          |                       |               | usernames that start with                                    |
|                   |                     |          |                       |               | digits                                                       |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-6954       | HIGH     |                       |               | systemd: Mishandled symlinks                                 |
|                   |                     |          |                       |               | in systemd-tmpfiles allows                                   |
|                   |                     |          |                       |               | local users to obtain                                        |
|                   |                     |          |                       |               | ownership of...                                              |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20839      | MEDIUM   |                       |               | systemd: mishandling of the                                  |
|                   |                     |          |                       |               | current keyboard mode check                                  |
|                   |                     |          |                       |               | leading to passwords being...                                |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-3844       |          |                       |               | systemd: services with                                       |
|                   |                     |          |                       |               | DynamicUser can get new                                      |
|                   |                     |          |                       |               | privileges and create SGID                                   |
|                   |                     |          |                       |               | binaries...                                                  |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-3843       |          |                       |               | systemd: services with                                       |
|                   |                     |          |                       |               | DynamicUser can create                                       |
|                   |                     |          |                       |               | SUID/SGID binaries                                           |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-18078      |          |                       |               | systemd: Unsafe handling of                                  |
|                   |                     |          |                       |               | hard links allowing privilege                                |
|                   |                     |          |                       |               | escalation                                                   |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2013-4392       | LOW      |                       |               | systemd: TOCTOU race condition                               |
|                   |                     |          |                       |               | when updating file permissions                               |
|                   |                     |          |                       |               | and SELinux security                                         |
|                   |                     |          |                       |               | contexts...                                                  |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-16888      |          |                       |               | systemd: kills privileged                                    |
|                   |                     |          |                       |               | process if unprivileged                                      |
|                   |                     |          |                       |               | PIDFile was tampered                                         |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libuuid1          | CVE-2016-2779       | HIGH     | 2.29.2-1+deb9u1       |               | util-linux: runuser tty hijack                               |
|                   |                     |          |                       |               | via TIOCSTI ioctl                                            |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| login             | CVE-2017-12424      |          | 1:4.4-4.1             |               | shadow-utils: Buffer overflow                                |
|                   |                     |          |                       |               | via newusers tool                                            |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2007-5686       | MEDIUM   |                       |               | initscripts in rPath Linux 1                                 |
|                   |                     |          |                       |               | sets insecure permissions for                                |
|                   |                     |          |                       |               | the /var/log/btmp file,...                                   |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-7169       |          |                       |               | shadow-utils: newgidmap                                      |
|                   |                     |          |                       |               | allows unprivileged user                                     |
|                   |                     |          |                       |               | to drop supplementary                                        |
|                   |                     |          |                       |               | groups potentially allowing                                  |
|                   |                     |          |                       |               | privilege...                                                 |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | TEMP-0628843-DBAD28 | LOW      |                       |               |                                                              |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2013-4235       |          |                       |               | shadow-utils: TOCTOU race                                    |
|                   |                     |          |                       |               | conditions by copying and                                    |
|                   |                     |          |                       |               | removing directory trees                                     |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| mount             | CVE-2016-2779       | HIGH     | 2.29.2-1+deb9u1       |               | util-linux: runuser tty hijack                               |
|                   |                     |          |                       |               | via TIOCSTI ioctl                                            |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| multiarch-support | CVE-2019-9169       |          | 2.24-11+deb9u4        |               | glibc: regular-expression                                    |
|                   |                     |          |                       |               | match via proceed_next_node                                  |
|                   |                     |          |                       |               | in posix/regexec.c leads to                                  |
|                   |                     |          |                       |               | heap-based buffer over-read...                               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-1000001    |          |                       |               | glibc: realpath() buffer                                     |
|                   |                     |          |                       |               | underflow when getcwd()                                      |
|                   |                     |          |                       |               | returns relative path allows                                 |
|                   |                     |          |                       |               | privilege escalation...                                      |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-6485       |          |                       |               | glibc: Integer overflow in                                   |
|                   |                     |          |                       |               | posix_memalign in memalign                                   |
|                   |                     |          |                       |               | functions                                                    |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-6551       |          |                       |               | glibc: integer overflow in                                   |
|                   |                     |          |                       |               | malloc functions                                             |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010022    |          |                       |               | glibc: stack guard protection                                |
|                   |                     |          |                       |               | bypass                                                       |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2015-8985       | MEDIUM   |                       |               | glibc: potential denial of                                   |
|                   |                     |          |                       |               | service in pop_fail_stack()                                  |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2009-5155       |          |                       |               | glibc: parse_reg_exp in                                      |
|                   |                     |          |                       |               | posix/regcomp.c misparses                                    |
|                   |                     |          |                       |               | alternatives leading to denial                               |
|                   |                     |          |                       |               | of service or...                                             |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010023    |          |                       |               | GNU Libc current is affected                                 |
|                   |                     |          |                       |               | by: Re-mapping current loaded                                |
|                   |                     |          |                       |               | libray with malicious...                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2010-4756       |          |                       |               | glibc: glob implementation can                               |
|                   |                     |          |                       |               | cause excessive CPU and memory                               |
|                   |                     |          |                       |               | consumption due to...                                        |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010025    |          |                       |               | glibc: information disclosure                                |
|                   |                     |          |                       |               | of heap addresses of                                         |
|                   |                     |          |                       |               | pthread_created thread                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-6488       |          |                       |               | glibc: Incorrect attempt to                                  |
|                   |                     |          |                       |               | use a 64-bit register for                                    |
|                   |                     |          |                       |               | size_t in assembly...                                        |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-1010024    |          |                       |               | GNU Libc current is affected                                 |
|                   |                     |          |                       |               | by: Mitigation bypass. The                                   |
|                   |                     |          |                       |               | impact is: Attacker...                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-9192       |          |                       |               | glibc: uncontrolled                                          |
|                   |                     |          |                       |               | recursion in function                                        |
|                   |                     |          |                       |               | check_dst_limits_calc_pos_1 in                               |
|                   |                     |          |                       |               | posix/regexec.c                                              |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2010-4051       |          |                       |               | CVE-2010-4052 glibc:                                         |
|                   |                     |          |                       |               | De-recursivise regular                                       |
|                   |                     |          |                       |               | expression engine                                            |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2016-10739      |          |                       |               | glibc: getaddrinfo should                                    |
|                   |                     |          |                       |               | reject IP addresses with                                     |
|                   |                     |          |                       |               | trailing characters                                          |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2016-10228      |          |                       |               | glibc: iconv program can                                     |
|                   |                     |          |                       |               | hang when invoked with the -c                                |
|                   |                     |          |                       |               | option                                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20796      |          |                       |               | glibc: uncontrolled                                          |
|                   |                     |          |                       |               | recursion in function                                        |
|                   |                     |          |                       |               | check_dst_limits_calc_pos_1 in                               |
|                   |                     |          |                       |               | posix/regexec.c                                              |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2010-4052       |          |                       |               | CVE-2010-4051 CVE-2010-4052                                  |
|                   |                     |          |                       |               | glibc: De-recursivise regular                                |
|                   |                     |          |                       |               | expression engine                                            |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-12132      |          |                       |               | glibc: Fragmentation attacks                                 |
|                   |                     |          |                       |               | possible when EDNS0 is enabled                               |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-7309       | LOW      |                       |               | glibc: memcmp function                                       |
|                   |                     |          |                       |               | incorrectly returns zero                                     |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| ncurses-base      | CVE-2018-19211      | MEDIUM   | 6.0+20161126-1+deb9u2 |               | ncurses: Null pointer                                        |
|                   |                     |          |                       |               | dereference at function                                      |
|                   |                     |          |                       |               | _nc_parse_entry in                                           |
|                   |                     |          |                       |               | parse_entry.c                                                |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-17595      |          |                       |               | There is a heap-based                                        |
|                   |                     |          |                       |               | buffer over-read in the                                      |
|                   |                     |          |                       |               | fmt_entry function in                                        |
|                   |                     |          |                       |               | tinfo/comp_hash.c...                                         |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-17594      |          |                       |               | There is a heap-based                                        |
|                   |                     |          |                       |               | buffer over-read in the                                      |
|                   |                     |          |                       |               | _nc_find_entry function in                                   |
|                   |                     |          |                       |               | tinfo/comp_hash.c...                                         |
+-------------------+---------------------+          +                       +---------------+--------------------------------------------------------------+
| ncurses-bin       | CVE-2018-19211      |          |                       |               | ncurses: Null pointer                                        |
|                   |                     |          |                       |               | dereference at function                                      |
|                   |                     |          |                       |               | _nc_parse_entry in                                           |
|                   |                     |          |                       |               | parse_entry.c                                                |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-17594      |          |                       |               | There is a heap-based                                        |
|                   |                     |          |                       |               | buffer over-read in the                                      |
|                   |                     |          |                       |               | _nc_find_entry function in                                   |
|                   |                     |          |                       |               | tinfo/comp_hash.c...                                         |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-17595      |          |                       |               | There is a heap-based                                        |
|                   |                     |          |                       |               | buffer over-read in the                                      |
|                   |                     |          |                       |               | fmt_entry function in                                        |
|                   |                     |          |                       |               | tinfo/comp_hash.c...                                         |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| openssl           | CVE-2007-6755       |          | 1.1.0l-1~deb9u1       |               | Dual_EC_DRBG: weak pseudo                                    |
|                   |                     |          |                       |               | random number generator                                      |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2010-0928       |          |                       |               | openssl: RSA authentication                                  |
|                   |                     |          |                       |               | weakness                                                     |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| passwd            | CVE-2017-12424      | HIGH     | 1:4.4-4.1             |               | shadow-utils: Buffer overflow                                |
|                   |                     |          |                       |               | via newusers tool                                            |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2007-5686       | MEDIUM   |                       |               | initscripts in rPath Linux 1                                 |
|                   |                     |          |                       |               | sets insecure permissions for                                |
|                   |                     |          |                       |               | the /var/log/btmp file,...                                   |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-7169       |          |                       |               | shadow-utils: newgidmap                                      |
|                   |                     |          |                       |               | allows unprivileged user                                     |
|                   |                     |          |                       |               | to drop supplementary                                        |
|                   |                     |          |                       |               | groups potentially allowing                                  |
|                   |                     |          |                       |               | privilege...                                                 |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | TEMP-0628843-DBAD28 | LOW      |                       |               |                                                              |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2013-4235       |          |                       |               | shadow-utils: TOCTOU race                                    |
|                   |                     |          |                       |               | conditions by copying and                                    |
|                   |                     |          |                       |               | removing directory trees                                     |
+-------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| perl-base         | CVE-2011-4116       |          | 5.24.1-3+deb9u5       |               | perl: File::Temp insecure                                    |
|                   |                     |          |                       |               | temporary file handling                                      |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| sqlite3           | CVE-2019-8457       | HIGH     | 3.16.2-5+deb9u1       |               | sqlite3: heap out-of-bound                                   |
|                   |                     |          |                       |               | read in function rtreenode()                                 |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20346      | MEDIUM   |                       |               | CVE-2018-20505 CVE-2018-20506                                |
|                   |                     |          |                       |               | sqlite: Multiple flaws in                                    |
|                   |                     |          |                       |               | sqlite which can be triggered                                |
|                   |                     |          |                       |               | via...                                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20506      |          |                       |               | CVE-2018-20346 CVE-2018-20505                                |
|                   |                     |          |                       |               | CVE-2018-20506 sqlite:                                       |
|                   |                     |          |                       |               | Multiple flaws in sqlite which                               |
|                   |                     |          |                       |               | can be triggered...                                          |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2017-13685      |          |                       |               | sqlite: Local DoS via                                        |
|                   |                     |          |                       |               | dump_callback function                                       |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-9936       |          |                       |               | sqlite: heap-based buffer                                    |
|                   |                     |          |                       |               | over-read in function                                        |
|                   |                     |          |                       |               | fts5HashEntrySort in sqlite3.c                               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-8740       |          |                       |               | sqlite: NULL pointer                                         |
|                   |                     |          |                       |               | dereference with databases                                   |
|                   |                     |          |                       |               | with schema corrupted with                                   |
|                   |                     |          |                       |               | CREATE TABLE...                                              |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-16168      |          |                       |               | In SQLite through 3.29.0,                                    |
|                   |                     |          |                       |               | whereLoopAddBtreeIndex in                                    |
|                   |                     |          |                       |               | sqlite3.c can crash a browser                                |
|                   |                     |          |                       |               | or...                                                        |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20505      |          |                       |               | CVE-2018-20346 CVE-2018-20505                                |
|                   |                     |          |                       |               | CVE-2018-20506 sqlite:                                       |
|                   |                     |          |                       |               | Multiple flaws in sqlite which                               |
|                   |                     |          |                       |               | can be triggered...                                          |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-5827       |          |                       |               | chromium-browser:                                            |
|                   |                     |          |                       |               | out-of-bounds access in SQLite                               |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-9937       |          |                       |               | sqlite: null-pointer                                         |
|                   |                     |          |                       |               | dereference in function                                      |
|                   |                     |          |                       |               | fts5ChunkIterate in sqlite3.c                                |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| sysvinit-utils    | TEMP-0517018-A83CE6 | LOW      | 2.88dsf-59.9          |               |                                                              |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| tar               | CVE-2005-2541       | CRITICAL | 1.29b-1.1             |               | Tar 1.15.1 does not properly                                 |
|                   |                     |          |                       |               | warn the user when extracting                                |
|                   |                     |          |                       |               | setuid or...                                                 |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2019-9923       | MEDIUM   |                       |               | tar: null-pointer dereference                                |
|                   |                     |          |                       |               | in pax_decode_header in                                      |
|                   |                     |          |                       |               | sparse.c                                                     |
+                   +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                   | CVE-2018-20482      | LOW      |                       |               | tar: Infinite read loop in                                   |
|                   |                     |          |                       |               | sparse_dump_region function in                               |
|                   |                     |          |                       |               | sparse.c                                                     |
+                   +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                   | TEMP-0290435-0B57B5 |          |                       |               |                                                              |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| util-linux        | CVE-2016-2779       | HIGH     | 2.29.2-1+deb9u1       |               | util-linux: runuser tty hijack                               |
|                   |                     |          |                       |               | via TIOCSTI ioctl                                            |
+-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
Originally created by @AlexandreGohier on GitHub (Oct 24, 2019). Hello, First of all: thanks for the great work 👏 !! I ran a [trivy scan](https://github.com/aquasecurity/trivy) on the latest docker amd64 image and there is a bunch of vulnerabilities inherited from upstream images. I'm considering BW for production password storage and I need a few independent instances, so the docker road was tempting. Any idea on how to improve this? Have you had problems in the past updating to the latest alpine and rust images? I'm guessing this won't fix all the vulns since some of them are many years old... If you could share your experience with this I would very much appreciate. Thanks. FYI, scan results below: ``` bitwardenrs/server:latest (debian 9.11) ======================================= Total: 210 (UNKNOWN: 0, LOW: 35, MEDIUM: 127, HIGH: 45, CRITICAL: 3) +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | apt | CVE-2011-3374 | LOW | 1.4.9 | | | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | bash | TEMP-0841856-B18BAF | | 4.4-5 | | | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | bsdutils | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | util-linux: runuser tty hijack | | | | | | | via TIOCSTI ioctl | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | coreutils | CVE-2016-2781 | LOW | 8.26-3 | | coreutils: Non-privileged | | | | | | | session can escape to the | | | | | | | parent session in chroot | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-18018 | | | | coreutils: race condition | | | | | | | vulnerability in chown and | | | | | | | chgrp | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | curl | CVE-2019-5481 | HIGH | 7.52.1-5+deb9u9 | | curl: double free due to | | | | | | | subsequent call of realloc() | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-5482 | | | | curl: heap buffer overflow in | | | | | | | function tftp_receive_packet() | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-5436 | MEDIUM | | | curl: TFTP receive | | | | | | | heap buffer overflow in | | | | | | | tftp_receive_packet() function | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | gcc-6-base | CVE-2018-12886 | | 6.3.0-18+deb9u1 | | gcc: spilling of stack | | | | | | | protection address in | | | | | | | cfgexpand.c and function.c | | | | | | | leads to... | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | gpgv | CVE-2018-1000858 | | 2.1.18-8~deb9u4 | | gnupg2: Cross site | | | | | | | request forgery in dirmngr | | | | | | | resulting in an information | | | | | | | disclosure... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-9234 | | | | GnuPG: Unenforced | | | | | | | configuration allows | | | | | | | for apparently valid | | | | | | | certifications actually signed | | | | | | | by signing... | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.4.9 | | | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libblkid1 | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | util-linux: runuser tty hijack | | | | | | | via TIOCSTI ioctl | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libbz2-1.0 | CVE-2019-12900 | | 1.0.6-8.1 | | bzip2: out-of-bounds write in | | | | | | | function BZ2_decompress | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libc-bin | CVE-2018-6551 | | 2.24-11+deb9u4 | | glibc: integer overflow in | | | | | | | malloc functions | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-6485 | | | | glibc: Integer overflow in | | | | | | | posix_memalign in memalign | | | | | | | functions | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010022 | | | | glibc: stack guard protection | | | | | | | bypass | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-9169 | | | | glibc: regular-expression | | | | | | | match via proceed_next_node | | | | | | | in posix/regexec.c leads to | | | | | | | heap-based buffer over-read... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-1000001 | | | | glibc: realpath() buffer | | | | | | | underflow when getcwd() | | | | | | | returns relative path allows | | | | | | | privilege escalation... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2016-10739 | MEDIUM | | | glibc: getaddrinfo should | | | | | | | reject IP addresses with | | | | | | | trailing characters | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20796 | | | | glibc: uncontrolled | | | | | | | recursion in function | | | | | | | check_dst_limits_calc_pos_1 in | | | | | | | posix/regexec.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010023 | | | | GNU Libc current is affected | | | | | | | by: Re-mapping current loaded | | | | | | | libray with malicious... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2015-8985 | | | | glibc: potential denial of | | | | | | | service in pop_fail_stack() | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010024 | | | | GNU Libc current is affected | | | | | | | by: Mitigation bypass. The | | | | | | | impact is: Attacker... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-12132 | | | | glibc: Fragmentation attacks | | | | | | | possible when EDNS0 is enabled | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2009-5155 | | | | glibc: parse_reg_exp in | | | | | | | posix/regcomp.c misparses | | | | | | | alternatives leading to denial | | | | | | | of service or... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010025 | | | | glibc: information disclosure | | | | | | | of heap addresses of | | | | | | | pthread_created thread | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4051 | | | | CVE-2010-4052 glibc: | | | | | | | De-recursivise regular | | | | | | | expression engine | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2016-10228 | | | | glibc: iconv program can | | | | | | | hang when invoked with the -c | | | | | | | option | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4052 | | | | CVE-2010-4051 CVE-2010-4052 | | | | | | | glibc: De-recursivise regular | | | | | | | expression engine | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-6488 | | | | glibc: Incorrect attempt to | | | | | | | use a 64-bit register for | | | | | | | size_t in assembly... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-9192 | | | | glibc: uncontrolled | | | | | | | recursion in function | | | | | | | check_dst_limits_calc_pos_1 in | | | | | | | posix/regexec.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4756 | | | | glibc: glob implementation can | | | | | | | cause excessive CPU and memory | | | | | | | consumption due to... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-7309 | LOW | | | glibc: memcmp function | | | | | | | incorrectly returns zero | +-------------------+---------------------+----------+ +---------------+--------------------------------------------------------------+ | libc6 | CVE-2018-6485 | HIGH | | | glibc: Integer overflow in | | | | | | | posix_memalign in memalign | | | | | | | functions | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-9169 | | | | glibc: regular-expression | | | | | | | match via proceed_next_node | | | | | | | in posix/regexec.c leads to | | | | | | | heap-based buffer over-read... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-1000001 | | | | glibc: realpath() buffer | | | | | | | underflow when getcwd() | | | | | | | returns relative path allows | | | | | | | privilege escalation... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010022 | | | | glibc: stack guard protection | | | | | | | bypass | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-6551 | | | | glibc: integer overflow in | | | | | | | malloc functions | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2017-12132 | MEDIUM | | | glibc: Fragmentation attacks | | | | | | | possible when EDNS0 is enabled | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010025 | | | | glibc: information disclosure | | | | | | | of heap addresses of | | | | | | | pthread_created thread | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010023 | | | | GNU Libc current is affected | | | | | | | by: Re-mapping current loaded | | | | | | | libray with malicious... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2009-5155 | | | | glibc: parse_reg_exp in | | | | | | | posix/regcomp.c misparses | | | | | | | alternatives leading to denial | | | | | | | of service or... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2016-10739 | | | | glibc: getaddrinfo should | | | | | | | reject IP addresses with | | | | | | | trailing characters | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-9192 | | | | glibc: uncontrolled | | | | | | | recursion in function | | | | | | | check_dst_limits_calc_pos_1 in | | | | | | | posix/regexec.c | + +---------------------+ + +---------------+ + | | CVE-2018-20796 | | | | | | | | | | | | | | | | | | | | | | | | | | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4756 | | | | glibc: glob implementation can | | | | | | | cause excessive CPU and memory | | | | | | | consumption due to... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010024 | | | | GNU Libc current is affected | | | | | | | by: Mitigation bypass. The | | | | | | | impact is: Attacker... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4052 | | | | CVE-2010-4051 CVE-2010-4052 | | | | | | | glibc: De-recursivise regular | | | | | | | expression engine | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2015-8985 | | | | glibc: potential denial of | | | | | | | service in pop_fail_stack() | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-6488 | | | | glibc: Incorrect attempt to | | | | | | | use a 64-bit register for | | | | | | | size_t in assembly... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2016-10228 | | | | glibc: iconv program can | | | | | | | hang when invoked with the -c | | | | | | | option | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4051 | | | | CVE-2010-4052 glibc: | | | | | | | De-recursivise regular | | | | | | | expression engine | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-7309 | LOW | | | glibc: memcmp function | | | | | | | incorrectly returns zero | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libcurl3 | CVE-2019-5482 | HIGH | 7.52.1-5+deb9u9 | | curl: heap buffer overflow in | | | | | | | function tftp_receive_packet() | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-5481 | | | | curl: double free due to | | | | | | | subsequent call of realloc() | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-5436 | MEDIUM | | | curl: TFTP receive | | | | | | | heap buffer overflow in | | | | | | | tftp_receive_packet() function | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libfdisk1 | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | util-linux: runuser tty hijack | | | | | | | via TIOCSTI ioctl | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libgcc1 | CVE-2018-12886 | MEDIUM | 6.3.0-18+deb9u1 | | gcc: spilling of stack | | | | | | | protection address in | | | | | | | cfgexpand.c and function.c | | | | | | | leads to... | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libgcrypt20 | CVE-2019-12904 | | 1.7.6-2+deb9u3 | | Libgcrypt: physical addresses | | | | | | | being available to other | | | | | | | processes leads to a | | | | | | | flush-and-reload... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-6829 | | | | libgcrypt: ElGamal | | | | | | | implementation doesn't | | | | | | | have semantic security | | | | | | | due to incorrectly encoded | | | | | | | plaintexts... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-13627 | | | | libgcrypt: ECDSA timing | | | | | | | attack in the libgcrypt20 | | | | | | | cryptographic library | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libgnutls30 | CVE-2019-3829 | | 3.5.8-5+deb9u4 | | gnutls: | | | | | | | use-after-free/double-free in | | | | | | | certificate verification | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-3836 | | | | gnutls: invalid pointer access | | | | | | | upon receiving async handshake | | | | | | | messages | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2011-3389 | | | | HTTPS: block-wise | | | | | | | chosen-plaintext attack | | | | | | | against SSL/TLS (BEAST) | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-16868 | LOW | | | gnutls: Bleichenbacher-like | | | | | | | side channel leakage in PKCS#1 | | | | | | | v1.5 verification and padding | | | | | | | oracle... | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libgssapi-krb5-2 | CVE-2017-15088 | HIGH | 1.15-1+deb9u1 | | krb5: Buffer overflow in | | | | | | | get_matching_data() | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-11462 | | | | krb5: Automatic sec context | | | | | | | deletion could lead to | | | | | | | double-free | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-5709 | MEDIUM | | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5710 | | | | krb5: null pointer deference | | | | | | | in strlen function in | | | | | | | plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5729 | | | | krb5: null dereference in | | | | | | | kadmind or DN container check | | | | | | | bypass by supplying... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5730 | | | | krb5: DN container check | | | | | | | bypass by supplying special | | | | | | | crafted data | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-20217 | LOW | | | krb5: Reachable assertion | | | | | | | in the KDC using S4U2Self | | | | | | | requests | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | | | | security flaw | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libhogweed4 | CVE-2018-16869 | | 3.3-1 | | nettle: Leaky data conversion | | | | | | | exposing a manager oracle | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libidn11 | CVE-2017-14062 | HIGH | 1.33-1 | | libidn2: Integer overflow in | | | | | | | puny_decode.c/decode_digit | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libk5crypto3 | CVE-2017-11462 | | 1.15-1+deb9u1 | | krb5: Automatic sec context | | | | | | | deletion could lead to | | | | | | | double-free | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-15088 | | | | krb5: Buffer overflow in | | | | | | | get_matching_data() | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-5730 | MEDIUM | | | krb5: DN container check | | | | | | | bypass by supplying special | | | | | | | crafted data | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5710 | | | | krb5: null pointer deference | | | | | | | in strlen function in | | | | | | | plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5729 | | | | krb5: null dereference in | | | | | | | kadmind or DN container check | | | | | | | bypass by supplying... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5709 | | | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | LOW | | | security flaw | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20217 | | | | krb5: Reachable assertion | | | | | | | in the KDC using S4U2Self | | | | | | | requests | +-------------------+---------------------+----------+ +---------------+--------------------------------------------------------------+ | libkrb5-3 | CVE-2017-11462 | HIGH | | | krb5: Automatic sec context | | | | | | | deletion could lead to | | | | | | | double-free | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-15088 | | | | krb5: Buffer overflow in | | | | | | | get_matching_data() | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-5710 | MEDIUM | | | krb5: null pointer deference | | | | | | | in strlen function in | | | | | | | plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5709 | | | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5730 | | | | krb5: DN container check | | | | | | | bypass by supplying special | | | | | | | crafted data | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5729 | | | | krb5: null dereference in | | | | | | | kadmind or DN container check | | | | | | | bypass by supplying... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-20217 | LOW | | | krb5: Reachable assertion | | | | | | | in the KDC using S4U2Self | | | | | | | requests | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | | | | security flaw | +-------------------+---------------------+----------+ +---------------+--------------------------------------------------------------+ | libkrb5support0 | CVE-2017-11462 | HIGH | | | krb5: Automatic sec context | | | | | | | deletion could lead to | | | | | | | double-free | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-15088 | | | | krb5: Buffer overflow in | | | | | | | get_matching_data() | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-5729 | MEDIUM | | | krb5: null dereference in | | | | | | | kadmind or DN container check | | | | | | | bypass by supplying... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5730 | | | | krb5: DN container check | | | | | | | bypass by supplying special | | | | | | | crafted data | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5710 | | | | krb5: null pointer deference | | | | | | | in strlen function in | | | | | | | plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-5709 | | | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | LOW | | | security flaw | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20217 | | | | krb5: Reachable assertion | | | | | | | in the KDC using S4U2Self | | | | | | | requests | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libldap-2.4-2 | CVE-2017-17740 | MEDIUM | 2.4.44+dfsg-5+deb9u3 | | openldap: | | | | | | | contrib/slapd-modules/nops/nops.c | | | | | | | attempts to free stack buffer | | | | | | | allowing remote attackers to | | | | | | | cause... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2015-3276 | | | | openldap: incorrect | | | | | | | multi-keyword mode | | | | | | | cipherstring parsing | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2017-14159 | LOW | | | openldap: Privilege escalation | | | | | | | via PID file manipulation | +-------------------+---------------------+----------+ +---------------+--------------------------------------------------------------+ | libldap-common | CVE-2017-17740 | MEDIUM | | | openldap: | | | | | | | contrib/slapd-modules/nops/nops.c | | | | | | | attempts to free stack buffer | | | | | | | allowing remote attackers to | | | | | | | cause... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2015-3276 | | | | openldap: incorrect | | | | | | | multi-keyword mode | | | | | | | cipherstring parsing | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2017-14159 | LOW | | | openldap: Privilege escalation | | | | | | | via PID file manipulation | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | liblz4-1 | CVE-2019-17543 | MEDIUM | 0.0~r131-2 | | LZ4 before 1.9.2 has a | | | | | | | heap-based buffer overflow in | | | | | | | LZ4_write32 (related to... | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libmount1 | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | util-linux: runuser tty hijack | | | | | | | via TIOCSTI ioctl | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libncursesw5 | CVE-2018-19211 | MEDIUM | 6.0+20161126-1+deb9u2 | | ncurses: Null pointer | | | | | | | dereference at function | | | | | | | _nc_parse_entry in | | | | | | | parse_entry.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17594 | | | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | _nc_find_entry function in | | | | | | | tinfo/comp_hash.c... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17595 | | | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | fmt_entry function in | | | | | | | tinfo/comp_hash.c... | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libnettle6 | CVE-2018-16869 | LOW | 3.3-1 | | nettle: Leaky data conversion | | | | | | | exposing a manager oracle | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libnghttp2-14 | CVE-2018-1000168 | MEDIUM | 1.18.1-1+deb9u1 | | nghttp2: Null pointer | | | | | | | dereference when too large | | | | | | | ALTSVC frame is received | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | TEMP-0000000-A4EF31 | LOW | | | | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libpcre3 | CVE-2017-11164 | HIGH | 2:8.39-3 | | pcre: OP_KETRMAX feature | | | | | | | in the match function in | | | | | | | pcre_exec.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2017-7245 | MEDIUM | | | pcre: stack-based | | | | | | | buffer overflow write in | | | | | | | pcre32_copy_substring | + +---------------------+ + +---------------+ + | | CVE-2017-7246 | | | | | | | | | | | | | | | | | | | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2017-16231 | LOW | | | pcre: self-recursive call in | | | | | | | match() in pcre_exec.c leads | | | | | | | to denial of service... | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libsmartcols1 | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | util-linux: runuser tty hijack | | | | | | | via TIOCSTI ioctl | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libsqlite3-0 | CVE-2019-8457 | | 3.16.2-5+deb9u1 | | sqlite3: heap out-of-bound | | | | | | | read in function rtreenode() | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-20505 | MEDIUM | | | CVE-2018-20346 CVE-2018-20505 | | | | | | | CVE-2018-20506 sqlite: | | | | | | | Multiple flaws in sqlite which | | | | | | | can be triggered... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-16168 | | | | In SQLite through 3.29.0, | | | | | | | whereLoopAddBtreeIndex in | | | | | | | sqlite3.c can crash a browser | | | | | | | or... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-9937 | | | | sqlite: null-pointer | | | | | | | dereference in function | | | | | | | fts5ChunkIterate in sqlite3.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-9936 | | | | sqlite: heap-based buffer | | | | | | | over-read in function | | | | | | | fts5HashEntrySort in sqlite3.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-13685 | | | | sqlite: Local DoS via | | | | | | | dump_callback function | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-5827 | | | | chromium-browser: | | | | | | | out-of-bounds access in SQLite | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20506 | | | | CVE-2018-20346 CVE-2018-20505 | | | | | | | CVE-2018-20506 sqlite: | | | | | | | Multiple flaws in sqlite which | | | | | | | can be triggered... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-8740 | | | | sqlite: NULL pointer | | | | | | | dereference with databases | | | | | | | with schema corrupted with | | | | | | | CREATE TABLE... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20346 | | | | CVE-2018-20505 CVE-2018-20506 | | | | | | | sqlite: Multiple flaws in | | | | | | | sqlite which can be triggered | | | | | | | via... | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libssh2-1 | CVE-2019-13115 | | 1.7.0-1+deb9u1 | | libssh2: integer overflow in | | | | | | | kex_method_diffie_hellman_group_exchange_sha256_key_exchange | | | | | | | in kex.c leads to out-of-bounds write | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libssl1.1 | CVE-2010-0928 | | 1.1.0l-1~deb9u1 | | openssl: RSA authentication | | | | | | | weakness | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2007-6755 | | | | Dual_EC_DRBG: weak pseudo | | | | | | | random number generator | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libstdc++6 | CVE-2018-12886 | | 6.3.0-18+deb9u1 | | gcc: spilling of stack | | | | | | | protection address in | | | | | | | cfgexpand.c and function.c | | | | | | | leads to... | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libsystemd0 | CVE-2017-1000082 | CRITICAL | 232-25+deb9u12 | | systemd: fails to parse | | | | | | | usernames that start with | | | | | | | digits | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-6954 | HIGH | | | systemd: Mishandled symlinks | | | | | | | in systemd-tmpfiles allows | | | | | | | local users to obtain | | | | | | | ownership of... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-3843 | MEDIUM | | | systemd: services with | | | | | | | DynamicUser can create | | | | | | | SUID/SGID binaries | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-18078 | | | | systemd: Unsafe handling of | | | | | | | hard links allowing privilege | | | | | | | escalation | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20839 | | | | systemd: mishandling of the | | | | | | | current keyboard mode check | | | | | | | leading to passwords being... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-3844 | | | | systemd: services with | | | | | | | DynamicUser can get new | | | | | | | privileges and create SGID | | | | | | | binaries... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2013-4392 | LOW | | | systemd: TOCTOU race condition | | | | | | | when updating file permissions | | | | | | | and SELinux security | | | | | | | contexts... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-16888 | | | | systemd: kills privileged | | | | | | | process if unprivileged | | | | | | | PIDFile was tampered | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libtasn1-6 | CVE-2018-1000654 | HIGH | 4.10-1.1+deb9u1 | | libtasn1: Infinite loop in | | | | | | | _asn1_expand_object_id(ptree) | | | | | | | leads to memory exhaustion | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libtinfo5 | CVE-2019-17595 | MEDIUM | 6.0+20161126-1+deb9u2 | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | fmt_entry function in | | | | | | | tinfo/comp_hash.c... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-19211 | | | | ncurses: Null pointer | | | | | | | dereference at function | | | | | | | _nc_parse_entry in | | | | | | | parse_entry.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17594 | | | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | _nc_find_entry function in | | | | | | | tinfo/comp_hash.c... | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libudev1 | CVE-2017-1000082 | CRITICAL | 232-25+deb9u12 | | systemd: fails to parse | | | | | | | usernames that start with | | | | | | | digits | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-6954 | HIGH | | | systemd: Mishandled symlinks | | | | | | | in systemd-tmpfiles allows | | | | | | | local users to obtain | | | | | | | ownership of... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-20839 | MEDIUM | | | systemd: mishandling of the | | | | | | | current keyboard mode check | | | | | | | leading to passwords being... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-3844 | | | | systemd: services with | | | | | | | DynamicUser can get new | | | | | | | privileges and create SGID | | | | | | | binaries... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-3843 | | | | systemd: services with | | | | | | | DynamicUser can create | | | | | | | SUID/SGID binaries | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-18078 | | | | systemd: Unsafe handling of | | | | | | | hard links allowing privilege | | | | | | | escalation | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2013-4392 | LOW | | | systemd: TOCTOU race condition | | | | | | | when updating file permissions | | | | | | | and SELinux security | | | | | | | contexts... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-16888 | | | | systemd: kills privileged | | | | | | | process if unprivileged | | | | | | | PIDFile was tampered | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libuuid1 | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | util-linux: runuser tty hijack | | | | | | | via TIOCSTI ioctl | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | login | CVE-2017-12424 | | 1:4.4-4.1 | | shadow-utils: Buffer overflow | | | | | | | via newusers tool | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2007-5686 | MEDIUM | | | initscripts in rPath Linux 1 | | | | | | | sets insecure permissions for | | | | | | | the /var/log/btmp file,... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-7169 | | | | shadow-utils: newgidmap | | | | | | | allows unprivileged user | | | | | | | to drop supplementary | | | | | | | groups potentially allowing | | | | | | | privilege... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | TEMP-0628843-DBAD28 | LOW | | | | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2013-4235 | | | | shadow-utils: TOCTOU race | | | | | | | conditions by copying and | | | | | | | removing directory trees | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | mount | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | util-linux: runuser tty hijack | | | | | | | via TIOCSTI ioctl | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | multiarch-support | CVE-2019-9169 | | 2.24-11+deb9u4 | | glibc: regular-expression | | | | | | | match via proceed_next_node | | | | | | | in posix/regexec.c leads to | | | | | | | heap-based buffer over-read... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-1000001 | | | | glibc: realpath() buffer | | | | | | | underflow when getcwd() | | | | | | | returns relative path allows | | | | | | | privilege escalation... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-6485 | | | | glibc: Integer overflow in | | | | | | | posix_memalign in memalign | | | | | | | functions | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-6551 | | | | glibc: integer overflow in | | | | | | | malloc functions | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010022 | | | | glibc: stack guard protection | | | | | | | bypass | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2015-8985 | MEDIUM | | | glibc: potential denial of | | | | | | | service in pop_fail_stack() | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2009-5155 | | | | glibc: parse_reg_exp in | | | | | | | posix/regcomp.c misparses | | | | | | | alternatives leading to denial | | | | | | | of service or... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010023 | | | | GNU Libc current is affected | | | | | | | by: Re-mapping current loaded | | | | | | | libray with malicious... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4756 | | | | glibc: glob implementation can | | | | | | | cause excessive CPU and memory | | | | | | | consumption due to... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010025 | | | | glibc: information disclosure | | | | | | | of heap addresses of | | | | | | | pthread_created thread | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-6488 | | | | glibc: Incorrect attempt to | | | | | | | use a 64-bit register for | | | | | | | size_t in assembly... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010024 | | | | GNU Libc current is affected | | | | | | | by: Mitigation bypass. The | | | | | | | impact is: Attacker... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-9192 | | | | glibc: uncontrolled | | | | | | | recursion in function | | | | | | | check_dst_limits_calc_pos_1 in | | | | | | | posix/regexec.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4051 | | | | CVE-2010-4052 glibc: | | | | | | | De-recursivise regular | | | | | | | expression engine | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2016-10739 | | | | glibc: getaddrinfo should | | | | | | | reject IP addresses with | | | | | | | trailing characters | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2016-10228 | | | | glibc: iconv program can | | | | | | | hang when invoked with the -c | | | | | | | option | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20796 | | | | glibc: uncontrolled | | | | | | | recursion in function | | | | | | | check_dst_limits_calc_pos_1 in | | | | | | | posix/regexec.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4052 | | | | CVE-2010-4051 CVE-2010-4052 | | | | | | | glibc: De-recursivise regular | | | | | | | expression engine | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-12132 | | | | glibc: Fragmentation attacks | | | | | | | possible when EDNS0 is enabled | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-7309 | LOW | | | glibc: memcmp function | | | | | | | incorrectly returns zero | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | ncurses-base | CVE-2018-19211 | MEDIUM | 6.0+20161126-1+deb9u2 | | ncurses: Null pointer | | | | | | | dereference at function | | | | | | | _nc_parse_entry in | | | | | | | parse_entry.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17595 | | | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | fmt_entry function in | | | | | | | tinfo/comp_hash.c... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17594 | | | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | _nc_find_entry function in | | | | | | | tinfo/comp_hash.c... | +-------------------+---------------------+ + +---------------+--------------------------------------------------------------+ | ncurses-bin | CVE-2018-19211 | | | | ncurses: Null pointer | | | | | | | dereference at function | | | | | | | _nc_parse_entry in | | | | | | | parse_entry.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17594 | | | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | _nc_find_entry function in | | | | | | | tinfo/comp_hash.c... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17595 | | | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | fmt_entry function in | | | | | | | tinfo/comp_hash.c... | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | openssl | CVE-2007-6755 | | 1.1.0l-1~deb9u1 | | Dual_EC_DRBG: weak pseudo | | | | | | | random number generator | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-0928 | | | | openssl: RSA authentication | | | | | | | weakness | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | passwd | CVE-2017-12424 | HIGH | 1:4.4-4.1 | | shadow-utils: Buffer overflow | | | | | | | via newusers tool | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2007-5686 | MEDIUM | | | initscripts in rPath Linux 1 | | | | | | | sets insecure permissions for | | | | | | | the /var/log/btmp file,... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-7169 | | | | shadow-utils: newgidmap | | | | | | | allows unprivileged user | | | | | | | to drop supplementary | | | | | | | groups potentially allowing | | | | | | | privilege... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | TEMP-0628843-DBAD28 | LOW | | | | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2013-4235 | | | | shadow-utils: TOCTOU race | | | | | | | conditions by copying and | | | | | | | removing directory trees | +-------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | perl-base | CVE-2011-4116 | | 5.24.1-3+deb9u5 | | perl: File::Temp insecure | | | | | | | temporary file handling | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | sqlite3 | CVE-2019-8457 | HIGH | 3.16.2-5+deb9u1 | | sqlite3: heap out-of-bound | | | | | | | read in function rtreenode() | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-20346 | MEDIUM | | | CVE-2018-20505 CVE-2018-20506 | | | | | | | sqlite: Multiple flaws in | | | | | | | sqlite which can be triggered | | | | | | | via... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20506 | | | | CVE-2018-20346 CVE-2018-20505 | | | | | | | CVE-2018-20506 sqlite: | | | | | | | Multiple flaws in sqlite which | | | | | | | can be triggered... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-13685 | | | | sqlite: Local DoS via | | | | | | | dump_callback function | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-9936 | | | | sqlite: heap-based buffer | | | | | | | over-read in function | | | | | | | fts5HashEntrySort in sqlite3.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-8740 | | | | sqlite: NULL pointer | | | | | | | dereference with databases | | | | | | | with schema corrupted with | | | | | | | CREATE TABLE... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-16168 | | | | In SQLite through 3.29.0, | | | | | | | whereLoopAddBtreeIndex in | | | | | | | sqlite3.c can crash a browser | | | | | | | or... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20505 | | | | CVE-2018-20346 CVE-2018-20505 | | | | | | | CVE-2018-20506 sqlite: | | | | | | | Multiple flaws in sqlite which | | | | | | | can be triggered... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-5827 | | | | chromium-browser: | | | | | | | out-of-bounds access in SQLite | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-9937 | | | | sqlite: null-pointer | | | | | | | dereference in function | | | | | | | fts5ChunkIterate in sqlite3.c | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | sysvinit-utils | TEMP-0517018-A83CE6 | LOW | 2.88dsf-59.9 | | | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | tar | CVE-2005-2541 | CRITICAL | 1.29b-1.1 | | Tar 1.15.1 does not properly | | | | | | | warn the user when extracting | | | | | | | setuid or... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-9923 | MEDIUM | | | tar: null-pointer dereference | | | | | | | in pax_decode_header in | | | | | | | sparse.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2018-20482 | LOW | | | tar: Infinite read loop in | | | | | | | sparse_dump_region function in | | | | | | | sparse.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | TEMP-0290435-0B57B5 | | | | | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | util-linux | CVE-2016-2779 | HIGH | 2.29.2-1+deb9u1 | | util-linux: runuser tty hijack | | | | | | | via TIOCSTI ioctl | +-------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ ```
Author
Owner

@dani-garcia commented on GitHub (Oct 24, 2019):

Good point, I've updated the base images that used debian stretch to the new buster, and while I was at it decided to update the rest. (57b1d3f850)

That said, most of those vulnerabilities are on programs we don't interact with at all, so I can't imagine they pose a big threat. That said we should try to minimize them as much as we can, though at the end of the day we depend on those base images being updated in the first place.

@dani-garcia commented on GitHub (Oct 24, 2019): Good point, I've updated the base images that used debian stretch to the new buster, and while I was at it decided to update the rest. (https://github.com/dani-garcia/bitwarden_rs/commit/57b1d3f850c3d16eb6f3e23f45b4fd2dc0e7f880) That said, most of those vulnerabilities are on programs we don't interact with at all, so I can't imagine they pose a big threat. That said we should try to minimize them as much as we can, though at the end of the day we depend on those base images being updated in the first place.
Author
Owner

@AlexandreGohier commented on GitHub (Oct 25, 2019):

Thank you for the quick feedback and update.

IMO, even for an average app, having vulnerable packages included in the image is not great, not so much for the risk it poses on the app itself but for the way they can be leveraged (use as pivot on the network for instance). In the case of BW, an app with the very purpose of storing and serving secrets, I would try as much as possible to avoid any unnecessary vulnerability. The stakes are similar to protecting a directory such as LDAP or AD. Once identified, this composant would be a prime target.

Imagine if someone manages a SSRF on the app (server side request forgery). If you’re not familiar with that, this attack consists on successfully getting the app to run a request, or a command of our choosing, on the server. Unless the attacker also manages to perform a remote file inclusion (RFI), the only available tools / commands will be those already at hand on the server. This is called “Living of the Land”. So if our attacker has got 200 vulnerabilities at his/her disposal, it’s a pretty good start. Of course this would need to be a multi-stage operation, but owning the back-end server is a pretty good start, even if the stored content is fully encrypted. If the same attacker manages to serve compromised client-side code, such as a modified web vault or os client (in a supply-chain attack scenario), then it would be possible to send unencrypted data instead. Without owning the back-end database, the data would need to be sent somewhere else, thus requiring to either drop https altogether or managing to bypass the same origin policy (SOP), which requires additional work.

We do depend on base images to be updated and that’s a real issue at the moment. Snyk highlighted this earlier this year in their annual report, a very interesting read. But using the latest base images is already an improvement. I ran a new trivy scan based on your updates and the number of vulnerabilities was cut in half overall, the “high” vulnerabilities dropped from 45 to 10 and the “critical” ones from 3 to 1 (see below). So unless these updated base images break something (a dependency or something else), I would strongly encourage you to push this new updated image and thank you in advance for it!

Another improvement you can consider in the longer term is including the free Aquasec microscanner in your image build process. This will fail the build if any known high or critical vulnerability is included / identified. This would of course require a prior fix of the remaining 11 high/critical vulnerabilities…

New scan results:

653fd8dc2ee9 (debian 10.1)
==========================
Total: 101 (UNKNOWN: 1, LOW: 24, MEDIUM: 65, HIGH: 10, CRITICAL: 1)

+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
|     LIBRARY      |  VULNERABILITY ID   | SEVERITY |   INSTALLED VERSION    | FIXED VERSION |                            TITLE                             |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| apt              | CVE-2011-3374       | LOW      | 1.8.2                  |               |                                                              |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| bash             | TEMP-0841856-B18BAF |          | 5.0-4                  |               |                                                              |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| coreutils        | CVE-2017-18018      |          | 8.30-3                 |               | coreutils: race condition                                    |
|                  |                     |          |                        |               | vulnerability in chown and                                   |
|                  |                     |          |                        |               | chgrp                                                        |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2016-2781       |          |                        |               | coreutils: Non-privileged                                    |
|                  |                     |          |                        |               | session can escape to the                                    |
|                  |                     |          |                        |               | parent session in chroot                                     |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| curl             | CVE-2019-5482       | HIGH     | 7.64.0-4               |               | curl: heap buffer overflow in                                |
|                  |                     |          |                        |               | function tftp_receive_packet()                               |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-5481       |          |                        |               | curl: double free due to                                     |
|                  |                     |          |                        |               | subsequent call of realloc()                                 |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| gcc-8-base       | CVE-2018-12886      | MEDIUM   | 8.3.0-6                |               | gcc: spilling of stack                                       |
|                  |                     |          |                        |               | protection address in                                        |
|                  |                     |          |                        |               | cfgexpand.c and function.c                                   |
|                  |                     |          |                        |               | leads to...                                                  |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-15847      |          |                        |               | gcc: POWER9 "DARN" RNG                                       |
|                  |                     |          |                        |               | intrinsic produces repeated                                  |
|                  |                     |          |                        |               | output                                                       |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libapt-pkg5.0    | CVE-2011-3374       | LOW      | 1.8.2                  |               |                                                              |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libc-bin         | CVE-2019-1010022    | HIGH     | 2.28-10                |               | glibc: stack guard protection                                |
|                  |                     |          |                        |               | bypass                                                       |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-1010025    | MEDIUM   |                        |               | glibc: information disclosure                                |
|                  |                     |          |                        |               | of heap addresses of                                         |
|                  |                     |          |                        |               | pthread_created thread                                       |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2010-4052       |          |                        |               | CVE-2010-4051 CVE-2010-4052                                  |
|                  |                     |          |                        |               | glibc: De-recursivise regular                                |
|                  |                     |          |                        |               | expression engine                                            |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-1010024    |          |                        |               | GNU Libc current is affected                                 |
|                  |                     |          |                        |               | by: Mitigation bypass. The                                   |
|                  |                     |          |                        |               | impact is: Attacker...                                       |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2018-20796      |          |                        |               | glibc: uncontrolled                                          |
|                  |                     |          |                        |               | recursion in function                                        |
|                  |                     |          |                        |               | check_dst_limits_calc_pos_1 in                               |
|                  |                     |          |                        |               | posix/regexec.c                                              |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2016-10228      |          |                        |               | glibc: iconv program can                                     |
|                  |                     |          |                        |               | hang when invoked with the -c                                |
|                  |                     |          |                        |               | option                                                       |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2010-4756       |          |                        |               | glibc: glob implementation can                               |
|                  |                     |          |                        |               | cause excessive CPU and memory                               |
|                  |                     |          |                        |               | consumption due to...                                        |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2010-4051       |          |                        |               | CVE-2010-4052 glibc:                                         |
|                  |                     |          |                        |               | De-recursivise regular                                       |
|                  |                     |          |                        |               | expression engine                                            |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-1010023    |          |                        |               | GNU Libc current is affected                                 |
|                  |                     |          |                        |               | by: Re-mapping current loaded                                |
|                  |                     |          |                        |               | libray with malicious...                                     |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-9192       |          |                        |               | glibc: uncontrolled                                          |
|                  |                     |          |                        |               | recursion in function                                        |
|                  |                     |          |                        |               | check_dst_limits_calc_pos_1 in                               |
|                  |                     |          |                        |               | posix/regexec.c                                              |
+------------------+---------------------+----------+                        +---------------+--------------------------------------------------------------+
| libc6            | CVE-2019-1010022    | HIGH     |                        |               | glibc: stack guard protection                                |
|                  |                     |          |                        |               | bypass                                                       |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-9192       | MEDIUM   |                        |               | glibc: uncontrolled                                          |
|                  |                     |          |                        |               | recursion in function                                        |
|                  |                     |          |                        |               | check_dst_limits_calc_pos_1 in                               |
|                  |                     |          |                        |               | posix/regexec.c                                              |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2010-4756       |          |                        |               | glibc: glob implementation can                               |
|                  |                     |          |                        |               | cause excessive CPU and memory                               |
|                  |                     |          |                        |               | consumption due to...                                        |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-1010023    |          |                        |               | GNU Libc current is affected                                 |
|                  |                     |          |                        |               | by: Re-mapping current loaded                                |
|                  |                     |          |                        |               | libray with malicious...                                     |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-1010025    |          |                        |               | glibc: information disclosure                                |
|                  |                     |          |                        |               | of heap addresses of                                         |
|                  |                     |          |                        |               | pthread_created thread                                       |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2018-20796      |          |                        |               | glibc: uncontrolled                                          |
|                  |                     |          |                        |               | recursion in function                                        |
|                  |                     |          |                        |               | check_dst_limits_calc_pos_1 in                               |
|                  |                     |          |                        |               | posix/regexec.c                                              |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2016-10228      |          |                        |               | glibc: iconv program can                                     |
|                  |                     |          |                        |               | hang when invoked with the -c                                |
|                  |                     |          |                        |               | option                                                       |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-1010024    |          |                        |               | GNU Libc current is affected                                 |
|                  |                     |          |                        |               | by: Mitigation bypass. The                                   |
|                  |                     |          |                        |               | impact is: Attacker...                                       |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2010-4052       |          |                        |               | CVE-2010-4051 CVE-2010-4052                                  |
|                  |                     |          |                        |               | glibc: De-recursivise regular                                |
|                  |                     |          |                        |               | expression engine                                            |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2010-4051       |          |                        |               | CVE-2010-4052 glibc:                                         |
|                  |                     |          |                        |               | De-recursivise regular                                       |
|                  |                     |          |                        |               | expression engine                                            |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libcurl4         | CVE-2019-5482       | HIGH     | 7.64.0-4               |               | curl: heap buffer overflow in                                |
|                  |                     |          |                        |               | function tftp_receive_packet()                               |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-5481       |          |                        |               | curl: double free due to                                     |
|                  |                     |          |                        |               | subsequent call of realloc()                                 |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libgcc1          | CVE-2019-15847      | MEDIUM   | 8.3.0-6                |               | gcc: POWER9 "DARN" RNG                                       |
|                  |                     |          |                        |               | intrinsic produces repeated                                  |
|                  |                     |          |                        |               | output                                                       |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2018-12886      |          |                        |               | gcc: spilling of stack                                       |
|                  |                     |          |                        |               | protection address in                                        |
|                  |                     |          |                        |               | cfgexpand.c and function.c                                   |
|                  |                     |          |                        |               | leads to...                                                  |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| libgcrypt20      | CVE-2019-12904      |          | 1.8.4-5                |               | Libgcrypt: physical addresses                                |
|                  |                     |          |                        |               | being available to other                                     |
|                  |                     |          |                        |               | processes leads to a                                         |
|                  |                     |          |                        |               | flush-and-reload...                                          |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2018-6829       |          |                        |               | libgcrypt: ElGamal                                           |
|                  |                     |          |                        |               | implementation doesn't                                       |
|                  |                     |          |                        |               | have semantic security                                       |
|                  |                     |          |                        |               | due to incorrectly encoded                                   |
|                  |                     |          |                        |               | plaintexts...                                                |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-13627      |          |                        |               | libgcrypt: ECDSA timing                                      |
|                  |                     |          |                        |               | attack in the libgcrypt20                                    |
|                  |                     |          |                        |               | cryptographic library                                        |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| libgnutls30      | CVE-2011-3389       |          | 3.6.7-4                |               | HTTPS: block-wise                                            |
|                  |                     |          |                        |               | chosen-plaintext attack                                      |
|                  |                     |          |                        |               | against SSL/TLS (BEAST)                                      |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| libgssapi-krb5-2 | CVE-2018-5709       |          | 1.17-3                 |               | krb5: integer overflow                                       |
|                  |                     |          |                        |               | in dbentry->n_key_data in                                    |
|                  |                     |          |                        |               | kadmin/dbutil/dump.c                                         |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2004-0971       | LOW      |                        |               | security flaw                                                |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libidn2-0        | CVE-2019-18224      | HIGH     | 2.0.5-1                |               | libidn2: heap-based buffer                                   |
|                  |                     |          |                        |               | overflow in idn2_to_ascii_4i                                 |
|                  |                     |          |                        |               | in lib/lookup.c                                              |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-12290      | UNKNOWN  |                        |               | GNU libidn2 before 2.2.0                                     |
|                  |                     |          |                        |               | fails to perform the roundtrip                               |
|                  |                     |          |                        |               | checks specified in...                                       |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libk5crypto3     | CVE-2018-5709       | MEDIUM   | 1.17-3                 |               | krb5: integer overflow                                       |
|                  |                     |          |                        |               | in dbentry->n_key_data in                                    |
|                  |                     |          |                        |               | kadmin/dbutil/dump.c                                         |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2004-0971       | LOW      |                        |               | security flaw                                                |
+------------------+---------------------+----------+                        +---------------+--------------------------------------------------------------+
| libkrb5-3        | CVE-2018-5709       | MEDIUM   |                        |               | krb5: integer overflow                                       |
|                  |                     |          |                        |               | in dbentry->n_key_data in                                    |
|                  |                     |          |                        |               | kadmin/dbutil/dump.c                                         |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2004-0971       | LOW      |                        |               | security flaw                                                |
+------------------+---------------------+----------+                        +---------------+--------------------------------------------------------------+
| libkrb5support0  | CVE-2018-5709       | MEDIUM   |                        |               | krb5: integer overflow                                       |
|                  |                     |          |                        |               | in dbentry->n_key_data in                                    |
|                  |                     |          |                        |               | kadmin/dbutil/dump.c                                         |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2004-0971       | LOW      |                        |               | security flaw                                                |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libldap-2.4-2    | CVE-2015-3276       | MEDIUM   | 2.4.47+dfsg-3+deb10u1  |               | openldap: incorrect                                          |
|                  |                     |          |                        |               | multi-keyword mode                                           |
|                  |                     |          |                        |               | cipherstring parsing                                         |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2017-17740      |          |                        |               | openldap:                                                    |
|                  |                     |          |                        |               | contrib/slapd-modules/nops/nops.c                            |
|                  |                     |          |                        |               | attempts to free stack buffer                                |
|                  |                     |          |                        |               | allowing remote attackers to                                 |
|                  |                     |          |                        |               | cause...                                                     |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2017-14159      | LOW      |                        |               | openldap: Privilege escalation                               |
|                  |                     |          |                        |               | via PID file manipulation                                    |
+------------------+---------------------+----------+                        +---------------+--------------------------------------------------------------+
| libldap-common   | CVE-2015-3276       | MEDIUM   |                        |               | openldap: incorrect                                          |
|                  |                     |          |                        |               | multi-keyword mode                                           |
|                  |                     |          |                        |               | cipherstring parsing                                         |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2017-17740      |          |                        |               | openldap:                                                    |
|                  |                     |          |                        |               | contrib/slapd-modules/nops/nops.c                            |
|                  |                     |          |                        |               | attempts to free stack buffer                                |
|                  |                     |          |                        |               | allowing remote attackers to                                 |
|                  |                     |          |                        |               | cause...                                                     |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2017-14159      | LOW      |                        |               | openldap: Privilege escalation                               |
|                  |                     |          |                        |               | via PID file manipulation                                    |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| liblz4-1         | CVE-2019-17543      | MEDIUM   | 1.8.3-1                |               | lz4: heap-based buffer                                       |
|                  |                     |          |                        |               | overflow in LZ4_write32                                      |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| libncursesw6     | CVE-2019-17594      |          | 6.1+20181013-2+deb10u1 |               | There is a heap-based                                        |
|                  |                     |          |                        |               | buffer over-read in the                                      |
|                  |                     |          |                        |               | _nc_find_entry function in                                   |
|                  |                     |          |                        |               | tinfo/comp_hash.c...                                         |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-17595      |          |                        |               | There is a heap-based                                        |
|                  |                     |          |                        |               | buffer over-read in the                                      |
|                  |                     |          |                        |               | fmt_entry function in                                        |
|                  |                     |          |                        |               | tinfo/comp_hash.c...                                         |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libnghttp2-14    | TEMP-0000000-A4EF31 | LOW      | 1.36.0-2+deb10u1       |               |                                                              |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libpcre3         | CVE-2017-11164      | HIGH     | 2:8.39-12              |               | pcre: OP_KETRMAX feature                                     |
|                  |                     |          |                        |               | in the match function in                                     |
|                  |                     |          |                        |               | pcre_exec.c                                                  |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2017-7245       | MEDIUM   |                        |               | pcre: stack-based                                            |
|                  |                     |          |                        |               | buffer overflow write in                                     |
|                  |                     |          |                        |               | pcre32_copy_substring                                        |
+                  +---------------------+          +                        +---------------+                                                              +
|                  | CVE-2017-7246       |          |                        |               |                                                              |
|                  |                     |          |                        |               |                                                              |
|                  |                     |          |                        |               |                                                              |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2017-16231      | LOW      |                        |               | pcre: self-recursive call in                                 |
|                  |                     |          |                        |               | match() in pcre_exec.c leads                                 |
|                  |                     |          |                        |               | to denial of service...                                      |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libseccomp2      | CVE-2019-9893       | HIGH     | 2.3.3-4                |               | libseccomp: incorrect                                        |
|                  |                     |          |                        |               | generation of syscall filters                                |
|                  |                     |          |                        |               | in libseccomp                                                |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libsqlite3-0     | CVE-2019-16168      | MEDIUM   | 3.27.2-3               |               | In SQLite through 3.29.0,                                    |
|                  |                     |          |                        |               | whereLoopAddBtreeIndex in                                    |
|                  |                     |          |                        |               | sqlite3.c can crash a browser                                |
|                  |                     |          |                        |               | or...                                                        |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| libssh2-1        | CVE-2019-13115      |          | 1.8.0-2.1              |               | libssh2: integer overflow in                                 |
|                  |                     |          |                        |               | kex_method_diffie_hellman_group_exchange_sha256_key_exchange |
|                  |                     |          |                        |               | in kex.c leads to out-of-bounds write                        |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| libssl1.1        | CVE-2010-0928       |          | 1.1.1d-0+deb10u2       |               | openssl: RSA authentication                                  |
|                  |                     |          |                        |               | weakness                                                     |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2007-6755       |          |                        |               | Dual_EC_DRBG: weak pseudo                                    |
|                  |                     |          |                        |               | random number generator                                      |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| libstdc++6       | CVE-2019-15847      |          | 8.3.0-6                |               | gcc: POWER9 "DARN" RNG                                       |
|                  |                     |          |                        |               | intrinsic produces repeated                                  |
|                  |                     |          |                        |               | output                                                       |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2018-12886      |          |                        |               | gcc: spilling of stack                                       |
|                  |                     |          |                        |               | protection address in                                        |
|                  |                     |          |                        |               | cfgexpand.c and function.c                                   |
|                  |                     |          |                        |               | leads to...                                                  |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| libsystemd0      | CVE-2018-20839      |          | 241-7~deb10u1          |               | systemd: mishandling of the                                  |
|                  |                     |          |                        |               | current keyboard mode check                                  |
|                  |                     |          |                        |               | leading to passwords being...                                |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-3843       |          |                        |               | systemd: services with                                       |
|                  |                     |          |                        |               | DynamicUser can create                                       |
|                  |                     |          |                        |               | SUID/SGID binaries                                           |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-3844       |          |                        |               | systemd: services with                                       |
|                  |                     |          |                        |               | DynamicUser can get new                                      |
|                  |                     |          |                        |               | privileges and create SGID                                   |
|                  |                     |          |                        |               | binaries...                                                  |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-15718      | LOW      |                        |               | systemd: systemd-resolved                                    |
|                  |                     |          |                        |               | allows unprivileged users to                                 |
|                  |                     |          |                        |               | configure DNS                                                |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2013-4392       |          |                        |               | systemd: TOCTOU race condition                               |
|                  |                     |          |                        |               | when updating file permissions                               |
|                  |                     |          |                        |               | and SELinux security                                         |
|                  |                     |          |                        |               | contexts...                                                  |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libtasn1-6       | CVE-2018-1000654    | HIGH     | 4.13-3                 |               | libtasn1: Infinite loop in                                   |
|                  |                     |          |                        |               | _asn1_expand_object_id(ptree)                                |
|                  |                     |          |                        |               | leads to memory exhaustion                                   |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| libtinfo6        | CVE-2019-17594      | MEDIUM   | 6.1+20181013-2+deb10u1 |               | There is a heap-based                                        |
|                  |                     |          |                        |               | buffer over-read in the                                      |
|                  |                     |          |                        |               | _nc_find_entry function in                                   |
|                  |                     |          |                        |               | tinfo/comp_hash.c...                                         |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-17595      |          |                        |               | There is a heap-based                                        |
|                  |                     |          |                        |               | buffer over-read in the                                      |
|                  |                     |          |                        |               | fmt_entry function in                                        |
|                  |                     |          |                        |               | tinfo/comp_hash.c...                                         |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| libudev1         | CVE-2019-3843       |          | 241-7~deb10u1          |               | systemd: services with                                       |
|                  |                     |          |                        |               | DynamicUser can create                                       |
|                  |                     |          |                        |               | SUID/SGID binaries                                           |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-3844       |          |                        |               | systemd: services with                                       |
|                  |                     |          |                        |               | DynamicUser can get new                                      |
|                  |                     |          |                        |               | privileges and create SGID                                   |
|                  |                     |          |                        |               | binaries...                                                  |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2018-20839      |          |                        |               | systemd: mishandling of the                                  |
|                  |                     |          |                        |               | current keyboard mode check                                  |
|                  |                     |          |                        |               | leading to passwords being...                                |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2013-4392       | LOW      |                        |               | systemd: TOCTOU race condition                               |
|                  |                     |          |                        |               | when updating file permissions                               |
|                  |                     |          |                        |               | and SELinux security                                         |
|                  |                     |          |                        |               | contexts...                                                  |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-15718      |          |                        |               | systemd: systemd-resolved                                    |
|                  |                     |          |                        |               | allows unprivileged users to                                 |
|                  |                     |          |                        |               | configure DNS                                                |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| login            | CVE-2007-5686       | MEDIUM   | 1:4.5-1.1              |               | initscripts in rPath Linux 1                                 |
|                  |                     |          |                        |               | sets insecure permissions for                                |
|                  |                     |          |                        |               | the /var/log/btmp file,...                                   |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2018-7169       |          |                        |               | shadow-utils: newgidmap                                      |
|                  |                     |          |                        |               | allows unprivileged user                                     |
|                  |                     |          |                        |               | to drop supplementary                                        |
|                  |                     |          |                        |               | groups potentially allowing                                  |
|                  |                     |          |                        |               | privilege...                                                 |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2013-4235       | LOW      |                        |               | shadow-utils: TOCTOU race                                    |
|                  |                     |          |                        |               | conditions by copying and                                    |
|                  |                     |          |                        |               | removing directory trees                                     |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | TEMP-0628843-DBAD28 |          |                        |               |                                                              |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| ncurses-base     | CVE-2019-17594      | MEDIUM   | 6.1+20181013-2+deb10u1 |               | There is a heap-based                                        |
|                  |                     |          |                        |               | buffer over-read in the                                      |
|                  |                     |          |                        |               | _nc_find_entry function in                                   |
|                  |                     |          |                        |               | tinfo/comp_hash.c...                                         |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-17595      |          |                        |               | There is a heap-based                                        |
|                  |                     |          |                        |               | buffer over-read in the                                      |
|                  |                     |          |                        |               | fmt_entry function in                                        |
|                  |                     |          |                        |               | tinfo/comp_hash.c...                                         |
+------------------+                     +          +                        +---------------+                                                              +
| ncurses-bin      |                     |          |                        |               |                                                              |
|                  |                     |          |                        |               |                                                              |
|                  |                     |          |                        |               |                                                              |
|                  |                     |          |                        |               |                                                              |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-17594      |          |                        |               | There is a heap-based                                        |
|                  |                     |          |                        |               | buffer over-read in the                                      |
|                  |                     |          |                        |               | _nc_find_entry function in                                   |
|                  |                     |          |                        |               | tinfo/comp_hash.c...                                         |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| openssl          | CVE-2010-0928       |          | 1.1.1d-0+deb10u2       |               | openssl: RSA authentication                                  |
|                  |                     |          |                        |               | weakness                                                     |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2007-6755       |          |                        |               | Dual_EC_DRBG: weak pseudo                                    |
|                  |                     |          |                        |               | random number generator                                      |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| passwd           | CVE-2007-5686       |          | 1:4.5-1.1              |               | initscripts in rPath Linux 1                                 |
|                  |                     |          |                        |               | sets insecure permissions for                                |
|                  |                     |          |                        |               | the /var/log/btmp file,...                                   |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2018-7169       |          |                        |               | shadow-utils: newgidmap                                      |
|                  |                     |          |                        |               | allows unprivileged user                                     |
|                  |                     |          |                        |               | to drop supplementary                                        |
|                  |                     |          |                        |               | groups potentially allowing                                  |
|                  |                     |          |                        |               | privilege...                                                 |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | TEMP-0628843-DBAD28 | LOW      |                        |               |                                                              |
+                  +---------------------+          +                        +---------------+--------------------------------------------------------------+
|                  | CVE-2013-4235       |          |                        |               | shadow-utils: TOCTOU race                                    |
|                  |                     |          |                        |               | conditions by copying and                                    |
|                  |                     |          |                        |               | removing directory trees                                     |
+------------------+---------------------+          +------------------------+---------------+--------------------------------------------------------------+
| perl-base        | CVE-2011-4116       |          | 5.28.1-6               |               | perl: File::Temp insecure                                    |
|                  |                     |          |                        |               | temporary file handling                                      |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| sqlite3          | CVE-2019-16168      | MEDIUM   | 3.27.2-3               |               | In SQLite through 3.29.0,                                    |
|                  |                     |          |                        |               | whereLoopAddBtreeIndex in                                    |
|                  |                     |          |                        |               | sqlite3.c can crash a browser                                |
|                  |                     |          |                        |               | or...                                                        |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| sysvinit-utils   | TEMP-0517018-A83CE6 | LOW      | 2.93-8                 |               |                                                              |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
| tar              | CVE-2005-2541       | CRITICAL | 1.30+dfsg-6            |               | Tar 1.15.1 does not properly                                 |
|                  |                     |          |                        |               | warn the user when extracting                                |
|                  |                     |          |                        |               | setuid or...                                                 |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | CVE-2019-9923       | MEDIUM   |                        |               | tar: null-pointer dereference                                |
|                  |                     |          |                        |               | in pax_decode_header in                                      |
|                  |                     |          |                        |               | sparse.c                                                     |
+                  +---------------------+----------+                        +---------------+--------------------------------------------------------------+
|                  | TEMP-0290435-0B57B5 | LOW      |                        |               |                                                              |
+------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+
@AlexandreGohier commented on GitHub (Oct 25, 2019): Thank you for the quick feedback and update. IMO, even for an average app, having vulnerable packages included in the image is not great, not so much for the risk it poses on the app itself but for the way they can be leveraged (use as pivot on the network for instance). In the case of BW, an app with the very purpose of storing and serving secrets, I would try as much as possible to avoid any unnecessary vulnerability. The stakes are similar to protecting a directory such as LDAP or AD. Once identified, this composant would be a prime target. Imagine if someone manages a SSRF on the app (server side request forgery). If you’re not familiar with that, this attack consists on successfully getting the app to run a request, or a command of our choosing, on the server. Unless the attacker also manages to perform a remote file inclusion (RFI), the only available tools / commands will be those already at hand on the server. This is called “Living of the Land”. So if our attacker has got 200 vulnerabilities at his/her disposal, it’s a pretty good start. Of course this would need to be a multi-stage operation, but owning the back-end server is a pretty good start, even if the stored content is fully encrypted. If the same attacker manages to serve compromised client-side code, such as a modified web vault or os client (in a supply-chain attack scenario), then it would be possible to send unencrypted data instead. Without owning the back-end database, the data would need to be sent somewhere else, thus requiring to either drop https altogether or managing to bypass the same origin policy (SOP), which requires additional work. We do depend on base images to be updated and that’s a real issue at the moment. Snyk highlighted this earlier this year in their [annual report](https://snyk.io/opensourcesecurity-2019/), a very interesting read. But using the latest base images is already an improvement. **I ran a new trivy scan based on your updates and the number of vulnerabilities was cut in half overall, the “high” vulnerabilities dropped from 45 to 10 and the “critical” ones from 3 to 1 (see below).** So unless these updated base images break something (a dependency or something else), I would strongly encourage you to push this new updated image and thank you in advance for it! Another improvement you can consider in the longer term is including the free [Aquasec microscanner](https://github.com/aquasecurity/microscanner) in your image build process. This will fail the build if any known high or critical vulnerability is included / identified. This would of course require a prior fix of the remaining 11 high/critical vulnerabilities… New scan results: ``` 653fd8dc2ee9 (debian 10.1) ========================== Total: 101 (UNKNOWN: 1, LOW: 24, MEDIUM: 65, HIGH: 10, CRITICAL: 1) +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | apt | CVE-2011-3374 | LOW | 1.8.2 | | | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | bash | TEMP-0841856-B18BAF | | 5.0-4 | | | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | coreutils | CVE-2017-18018 | | 8.30-3 | | coreutils: race condition | | | | | | | vulnerability in chown and | | | | | | | chgrp | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2016-2781 | | | | coreutils: Non-privileged | | | | | | | session can escape to the | | | | | | | parent session in chroot | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | curl | CVE-2019-5482 | HIGH | 7.64.0-4 | | curl: heap buffer overflow in | | | | | | | function tftp_receive_packet() | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-5481 | | | | curl: double free due to | | | | | | | subsequent call of realloc() | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | gcc-8-base | CVE-2018-12886 | MEDIUM | 8.3.0-6 | | gcc: spilling of stack | | | | | | | protection address in | | | | | | | cfgexpand.c and function.c | | | | | | | leads to... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-15847 | | | | gcc: POWER9 "DARN" RNG | | | | | | | intrinsic produces repeated | | | | | | | output | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2 | | | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libc-bin | CVE-2019-1010022 | HIGH | 2.28-10 | | glibc: stack guard protection | | | | | | | bypass | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-1010025 | MEDIUM | | | glibc: information disclosure | | | | | | | of heap addresses of | | | | | | | pthread_created thread | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4052 | | | | CVE-2010-4051 CVE-2010-4052 | | | | | | | glibc: De-recursivise regular | | | | | | | expression engine | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010024 | | | | GNU Libc current is affected | | | | | | | by: Mitigation bypass. The | | | | | | | impact is: Attacker... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20796 | | | | glibc: uncontrolled | | | | | | | recursion in function | | | | | | | check_dst_limits_calc_pos_1 in | | | | | | | posix/regexec.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2016-10228 | | | | glibc: iconv program can | | | | | | | hang when invoked with the -c | | | | | | | option | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4756 | | | | glibc: glob implementation can | | | | | | | cause excessive CPU and memory | | | | | | | consumption due to... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4051 | | | | CVE-2010-4052 glibc: | | | | | | | De-recursivise regular | | | | | | | expression engine | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010023 | | | | GNU Libc current is affected | | | | | | | by: Re-mapping current loaded | | | | | | | libray with malicious... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-9192 | | | | glibc: uncontrolled | | | | | | | recursion in function | | | | | | | check_dst_limits_calc_pos_1 in | | | | | | | posix/regexec.c | +------------------+---------------------+----------+ +---------------+--------------------------------------------------------------+ | libc6 | CVE-2019-1010022 | HIGH | | | glibc: stack guard protection | | | | | | | bypass | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-9192 | MEDIUM | | | glibc: uncontrolled | | | | | | | recursion in function | | | | | | | check_dst_limits_calc_pos_1 in | | | | | | | posix/regexec.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4756 | | | | glibc: glob implementation can | | | | | | | cause excessive CPU and memory | | | | | | | consumption due to... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010023 | | | | GNU Libc current is affected | | | | | | | by: Re-mapping current loaded | | | | | | | libray with malicious... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010025 | | | | glibc: information disclosure | | | | | | | of heap addresses of | | | | | | | pthread_created thread | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20796 | | | | glibc: uncontrolled | | | | | | | recursion in function | | | | | | | check_dst_limits_calc_pos_1 in | | | | | | | posix/regexec.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2016-10228 | | | | glibc: iconv program can | | | | | | | hang when invoked with the -c | | | | | | | option | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010024 | | | | GNU Libc current is affected | | | | | | | by: Mitigation bypass. The | | | | | | | impact is: Attacker... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4052 | | | | CVE-2010-4051 CVE-2010-4052 | | | | | | | glibc: De-recursivise regular | | | | | | | expression engine | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4051 | | | | CVE-2010-4052 glibc: | | | | | | | De-recursivise regular | | | | | | | expression engine | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libcurl4 | CVE-2019-5482 | HIGH | 7.64.0-4 | | curl: heap buffer overflow in | | | | | | | function tftp_receive_packet() | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-5481 | | | | curl: double free due to | | | | | | | subsequent call of realloc() | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libgcc1 | CVE-2019-15847 | MEDIUM | 8.3.0-6 | | gcc: POWER9 "DARN" RNG | | | | | | | intrinsic produces repeated | | | | | | | output | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-12886 | | | | gcc: spilling of stack | | | | | | | protection address in | | | | | | | cfgexpand.c and function.c | | | | | | | leads to... | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | libgcrypt20 | CVE-2019-12904 | | 1.8.4-5 | | Libgcrypt: physical addresses | | | | | | | being available to other | | | | | | | processes leads to a | | | | | | | flush-and-reload... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-6829 | | | | libgcrypt: ElGamal | | | | | | | implementation doesn't | | | | | | | have semantic security | | | | | | | due to incorrectly encoded | | | | | | | plaintexts... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-13627 | | | | libgcrypt: ECDSA timing | | | | | | | attack in the libgcrypt20 | | | | | | | cryptographic library | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | libgnutls30 | CVE-2011-3389 | | 3.6.7-4 | | HTTPS: block-wise | | | | | | | chosen-plaintext attack | | | | | | | against SSL/TLS (BEAST) | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | libgssapi-krb5-2 | CVE-2018-5709 | | 1.17-3 | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | LOW | | | security flaw | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libidn2-0 | CVE-2019-18224 | HIGH | 2.0.5-1 | | libidn2: heap-based buffer | | | | | | | overflow in idn2_to_ascii_4i | | | | | | | in lib/lookup.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-12290 | UNKNOWN | | | GNU libidn2 before 2.2.0 | | | | | | | fails to perform the roundtrip | | | | | | | checks specified in... | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libk5crypto3 | CVE-2018-5709 | MEDIUM | 1.17-3 | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | LOW | | | security flaw | +------------------+---------------------+----------+ +---------------+--------------------------------------------------------------+ | libkrb5-3 | CVE-2018-5709 | MEDIUM | | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | LOW | | | security flaw | +------------------+---------------------+----------+ +---------------+--------------------------------------------------------------+ | libkrb5support0 | CVE-2018-5709 | MEDIUM | | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | LOW | | | security flaw | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libldap-2.4-2 | CVE-2015-3276 | MEDIUM | 2.4.47+dfsg-3+deb10u1 | | openldap: incorrect | | | | | | | multi-keyword mode | | | | | | | cipherstring parsing | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-17740 | | | | openldap: | | | | | | | contrib/slapd-modules/nops/nops.c | | | | | | | attempts to free stack buffer | | | | | | | allowing remote attackers to | | | | | | | cause... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2017-14159 | LOW | | | openldap: Privilege escalation | | | | | | | via PID file manipulation | +------------------+---------------------+----------+ +---------------+--------------------------------------------------------------+ | libldap-common | CVE-2015-3276 | MEDIUM | | | openldap: incorrect | | | | | | | multi-keyword mode | | | | | | | cipherstring parsing | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-17740 | | | | openldap: | | | | | | | contrib/slapd-modules/nops/nops.c | | | | | | | attempts to free stack buffer | | | | | | | allowing remote attackers to | | | | | | | cause... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2017-14159 | LOW | | | openldap: Privilege escalation | | | | | | | via PID file manipulation | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | liblz4-1 | CVE-2019-17543 | MEDIUM | 1.8.3-1 | | lz4: heap-based buffer | | | | | | | overflow in LZ4_write32 | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | libncursesw6 | CVE-2019-17594 | | 6.1+20181013-2+deb10u1 | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | _nc_find_entry function in | | | | | | | tinfo/comp_hash.c... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17595 | | | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | fmt_entry function in | | | | | | | tinfo/comp_hash.c... | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libnghttp2-14 | TEMP-0000000-A4EF31 | LOW | 1.36.0-2+deb10u1 | | | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libpcre3 | CVE-2017-11164 | HIGH | 2:8.39-12 | | pcre: OP_KETRMAX feature | | | | | | | in the match function in | | | | | | | pcre_exec.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2017-7245 | MEDIUM | | | pcre: stack-based | | | | | | | buffer overflow write in | | | | | | | pcre32_copy_substring | + +---------------------+ + +---------------+ + | | CVE-2017-7246 | | | | | | | | | | | | | | | | | | | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2017-16231 | LOW | | | pcre: self-recursive call in | | | | | | | match() in pcre_exec.c leads | | | | | | | to denial of service... | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libseccomp2 | CVE-2019-9893 | HIGH | 2.3.3-4 | | libseccomp: incorrect | | | | | | | generation of syscall filters | | | | | | | in libseccomp | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libsqlite3-0 | CVE-2019-16168 | MEDIUM | 3.27.2-3 | | In SQLite through 3.29.0, | | | | | | | whereLoopAddBtreeIndex in | | | | | | | sqlite3.c can crash a browser | | | | | | | or... | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | libssh2-1 | CVE-2019-13115 | | 1.8.0-2.1 | | libssh2: integer overflow in | | | | | | | kex_method_diffie_hellman_group_exchange_sha256_key_exchange | | | | | | | in kex.c leads to out-of-bounds write | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | libssl1.1 | CVE-2010-0928 | | 1.1.1d-0+deb10u2 | | openssl: RSA authentication | | | | | | | weakness | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2007-6755 | | | | Dual_EC_DRBG: weak pseudo | | | | | | | random number generator | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | libstdc++6 | CVE-2019-15847 | | 8.3.0-6 | | gcc: POWER9 "DARN" RNG | | | | | | | intrinsic produces repeated | | | | | | | output | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-12886 | | | | gcc: spilling of stack | | | | | | | protection address in | | | | | | | cfgexpand.c and function.c | | | | | | | leads to... | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | libsystemd0 | CVE-2018-20839 | | 241-7~deb10u1 | | systemd: mishandling of the | | | | | | | current keyboard mode check | | | | | | | leading to passwords being... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-3843 | | | | systemd: services with | | | | | | | DynamicUser can create | | | | | | | SUID/SGID binaries | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-3844 | | | | systemd: services with | | | | | | | DynamicUser can get new | | | | | | | privileges and create SGID | | | | | | | binaries... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-15718 | LOW | | | systemd: systemd-resolved | | | | | | | allows unprivileged users to | | | | | | | configure DNS | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2013-4392 | | | | systemd: TOCTOU race condition | | | | | | | when updating file permissions | | | | | | | and SELinux security | | | | | | | contexts... | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libtasn1-6 | CVE-2018-1000654 | HIGH | 4.13-3 | | libtasn1: Infinite loop in | | | | | | | _asn1_expand_object_id(ptree) | | | | | | | leads to memory exhaustion | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | libtinfo6 | CVE-2019-17594 | MEDIUM | 6.1+20181013-2+deb10u1 | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | _nc_find_entry function in | | | | | | | tinfo/comp_hash.c... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17595 | | | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | fmt_entry function in | | | | | | | tinfo/comp_hash.c... | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | libudev1 | CVE-2019-3843 | | 241-7~deb10u1 | | systemd: services with | | | | | | | DynamicUser can create | | | | | | | SUID/SGID binaries | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-3844 | | | | systemd: services with | | | | | | | DynamicUser can get new | | | | | | | privileges and create SGID | | | | | | | binaries... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20839 | | | | systemd: mishandling of the | | | | | | | current keyboard mode check | | | | | | | leading to passwords being... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2013-4392 | LOW | | | systemd: TOCTOU race condition | | | | | | | when updating file permissions | | | | | | | and SELinux security | | | | | | | contexts... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-15718 | | | | systemd: systemd-resolved | | | | | | | allows unprivileged users to | | | | | | | configure DNS | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | login | CVE-2007-5686 | MEDIUM | 1:4.5-1.1 | | initscripts in rPath Linux 1 | | | | | | | sets insecure permissions for | | | | | | | the /var/log/btmp file,... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-7169 | | | | shadow-utils: newgidmap | | | | | | | allows unprivileged user | | | | | | | to drop supplementary | | | | | | | groups potentially allowing | | | | | | | privilege... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2013-4235 | LOW | | | shadow-utils: TOCTOU race | | | | | | | conditions by copying and | | | | | | | removing directory trees | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | TEMP-0628843-DBAD28 | | | | | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | ncurses-base | CVE-2019-17594 | MEDIUM | 6.1+20181013-2+deb10u1 | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | _nc_find_entry function in | | | | | | | tinfo/comp_hash.c... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17595 | | | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | fmt_entry function in | | | | | | | tinfo/comp_hash.c... | +------------------+ + + +---------------+ + | ncurses-bin | | | | | | | | | | | | | | | | | | | | | | | | | | | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17594 | | | | There is a heap-based | | | | | | | buffer over-read in the | | | | | | | _nc_find_entry function in | | | | | | | tinfo/comp_hash.c... | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | openssl | CVE-2010-0928 | | 1.1.1d-0+deb10u2 | | openssl: RSA authentication | | | | | | | weakness | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2007-6755 | | | | Dual_EC_DRBG: weak pseudo | | | | | | | random number generator | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | passwd | CVE-2007-5686 | | 1:4.5-1.1 | | initscripts in rPath Linux 1 | | | | | | | sets insecure permissions for | | | | | | | the /var/log/btmp file,... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-7169 | | | | shadow-utils: newgidmap | | | | | | | allows unprivileged user | | | | | | | to drop supplementary | | | | | | | groups potentially allowing | | | | | | | privilege... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | TEMP-0628843-DBAD28 | LOW | | | | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2013-4235 | | | | shadow-utils: TOCTOU race | | | | | | | conditions by copying and | | | | | | | removing directory trees | +------------------+---------------------+ +------------------------+---------------+--------------------------------------------------------------+ | perl-base | CVE-2011-4116 | | 5.28.1-6 | | perl: File::Temp insecure | | | | | | | temporary file handling | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | sqlite3 | CVE-2019-16168 | MEDIUM | 3.27.2-3 | | In SQLite through 3.29.0, | | | | | | | whereLoopAddBtreeIndex in | | | | | | | sqlite3.c can crash a browser | | | | | | | or... | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | sysvinit-utils | TEMP-0517018-A83CE6 | LOW | 2.93-8 | | | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ | tar | CVE-2005-2541 | CRITICAL | 1.30+dfsg-6 | | Tar 1.15.1 does not properly | | | | | | | warn the user when extracting | | | | | | | setuid or... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-9923 | MEDIUM | | | tar: null-pointer dereference | | | | | | | in pax_decode_header in | | | | | | | sparse.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | TEMP-0290435-0B57B5 | LOW | | | | +------------------+---------------------+----------+------------------------+---------------+--------------------------------------------------------------+ ```
Author
Owner

@dani-garcia commented on GitHub (Oct 26, 2019):

The images should be updated now after I fixed the failing docker builds, about the vulnerabilities left, we could consider uninstalling those packages if they aren't needed by the system, because other than openssl and sqlite (maybe libc too?), we don't use them.

Can you also test the alpine image? It's a smaller image so I can imagine it might have less vulnerabilities present.

@dani-garcia commented on GitHub (Oct 26, 2019): The images should be updated now after I fixed the failing docker builds, about the vulnerabilities left, we could consider uninstalling those packages if they aren't needed by the system, because other than openssl and sqlite (maybe libc too?), we don't use them. Can you also test the alpine image? It's a smaller image so I can imagine it might have less vulnerabilities present.
Author
Owner

@AlexandreGohier commented on GitHub (Oct 27, 2019):

Yes, uninstalling unnecessary packages would certainly be a huge improvement, it's a best security practice anyway to reduce the overall attack surface.

The latest Debian image results are much better as tested before (new test on registry image):

bitwardenrs/server:latest (debian 10.1)
=======================================
Total: 102 (UNKNOWN: 1, LOW: 24, MEDIUM: 66, HIGH: 10, CRITICAL: 1)

The new alpine image is squeaky clean !! :

bitwardenrs/server:alpine (alpine 3.10.3)
=========================================
Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

Are there any functional or technical downsides to using the Alpine image instead of Debian?

And for information (also to anyone reading this in the future), Trivy is free and open-source. One binary to compile or install, and scanning an image is as simple as:

trivy bitwardenrs/server:alpine

The full output looks like this. The vulnerability database sync takes the longest (a little over a minute here) :

2019-10-27T09:31:56.012Z	INFO	Updating vulnerability database...
2019-10-27T09:33:23.882Z	INFO	Updating nvd data...
 131022 / 131022 [======================================================================] 100.00% 45s
2019-10-27T09:34:09.235Z	INFO	Updating alpine data...
 13950 / 13950 [=========================================================================] 100.00% 1s
2019-10-27T09:34:10.863Z	INFO	Updating redhat data...
 20633 / 20633 [=========================================================================] 100.00% 5s
2019-10-27T09:34:16.760Z	INFO	Updating debian data...
 29557 / 29557 [=========================================================================] 100.00% 2s
2019-10-27T09:34:19.729Z	INFO	Updating debian-oval data...
 62997 / 62997 [=========================================================================] 100.00% 8s
2019-10-27T09:34:28.582Z	INFO	Updating ubuntu data...
 31651 / 31651 [=========================================================================] 100.00% 9s
2019-10-27T09:34:44.102Z	INFO	Detecting Alpine vulnerabilities...

bitwardenrs/server:alpine (alpine 3.10.3)
=========================================
Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

Thank you very much for these image updates.

@AlexandreGohier commented on GitHub (Oct 27, 2019): Yes, uninstalling unnecessary packages would certainly be a huge improvement, it's a best security practice anyway to reduce the overall attack surface. The latest Debian image results are much better as tested before (new test on registry image): ``` bitwardenrs/server:latest (debian 10.1) ======================================= Total: 102 (UNKNOWN: 1, LOW: 24, MEDIUM: 66, HIGH: 10, CRITICAL: 1) ``` The new alpine image is squeaky clean !! : ``` bitwardenrs/server:alpine (alpine 3.10.3) ========================================= Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0) ``` Are there any functional or technical downsides to using the Alpine image instead of Debian? And for information (also to anyone reading this in the future), [Trivy](https://github.com/aquasecurity/trivy) is free and open-source. One binary to compile or install, and scanning an image is as simple as: ``` trivy bitwardenrs/server:alpine ``` The full output looks like this. The vulnerability database sync takes the longest (a little over a minute here) : ``` 2019-10-27T09:31:56.012Z INFO Updating vulnerability database... 2019-10-27T09:33:23.882Z INFO Updating nvd data... 131022 / 131022 [======================================================================] 100.00% 45s 2019-10-27T09:34:09.235Z INFO Updating alpine data... 13950 / 13950 [=========================================================================] 100.00% 1s 2019-10-27T09:34:10.863Z INFO Updating redhat data... 20633 / 20633 [=========================================================================] 100.00% 5s 2019-10-27T09:34:16.760Z INFO Updating debian data... 29557 / 29557 [=========================================================================] 100.00% 2s 2019-10-27T09:34:19.729Z INFO Updating debian-oval data... 62997 / 62997 [=========================================================================] 100.00% 8s 2019-10-27T09:34:28.582Z INFO Updating ubuntu data... 31651 / 31651 [=========================================================================] 100.00% 9s 2019-10-27T09:34:44.102Z INFO Detecting Alpine vulnerabilities... bitwardenrs/server:alpine (alpine 3.10.3) ========================================= Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0) ``` Thank you very much for these image updates.
Author
Owner

@mprasil commented on GitHub (Oct 27, 2019):

Are there any functional or technical downsides to using the Alpine image instead of Debian?

Not really, they should be functionally the same. The problem is, that we don't have MySQL variants of alpine image, but if you don't need that you're fine. This makes me wonder - because the alpine version is statically linked binary, does that mean some of the library vulnerabilities would apply even on alpine considering the binary is built on debian-based image?

As for the vulnerabilities in the main image, many do not apply in the context of docker image. For example all of the systemd-related issues rely on systemd actually running which is not the case. Many of the privilege escalation vulnerabilities also rely on privileged process already running, but we only run bitwarden_rs inside the container, nothing else. I'm not saying we shouldn't try to get rid of those, but the criticality might be much lower in our context.

As for removing unneeded packages, I think we could try to do that, many of those are there as an dependency for debian (especially apt) itself, so we would have to do that as last step.

@mprasil commented on GitHub (Oct 27, 2019): > Are there any functional or technical downsides to using the Alpine image instead of Debian? Not really, they should be functionally the same. The problem is, that we don't have MySQL variants of alpine image, but if you don't need that you're fine. This makes me wonder - because the alpine version is statically linked binary, does that mean some of the library vulnerabilities would apply even on alpine considering the binary is built on debian-based image? As for the vulnerabilities in the main image, many do not apply in the context of docker image. For example all of the systemd-related issues rely on systemd actually running which is not the case. Many of the privilege escalation vulnerabilities also rely on privileged process already running, but we only run bitwarden_rs inside the container, nothing else. I'm not saying we shouldn't try to get rid of those, but the criticality might be much lower in our context. As for removing unneeded packages, I think we could try to do that, many of those are there as an dependency for debian (especially apt) itself, so we would have to do that as last step.
Author
Owner

@AlexandreGohier commented on GitHub (Oct 27, 2019):

Not really, they should be functionally the same. The problem is, that we don't have MySQL variants of alpine image, but if you don't need that you're fine.

Thanks for that answer. I was wondering why use MySQL or Postgre instead of sqLite? Is it just a matter of benefiting from operational workflows already in-place or are there other benefits? Not wanting to host a MSSQL server instance is what got me looking at bitwarden_rs in the first place... Since other forks can run on lambda and dynamodb, it must mean most of the data is key-value based. In a distributed, high-availability scenario, something such as Consul would probably also make a robust back-end storage option.

This makes me wonder - because the alpine version is statically linked binary, does that mean some of the library vulnerabilities would apply even on alpine considering the binary is built on debian-based image?

I'm not familiar enough with Alpine to risk an answer to that. However, running a scan on older Alpine images does identify some vulnerabilities that were since patched:

bitwardenrs/server:1.9.1-alpine (alpine 3.9.4)
==============================================
Total: 4 (UNKNOWN: 0, LOW: 1, MEDIUM: 2, HIGH: 1, CRITICAL: 0)

+---------+------------------+----------+-------------------+---------------+--------------------------------+
| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION |             TITLE              |
+---------+------------------+----------+-------------------+---------------+--------------------------------+
| musl    | CVE-2019-14697   | HIGH     | 1.1.20-r4         | 1.1.20-r5     | musl libc through 1.1.23       |
|         |                  |          |                   |               | has an x87 floating-point      |
|         |                  |          |                   |               | stack adjustment imbalance,    |
|         |                  |          |                   |               | related...                     |
+---------+------------------+----------+-------------------+---------------+--------------------------------+
| openssl | CVE-2019-1563    | MEDIUM   | 1.1.1b-r1         | 1.1.1d-r0     | openssl: information           |
|         |                  |          |                   |               | disclosure in PKCS7_dataDecode |
|         |                  |          |                   |               | and CMS_decrypt_set1_pkey      |
+         +------------------+          +                   +               +--------------------------------+
|         | CVE-2019-1549    |          |                   |               | openssl: information           |
|         |                  |          |                   |               | disclosure in fork()           |
+         +------------------+----------+                   +               +--------------------------------+
|         | CVE-2019-1547    | LOW      |                   |               | openssl: side-channel weak     |
|         |                  |          |                   |               | encryption vulnerability       |
+---------+------------------+----------+-------------------+---------------+--------------------------------+

I'm not saying we shouldn't try to get rid of those, but the criticality might be much lower in our context. As for removing unneeded packages, I think we could try to do that, many of those are there as an dependency for debian (especially apt) itself, so we would have to do that as last step.

Agreed, this is probably not a high priority task but any opportunity to improve the situation without requiring a lot of extra work would be worth exploring IMO. Again, this is a security tool so it's a tasty target. And just because we can't imagine attack scenarios based on previous incidents doesn't mean much given how creative attackers are!

@AlexandreGohier commented on GitHub (Oct 27, 2019): > Not really, they should be functionally the same. The problem is, that we don't have MySQL variants of alpine image, but if you don't need that you're fine. Thanks for that answer. I was wondering why use MySQL or Postgre instead of sqLite? Is it just a matter of benefiting from operational workflows already in-place or are there other benefits? Not wanting to host a MSSQL server instance is what got me looking at bitwarden_rs in the first place... Since other forks can run on lambda and dynamodb, it must mean most of the data is key-value based. In a distributed, high-availability scenario, something such as Consul would probably also make a robust back-end storage option. > This makes me wonder - because the alpine version is statically linked binary, does that mean some of the library vulnerabilities would apply even on alpine considering the binary is built on debian-based image? I'm not familiar enough with Alpine to risk an answer to that. However, running a scan on older Alpine images does identify some vulnerabilities that were since patched: ``` bitwardenrs/server:1.9.1-alpine (alpine 3.9.4) ============================================== Total: 4 (UNKNOWN: 0, LOW: 1, MEDIUM: 2, HIGH: 1, CRITICAL: 0) +---------+------------------+----------+-------------------+---------------+--------------------------------+ | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | +---------+------------------+----------+-------------------+---------------+--------------------------------+ | musl | CVE-2019-14697 | HIGH | 1.1.20-r4 | 1.1.20-r5 | musl libc through 1.1.23 | | | | | | | has an x87 floating-point | | | | | | | stack adjustment imbalance, | | | | | | | related... | +---------+------------------+----------+-------------------+---------------+--------------------------------+ | openssl | CVE-2019-1563 | MEDIUM | 1.1.1b-r1 | 1.1.1d-r0 | openssl: information | | | | | | | disclosure in PKCS7_dataDecode | | | | | | | and CMS_decrypt_set1_pkey | + +------------------+ + + +--------------------------------+ | | CVE-2019-1549 | | | | openssl: information | | | | | | | disclosure in fork() | + +------------------+----------+ + +--------------------------------+ | | CVE-2019-1547 | LOW | | | openssl: side-channel weak | | | | | | | encryption vulnerability | +---------+------------------+----------+-------------------+---------------+--------------------------------+ ``` > I'm not saying we shouldn't try to get rid of those, but the criticality might be much lower in our context. As for removing unneeded packages, I think we could try to do that, many of those are there as an dependency for debian (especially apt) itself, so we would have to do that as last step. Agreed, this is probably not a high priority task but any opportunity to improve the situation without requiring a lot of extra work would be worth exploring IMO. Again, this is a security tool so it's a tasty target. And just because we can't imagine attack scenarios based on previous incidents doesn't mean much given how creative attackers are!
Author
Owner

@mprasil commented on GitHub (Oct 27, 2019):

I've ran couple for loops trying to figure out non-essential packages 😄 and here's how many we could remove as last step in the debian-based image:

RUN dpkg --purge --force-all --no-triggers \
    gcc-8-base \
    libapt-pkg5.0 \
    libc-bin \
    libldap-common \
    liblz4-1 \
    libncursesw6 \
    libpcre3 \
    libseccomp2 \
    libsqlite3-0 \
    libstdc++6 \
    apt \
    login \
    ncurses-base \
    ncurses-bin \
    libsystemd0 \
    libtinfo6 \
    libudev1 \
    passwd \
    perl-base \
    sysvinit-utils \
    tar \
    bash

This still leaves couple vulnerable packages in:

Total: 44 (UNKNOWN: 1, LOW: 8, MEDIUM: 28, HIGH: 7, CRITICAL: 0)

+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
|     LIBRARY      |  VULNERABILITY ID   | SEVERITY |   INSTALLED VERSION   | FIXED VERSION |                            TITLE                             |
+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| coreutils        | CVE-2016-2781       | LOW      | 8.30-3                |               | coreutils: Non-privileged                                    |
|                  |                     |          |                       |               | session can escape to the                                    |
|                  |                     |          |                       |               | parent session in chroot                                     |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2017-18018      |          |                       |               | coreutils: race condition                                    |
|                  |                     |          |                       |               | vulnerability in chown and                                   |
|                  |                     |          |                       |               | chgrp                                                        |
+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| curl             | CVE-2019-5481       | HIGH     | 7.64.0-4              |               | curl: double free due to                                     |
|                  |                     |          |                       |               | subsequent call of realloc()                                 |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2019-5482       |          |                       |               | curl: heap buffer overflow in                                |
|                  |                     |          |                       |               | function tftp_receive_packet()                               |
+------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libc6            | CVE-2019-1010022    |          | 2.28-10               |               | glibc: stack guard protection                                |
|                  |                     |          |                       |               | bypass                                                       |
+                  +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                  | CVE-2010-4051       | MEDIUM   |                       |               | CVE-2010-4052 glibc:                                         |
|                  |                     |          |                       |               | De-recursivise regular                                       |
|                  |                     |          |                       |               | expression engine                                            |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2010-4052       |          |                       |               | CVE-2010-4051 CVE-2010-4052                                  |
|                  |                     |          |                       |               | glibc: De-recursivise regular                                |
|                  |                     |          |                       |               | expression engine                                            |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2010-4756       |          |                       |               | glibc: glob implementation can                               |
|                  |                     |          |                       |               | cause excessive CPU and memory                               |
|                  |                     |          |                       |               | consumption due to...                                        |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2016-10228      |          |                       |               | glibc: iconv program can                                     |
|                  |                     |          |                       |               | hang when invoked with the -c                                |
|                  |                     |          |                       |               | option                                                       |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2018-20796      |          |                       |               | glibc: uncontrolled                                          |
|                  |                     |          |                       |               | recursion in function                                        |
|                  |                     |          |                       |               | check_dst_limits_calc_pos_1 in                               |
|                  |                     |          |                       |               | posix/regexec.c                                              |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2019-1010023    |          |                       |               | GNU Libc current is affected                                 |
|                  |                     |          |                       |               | by: Re-mapping current loaded                                |
|                  |                     |          |                       |               | libray with malicious...                                     |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2019-1010024    |          |                       |               | GNU Libc current is affected                                 |
|                  |                     |          |                       |               | by: Mitigation bypass. The                                   |
|                  |                     |          |                       |               | impact is: Attacker...                                       |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2019-1010025    |          |                       |               | glibc: information disclosure                                |
|                  |                     |          |                       |               | of heap addresses of                                         |
|                  |                     |          |                       |               | pthread_created thread                                       |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2019-9192       |          |                       |               | glibc: uncontrolled                                          |
|                  |                     |          |                       |               | recursion in function                                        |
|                  |                     |          |                       |               | check_dst_limits_calc_pos_1 in                               |
|                  |                     |          |                       |               | posix/regexec.c                                              |
+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libcurl4         | CVE-2019-5481       | HIGH     | 7.64.0-4              |               | curl: double free due to                                     |
|                  |                     |          |                       |               | subsequent call of realloc()                                 |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2019-5482       |          |                       |               | curl: heap buffer overflow in                                |
|                  |                     |          |                       |               | function tftp_receive_packet()                               |
+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libgcc1          | CVE-2018-12886      | MEDIUM   | 8.3.0-6               |               | gcc: spilling of stack                                       |
|                  |                     |          |                       |               | protection address in                                        |
|                  |                     |          |                       |               | cfgexpand.c and function.c                                   |
|                  |                     |          |                       |               | leads to...                                                  |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2019-15847      |          |                       |               | gcc: POWER9 "DARN" RNG                                       |
|                  |                     |          |                       |               | intrinsic produces repeated                                  |
|                  |                     |          |                       |               | output                                                       |
+------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libgcrypt20      | CVE-2018-6829       |          | 1.8.4-5               |               | libgcrypt: ElGamal                                           |
|                  |                     |          |                       |               | implementation doesn't                                       |
|                  |                     |          |                       |               | have semantic security                                       |
|                  |                     |          |                       |               | due to incorrectly encoded                                   |
|                  |                     |          |                       |               | plaintexts...                                                |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2019-12904      |          |                       |               | Libgcrypt: physical addresses                                |
|                  |                     |          |                       |               | being available to other                                     |
|                  |                     |          |                       |               | processes leads to a                                         |
|                  |                     |          |                       |               | flush-and-reload...                                          |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2019-13627      |          |                       |               | libgcrypt: ECDSA timing                                      |
|                  |                     |          |                       |               | attack in the libgcrypt20                                    |
|                  |                     |          |                       |               | cryptographic library                                        |
+------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libgnutls30      | CVE-2011-3389       |          | 3.6.7-4               |               | HTTPS: block-wise                                            |
|                  |                     |          |                       |               | chosen-plaintext attack                                      |
|                  |                     |          |                       |               | against SSL/TLS (BEAST)                                      |
+------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libgssapi-krb5-2 | CVE-2018-5709       |          | 1.17-3                |               | krb5: integer overflow                                       |
|                  |                     |          |                       |               | in dbentry->n_key_data in                                    |
|                  |                     |          |                       |               | kadmin/dbutil/dump.c                                         |
+                  +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                  | CVE-2004-0971       | LOW      |                       |               | security flaw                                                |
+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libidn2-0        | CVE-2019-18224      | HIGH     | 2.0.5-1               |               | libidn2: heap-based buffer                                   |
|                  |                     |          |                       |               | overflow in idn2_to_ascii_4i                                 |
|                  |                     |          |                       |               | in lib/lookup.c                                              |
+                  +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                  | CVE-2019-12290      | UNKNOWN  |                       |               | GNU libidn2 before 2.2.0                                     |
|                  |                     |          |                       |               | fails to perform the roundtrip                               |
|                  |                     |          |                       |               | checks specified in...                                       |
+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libk5crypto3     | CVE-2018-5709       | MEDIUM   | 1.17-3                |               | krb5: integer overflow                                       |
|                  |                     |          |                       |               | in dbentry->n_key_data in                                    |
|                  |                     |          |                       |               | kadmin/dbutil/dump.c                                         |
+                  +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                  | CVE-2004-0971       | LOW      |                       |               | security flaw                                                |
+------------------+---------------------+----------+                       +---------------+--------------------------------------------------------------+
| libkrb5-3        | CVE-2018-5709       | MEDIUM   |                       |               | krb5: integer overflow                                       |
|                  |                     |          |                       |               | in dbentry->n_key_data in                                    |
|                  |                     |          |                       |               | kadmin/dbutil/dump.c                                         |
+                  +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                  | CVE-2004-0971       | LOW      |                       |               | security flaw                                                |
+------------------+---------------------+----------+                       +---------------+--------------------------------------------------------------+
| libkrb5support0  | CVE-2018-5709       | MEDIUM   |                       |               | krb5: integer overflow                                       |
|                  |                     |          |                       |               | in dbentry->n_key_data in                                    |
|                  |                     |          |                       |               | kadmin/dbutil/dump.c                                         |
+                  +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                  | CVE-2004-0971       | LOW      |                       |               | security flaw                                                |
+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libldap-2.4-2    | CVE-2015-3276       | MEDIUM   | 2.4.47+dfsg-3+deb10u1 |               | openldap: incorrect                                          |
|                  |                     |          |                       |               | multi-keyword mode                                           |
|                  |                     |          |                       |               | cipherstring parsing                                         |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2017-17740      |          |                       |               | openldap:                                                    |
|                  |                     |          |                       |               | contrib/slapd-modules/nops/nops.c                            |
|                  |                     |          |                       |               | attempts to free stack buffer                                |
|                  |                     |          |                       |               | allowing remote attackers to                                 |
|                  |                     |          |                       |               | cause...                                                     |
+                  +---------------------+----------+                       +---------------+--------------------------------------------------------------+
|                  | CVE-2017-14159      | LOW      |                       |               | openldap: Privilege escalation                               |
|                  |                     |          |                       |               | via PID file manipulation                                    |
+------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libnghttp2-14    | TEMP-0000000-A4EF31 |          | 1.36.0-2+deb10u1      |               |                                                              |
+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libssh2-1        | CVE-2019-13115      | MEDIUM   | 1.8.0-2.1             |               | libssh2: integer overflow in                                 |
|                  |                     |          |                       |               | kex_method_diffie_hellman_group_exchange_sha256_key_exchange |
|                  |                     |          |                       |               | in kex.c leads to out-of-bounds write                        |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2019-17498      |          |                       |               | In libssh2 v1.9.0 and                                        |
|                  |                     |          |                       |               | earlier versions, the                                        |
|                  |                     |          |                       |               | SSH_MSG_DISCONNECT logic in                                  |
|                  |                     |          |                       |               | packet.c has...                                              |
+------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| libssl1.1        | CVE-2007-6755       |          | 1.1.1d-0+deb10u2      |               | Dual_EC_DRBG: weak pseudo                                    |
|                  |                     |          |                       |               | random number generator                                      |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2010-0928       |          |                       |               | openssl: RSA authentication                                  |
|                  |                     |          |                       |               | weakness                                                     |
+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| libtasn1-6       | CVE-2018-1000654    | HIGH     | 4.13-3                |               | libtasn1: Infinite loop in                                   |
|                  |                     |          |                       |               | _asn1_expand_object_id(ptree)                                |
|                  |                     |          |                       |               | leads to memory exhaustion                                   |
+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+
| openssl          | CVE-2007-6755       | MEDIUM   | 1.1.1d-0+deb10u2      |               | Dual_EC_DRBG: weak pseudo                                    |
|                  |                     |          |                       |               | random number generator                                      |
+                  +---------------------+          +                       +---------------+--------------------------------------------------------------+
|                  | CVE-2010-0928       |          |                       |               | openssl: RSA authentication                                  |
|                  |                     |          |                       |               | weakness                                                     |
+------------------+---------------------+          +-----------------------+---------------+--------------------------------------------------------------+
| sqlite3          | CVE-2019-16168      |          | 3.27.2-3              |               | In SQLite through 3.29.0,                                    |
|                  |                     |          |                       |               | whereLoopAddBtreeIndex in                                    |
|                  |                     |          |                       |               | sqlite3.c can crash a browser                                |
|                  |                     |          |                       |               | or...                                                        |
+------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+

Unfortunately these are either our direct dependencies or dependencies of curl(probably most of these) and sqlite. We could get rid of curl but that would mean removing health check. We could also get rid of sqlite but we added this to enable backup button in admin interface.

And I should add that removing above packages essentially renders the system inside completely broken to the point that it's unable to install them back. It still works for the purpose of running the service, but for any users using our image as base image and adding more stuff on top, this would break their setup without any good alternative.

So I'm very hesitant about doing this. Especially with the understanding that most of the issues do not present a problem inside a container with single bitwarden_rs process, so the benefits are really questionable. Maybe we could point security strict users to alpine as that image is leaner and hence ships with less (or none) vulnerable packages? (the price being paid here is that we don't have MySQL image available)

I was wondering why use MySQL or Postgre instead of sqLite?

As with everything here, there are millions of reasons. The benefit of using something already in place is one thing I've often saw as argument to implement it. It was clearly tangible enough benefit for multiple users to implement this and submit a PR.

Thanks for raising this BTW, trivy looks quite cool and I'm glad I've learned about it.

@mprasil commented on GitHub (Oct 27, 2019): I've ran couple for loops trying to figure out non-essential packages :smile: and here's how many we could remove as last step in the debian-based image: ```Dockerfile RUN dpkg --purge --force-all --no-triggers \ gcc-8-base \ libapt-pkg5.0 \ libc-bin \ libldap-common \ liblz4-1 \ libncursesw6 \ libpcre3 \ libseccomp2 \ libsqlite3-0 \ libstdc++6 \ apt \ login \ ncurses-base \ ncurses-bin \ libsystemd0 \ libtinfo6 \ libudev1 \ passwd \ perl-base \ sysvinit-utils \ tar \ bash ``` This still leaves couple vulnerable packages in: ``` Total: 44 (UNKNOWN: 1, LOW: 8, MEDIUM: 28, HIGH: 7, CRITICAL: 0) +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | coreutils | CVE-2016-2781 | LOW | 8.30-3 | | coreutils: Non-privileged | | | | | | | session can escape to the | | | | | | | parent session in chroot | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-18018 | | | | coreutils: race condition | | | | | | | vulnerability in chown and | | | | | | | chgrp | +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | curl | CVE-2019-5481 | HIGH | 7.64.0-4 | | curl: double free due to | | | | | | | subsequent call of realloc() | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-5482 | | | | curl: heap buffer overflow in | | | | | | | function tftp_receive_packet() | +------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libc6 | CVE-2019-1010022 | | 2.28-10 | | glibc: stack guard protection | | | | | | | bypass | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2010-4051 | MEDIUM | | | CVE-2010-4052 glibc: | | | | | | | De-recursivise regular | | | | | | | expression engine | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4052 | | | | CVE-2010-4051 CVE-2010-4052 | | | | | | | glibc: De-recursivise regular | | | | | | | expression engine | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-4756 | | | | glibc: glob implementation can | | | | | | | cause excessive CPU and memory | | | | | | | consumption due to... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2016-10228 | | | | glibc: iconv program can | | | | | | | hang when invoked with the -c | | | | | | | option | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2018-20796 | | | | glibc: uncontrolled | | | | | | | recursion in function | | | | | | | check_dst_limits_calc_pos_1 in | | | | | | | posix/regexec.c | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010023 | | | | GNU Libc current is affected | | | | | | | by: Re-mapping current loaded | | | | | | | libray with malicious... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010024 | | | | GNU Libc current is affected | | | | | | | by: Mitigation bypass. The | | | | | | | impact is: Attacker... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-1010025 | | | | glibc: information disclosure | | | | | | | of heap addresses of | | | | | | | pthread_created thread | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-9192 | | | | glibc: uncontrolled | | | | | | | recursion in function | | | | | | | check_dst_limits_calc_pos_1 in | | | | | | | posix/regexec.c | +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libcurl4 | CVE-2019-5481 | HIGH | 7.64.0-4 | | curl: double free due to | | | | | | | subsequent call of realloc() | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-5482 | | | | curl: heap buffer overflow in | | | | | | | function tftp_receive_packet() | +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libgcc1 | CVE-2018-12886 | MEDIUM | 8.3.0-6 | | gcc: spilling of stack | | | | | | | protection address in | | | | | | | cfgexpand.c and function.c | | | | | | | leads to... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-15847 | | | | gcc: POWER9 "DARN" RNG | | | | | | | intrinsic produces repeated | | | | | | | output | +------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libgcrypt20 | CVE-2018-6829 | | 1.8.4-5 | | libgcrypt: ElGamal | | | | | | | implementation doesn't | | | | | | | have semantic security | | | | | | | due to incorrectly encoded | | | | | | | plaintexts... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-12904 | | | | Libgcrypt: physical addresses | | | | | | | being available to other | | | | | | | processes leads to a | | | | | | | flush-and-reload... | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-13627 | | | | libgcrypt: ECDSA timing | | | | | | | attack in the libgcrypt20 | | | | | | | cryptographic library | +------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libgnutls30 | CVE-2011-3389 | | 3.6.7-4 | | HTTPS: block-wise | | | | | | | chosen-plaintext attack | | | | | | | against SSL/TLS (BEAST) | +------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libgssapi-krb5-2 | CVE-2018-5709 | | 1.17-3 | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | LOW | | | security flaw | +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libidn2-0 | CVE-2019-18224 | HIGH | 2.0.5-1 | | libidn2: heap-based buffer | | | | | | | overflow in idn2_to_ascii_4i | | | | | | | in lib/lookup.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2019-12290 | UNKNOWN | | | GNU libidn2 before 2.2.0 | | | | | | | fails to perform the roundtrip | | | | | | | checks specified in... | +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libk5crypto3 | CVE-2018-5709 | MEDIUM | 1.17-3 | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | LOW | | | security flaw | +------------------+---------------------+----------+ +---------------+--------------------------------------------------------------+ | libkrb5-3 | CVE-2018-5709 | MEDIUM | | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | LOW | | | security flaw | +------------------+---------------------+----------+ +---------------+--------------------------------------------------------------+ | libkrb5support0 | CVE-2018-5709 | MEDIUM | | | krb5: integer overflow | | | | | | | in dbentry->n_key_data in | | | | | | | kadmin/dbutil/dump.c | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2004-0971 | LOW | | | security flaw | +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libldap-2.4-2 | CVE-2015-3276 | MEDIUM | 2.4.47+dfsg-3+deb10u1 | | openldap: incorrect | | | | | | | multi-keyword mode | | | | | | | cipherstring parsing | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2017-17740 | | | | openldap: | | | | | | | contrib/slapd-modules/nops/nops.c | | | | | | | attempts to free stack buffer | | | | | | | allowing remote attackers to | | | | | | | cause... | + +---------------------+----------+ +---------------+--------------------------------------------------------------+ | | CVE-2017-14159 | LOW | | | openldap: Privilege escalation | | | | | | | via PID file manipulation | +------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libnghttp2-14 | TEMP-0000000-A4EF31 | | 1.36.0-2+deb10u1 | | | +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libssh2-1 | CVE-2019-13115 | MEDIUM | 1.8.0-2.1 | | libssh2: integer overflow in | | | | | | | kex_method_diffie_hellman_group_exchange_sha256_key_exchange | | | | | | | in kex.c leads to out-of-bounds write | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2019-17498 | | | | In libssh2 v1.9.0 and | | | | | | | earlier versions, the | | | | | | | SSH_MSG_DISCONNECT logic in | | | | | | | packet.c has... | +------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | libssl1.1 | CVE-2007-6755 | | 1.1.1d-0+deb10u2 | | Dual_EC_DRBG: weak pseudo | | | | | | | random number generator | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-0928 | | | | openssl: RSA authentication | | | | | | | weakness | +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | libtasn1-6 | CVE-2018-1000654 | HIGH | 4.13-3 | | libtasn1: Infinite loop in | | | | | | | _asn1_expand_object_id(ptree) | | | | | | | leads to memory exhaustion | +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ | openssl | CVE-2007-6755 | MEDIUM | 1.1.1d-0+deb10u2 | | Dual_EC_DRBG: weak pseudo | | | | | | | random number generator | + +---------------------+ + +---------------+--------------------------------------------------------------+ | | CVE-2010-0928 | | | | openssl: RSA authentication | | | | | | | weakness | +------------------+---------------------+ +-----------------------+---------------+--------------------------------------------------------------+ | sqlite3 | CVE-2019-16168 | | 3.27.2-3 | | In SQLite through 3.29.0, | | | | | | | whereLoopAddBtreeIndex in | | | | | | | sqlite3.c can crash a browser | | | | | | | or... | +------------------+---------------------+----------+-----------------------+---------------+--------------------------------------------------------------+ ``` Unfortunately these are either our direct dependencies or dependencies of `curl`(probably most of these) and `sqlite`. We could get rid of `curl` but that would mean removing health check. We could also get rid of `sqlite` but we added this to enable backup button in admin interface. And I should add that removing above packages essentially renders the system inside completely broken to the point that it's unable to install them back. It still works for the purpose of running the service, but for any users using our image as base image and adding more stuff on top, this would break their setup without any good alternative. So I'm very hesitant about doing this. Especially with the understanding that most of the issues do not present a problem inside a container with single `bitwarden_rs` process, so the benefits are _really_ questionable. Maybe we could point security strict users to alpine as that image is leaner and hence ships with less (or none) vulnerable packages? (the price being paid here is that we don't have MySQL image available) > I was wondering why use MySQL or Postgre instead of sqLite? As with everything here, there are millions of reasons. The benefit of using something already in place is one thing I've often saw as argument to implement it. It was clearly tangible enough benefit for multiple users to implement this and submit a PR. Thanks for raising this BTW, trivy looks quite cool and I'm glad I've learned about it.
Author
Owner

@AlexandreGohier commented on GitHub (Oct 27, 2019):

So I'm very hesitant about doing this

I understand, it's anyone's guess what use is made of the image downstream. You could try forking the Debian image in two variants: "debian_hardened" and "debian_full", put the "latest" tag on the hardened one, write a short wiki about the change and check the download stats of both images. If no one notices, then the full image can be dropped over time and everyone benefits from added invisible security. If on the other hand there are complaints and significant downloads of the full image, then there might not be a use-case for the hardened image (the Alpine one would still be a hardening option indeed).

Thanks for raising this BTW, trivy looks quite cool and I'm glad I've learned about it.

Thank you again very much for caring about security!

@AlexandreGohier commented on GitHub (Oct 27, 2019): > So I'm very hesitant about doing this I understand, it's anyone's guess what use is made of the image downstream. You could try forking the Debian image in two variants: "debian_hardened" and "debian_full", put the "latest" tag on the hardened one, write a short wiki about the change and check the download stats of both images. If no one notices, then the full image can be dropped over time and everyone benefits from added invisible security. If on the other hand there are complaints and significant downloads of the full image, then there might not be a use-case for the hardened image (the Alpine one would still be a hardening option indeed). > Thanks for raising this BTW, trivy looks quite cool and I'm glad I've learned about it. Thank you again very much for caring about security!
Author
Owner

@dani-garcia commented on GitHub (Oct 27, 2019):

Personally I never heard of someone depending on our image as a base, I think anyone doing that would be better just modifying our dockerfiles and building it themselves.

If we could get the alpine image building correctly for all databases we could point to that one as the more secure one, or even discontinue the debian based, which wouldn't offer any benefits.

@dani-garcia commented on GitHub (Oct 27, 2019): Personally I never heard of someone depending on our image as a base, I think anyone doing that would be better just modifying our dockerfiles and building it themselves. If we could get the alpine image building correctly for all databases we could point to that one as the more secure one, or even discontinue the debian based, which wouldn't offer any benefits.
Author
Owner

@AlexandreGohier commented on GitHub (Oct 27, 2019):

Yes even better if that can be achieved.

@AlexandreGohier commented on GitHub (Oct 27, 2019): Yes even better if that can be achieved.
Author
Owner

@mprasil commented on GitHub (Oct 28, 2019):

I was curious, so tried to search and actually found image that's using our image as one of the sources. That is one public image that we know of. Forking our repo and modifying the Dockerfile is quite a lot more effort to keep up with compared to keeping your simple Dockerfile that probably has couple lines in it and pretty much never changes. So I wouldn't be surprised there are more users like that.

We've also suggested that people should add sqlite on top of our image in the past to avail of admin backup functionality.

Plus let me reiterate that even if we did all that, we still need curl and sqlite inside. So breaking apt just to remove tar is still meaningless exercise all things considered. I mean you'd be literary trying to fix an issue that is absolutely irrelevant:

does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges

I mean how likely are you to trick someone to go inside the docker container and unpack an tar file with malicious content and then you need to get inside that container yourself as non-root (which in all honesty won't be the case, you'll be root already) and you'd use the trick to gain root privileges.. (the issue is just warning mind you, even fixed version wouldn't prevent such files being created..)

So yeah, I do think most of the security issues are absolutely irrelevant in our context.

I'd be up for using alpine as default image, but we need to figure out reliable way to compile statically linked binaries for all versions of backends we use.

@mprasil commented on GitHub (Oct 28, 2019): I was curious, so tried to search and actually [found](https://github.com/hassio-addons/addon-bitwarden/blob/a184cec2b6046a66120dc4d11408e03ac43663de/bitwarden/Dockerfile) image that's using our image as one of the sources. That is one public image that we know of. Forking our repo and modifying the Dockerfile is quite a lot more effort to keep up with compared to keeping your simple Dockerfile that probably has couple lines in it and pretty much never changes. So I wouldn't be surprised there are more users like that. We've also suggested that people should add sqlite on top of our image in the past to avail of admin backup functionality. Plus let me reiterate that even if we did all that, we still need curl and sqlite inside. So breaking `apt` just to remove `tar` is still meaningless exercise all things considered. I mean you'd be literary trying to fix an issue that is absolutely irrelevant: > does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges I mean how likely are you to trick someone to go inside the docker container and unpack an tar file with malicious content _and then_ you need to get inside that container yourself as non-root (which in all honesty won't be the case, you'll be root already) and you'd use the trick to gain root privileges.. (the issue is just warning mind you, even fixed version wouldn't prevent such files being created..) So yeah, I do think most of the security issues are absolutely irrelevant in our context. I'd be up for using alpine as default image, but we need to figure out reliable way to compile statically linked binaries for all versions of backends we use.
Author
Owner

@AlexandreGohier commented on GitHub (Oct 29, 2019):

I'd be up for using alpine as default image, but we need to figure out reliable way to compile statically linked binaries for all versions of backends we use.

That's probably the best medium-term bet. For the Debian-based images, the real sustainable solution anyway is to patch or to reduce the attack surface upstream... meanwhile it may be more efficient to work on new functionalities for the Alpine image instead, that's less likely to break things for downstream projects. I've started using the Alpine image and I can't tell the difference so far. There are probably many sqlite users that went for the default Debian image like I did but could do with Alpine.

Should we close this issue?

@AlexandreGohier commented on GitHub (Oct 29, 2019): > I'd be up for using alpine as default image, but we need to figure out reliable way to compile statically linked binaries for all versions of backends we use. That's probably the best medium-term bet. For the Debian-based images, the real sustainable solution anyway is to patch or to reduce the attack surface upstream... meanwhile it may be more efficient to work on new functionalities for the Alpine image instead, that's less likely to break things for downstream projects. I've started using the Alpine image and I can't tell the difference so far. There are probably many sqlite users that went for the default Debian image like I did but could do with Alpine. Should we close this issue?
Author
Owner

@tckb commented on GitHub (Oct 29, 2019):

any updates on this one? did we come to a conclusion or any one have a better base image with less vulnerabilities ?

@tckb commented on GitHub (Oct 29, 2019): any updates on this one? did we come to a conclusion or any one have a better base image with less vulnerabilities ?
Author
Owner

@gnu300 commented on GitHub (Nov 20, 2019):

After building the image based on the Dockerfile i scanned it with clair. The result of the scan shows that there are 3 vulnerabilities left for which already a fixed version exists:

PACKAGE VULNERABILITY-ID SEVERITY INSTALLED-VERSION FIXED-VERSION
ncurses CVE-2019-17595 LOW 6.1+20181013-2+deb10u1 6.1+20181013-2+deb10u2
ncurses CVE-2019-17594 LOW 6.1+20181013-2+deb10u1 6.1+20181013-2+deb10u2
systemd CVE-2019-15718 Negligible 241-7~deb10u1 241-7~deb10u2
@gnu300 commented on GitHub (Nov 20, 2019): After building the image based on the Dockerfile i scanned it with [clair](https://github.com/quay/clair). The result of the scan shows that there are 3 vulnerabilities left for which already a fixed version exists: | PACKAGE | VULNERABILITY-ID | SEVERITY | INSTALLED-VERSION | FIXED-VERSION | |---------|------------------|------------|------------------------|------------------------| | ncurses | CVE-2019-17595 | LOW | 6.1+20181013-2+deb10u1 | 6.1+20181013-2+deb10u2 | | ncurses | CVE-2019-17594 | LOW | 6.1+20181013-2+deb10u1 | 6.1+20181013-2+deb10u2 | | systemd | CVE-2019-15718 | Negligible | 241-7~deb10u1 | 241-7~deb10u2 |
Author
Owner

@AlexandreGohier commented on GitHub (Nov 20, 2019):

It would be interesting to compare the scan results between clair and trivy for the same image. AFAIK, trivy can detect more vulns in 3rd party libraries.

@AlexandreGohier commented on GitHub (Nov 20, 2019): It would be interesting to compare the scan results between clair and trivy for the same image. AFAIK, trivy can detect more vulns in 3rd party libraries.
Author
Owner

@frdescam commented on GitHub (May 19, 2020):

I saw that now the amd64 image is built on alpine, but what about the other arch? It would be great to have an alpine based image for raspberry (for security and lightness), is there any limitation on building from alpine for arm?

@frdescam commented on GitHub (May 19, 2020): I saw that now the amd64 image is built on alpine, but what about the other arch? It would be great to have an alpine based image for raspberry (for security and lightness), is there any limitation on building from alpine for arm?
Author
Owner

@dadatuputi commented on GitHub (May 27, 2020):

Regarding vulnerable packages, what about updating them using a package manager (apt, apk, etc), assuming that the repos have patched versions of the vulnerable programs and libraries? Instead of removing them, just update them on each run.

@dadatuputi commented on GitHub (May 27, 2020): Regarding vulnerable packages, what about updating them using a package manager (apt, apk, etc), assuming that the repos have patched versions of the vulnerable programs and libraries? Instead of removing them, just update them on each run.
Author
Owner

@gnu300 commented on GitHub (May 28, 2020):

I would go for a more progressive approach and think about a distroless container:
https://www.andreafortuna.org/2020/02/19/the-distroless-approach-to-docker-containers/
https://github.com/GoogleContainerTools/distroless

@gnu300 commented on GitHub (May 28, 2020): I would go for a more progressive approach and think about a distroless container: https://www.andreafortuna.org/2020/02/19/the-distroless-approach-to-docker-containers/ https://github.com/GoogleContainerTools/distroless
Author
Owner

@BlackDex commented on GitHub (Sep 22, 2020):

That is nice for go applications since they most of the time are build statically by default and thus could use a very small base system. Unfortunately for us to build statically we would need to use musl, which is causing some errors during build.
To not make it more complex i think it is better to keep it as is and just keep updating too the most recent base image.

@BlackDex commented on GitHub (Sep 22, 2020): That is nice for go applications since they most of the time are build statically by default and thus could use a very small base system. Unfortunately for us to build statically we would need to use musl, which is causing some errors during build. To not make it more complex i think it is better to keep it as is and just keep updating too the most recent base image.
Author
Owner

@BlackDex commented on GitHub (Oct 4, 2020):

We have updates the Final docker base for the builds some time back.
Creating static builds or bare containers is something we could look at in the future. Lets put this on the meta features requests.

@BlackDex commented on GitHub (Oct 4, 2020): We have updates the Final docker base for the builds some time back. Creating static builds or bare containers is something we could look at in the future. Lets put this on the meta features requests.
Author
Owner

@reneleonhardt commented on GitHub (Jun 24, 2025):

@BlackDex You are using musl in Dockerfile.alpine, can a static build be revised?

$ file /vaultwarden 
/vaultwarden: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, not stripped
vaultwarden/server (debian 12.11)
Total: 788 (LOW: 170, MEDIUM: 462, HIGH: 154, CRITICAL: 2)

--ignore-unfixed (strange, as you run apt-get update)
Total: 56 (LOW: 3, MEDIUM: 33, HIGH: 20, CRITICAL: 0)

In addition, is there a technical reason to run as root and opening port 80?

I'm wondering, wouldn't rust-postgres be enough to allow connecting to Postgres without libpq5 and openssl via native-tls? 🤔

@reneleonhardt commented on GitHub (Jun 24, 2025): @BlackDex You are using musl in Dockerfile.alpine, can a static build be revised? ``` $ file /vaultwarden /vaultwarden: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, not stripped ``` ``` vaultwarden/server (debian 12.11) Total: 788 (LOW: 170, MEDIUM: 462, HIGH: 154, CRITICAL: 2) --ignore-unfixed (strange, as you run apt-get update) Total: 56 (LOW: 3, MEDIUM: 33, HIGH: 20, CRITICAL: 0) ``` In addition, is there a technical reason to run as root and opening port 80? I'm wondering, wouldn't [rust-postgres](https://github.com/sfackler/rust-postgres) be enough to allow connecting to Postgres without libpq5 and openssl via native-tls? 🤔
Author
Owner

@BlackDex commented on GitHub (Jun 25, 2025):

We can only use libraries supported by the Diesel ORM which is only pq-sys, so probably not.

native-tls still uses openssl, so not sure what you will gain with that route? What is wrong with the current way?

Vaultwarden on Alpine is fully static, and i can even run it on my Android.

I still have a busybox/from-scratch image on my to-do list, probably busybox since there are some scripts we use to allow some modifications.

Also, port 80 shouldn't be an issue modern docker/podman work just fine with that port without root even.

And it's more historically that it currently runs as root, but changing it could cause issues with current deployments. The busybox on my to-do list would not be running as root though.

@BlackDex commented on GitHub (Jun 25, 2025): We can only use libraries supported by the Diesel ORM which is only `pq-sys`, so probably not. `native-tls` still uses openssl, so not sure what you will gain with that route? What is wrong with the current way? Vaultwarden on Alpine is fully static, and i can even run it on my Android. I still have a busybox/from-scratch image on my to-do list, probably busybox since there are some scripts we use to allow some modifications. Also, port 80 shouldn't be an issue modern docker/podman work just fine with that port without root even. And it's more historically that it currently runs as root, but changing it could cause issues with current deployments. The busybox on my to-do list would not be running as root though.
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/vaultwarden#460