elasticsearch/elasticsearch:8.3.2-amd64

Size
643.72 MB
Architecture
amd64
Created
2022-07-06
Pull command
docker pull docker.elastic.co/elasticsearch/elasticsearch:8.3.2-amd64

Vulnerability report

Critical

0

High

1

Medium

80

Low

32

Negligible

5

Unknown

0

High

CVEPackageVersionDescription
CVE-2023-0286openssl1.1.1f-1ubuntu2.16There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.

Medium

CVEPackageVersionDescription
CVE-2022-23491ca-certificates20211016~20.04.1Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.
CVE-2023-0361gnutls283.6.13-2ubuntu1.6A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.
CVE-2022-2509gnutls283.6.13-2ubuntu1.6A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
CVE-2022-4415systemd245.4-4ubuntu3.17A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
CVE-2022-3821systemd245.4-4ubuntu3.17An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.
CVE-2020-16156perl5.30.0-9ubuntu0.2CPAN 2.28 allows Signature Verification Bypass.
CVE-2022-2344vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.
CVE-2022-1619vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution
CVE-2022-1616vim2:8.1.2269-1ubuntu5.7Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
CVE-2022-0319vim2:8.1.2269-1ubuntu5.7Out-of-bounds Read in vim/vim prior to 8.2.
CVE-2022-2980vim2:8.1.2269-1ubuntu5.7NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.
CVE-2022-2923vim2:8.1.2269-1ubuntu5.7NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.
CVE-2022-2343vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.
CVE-2022-1154vim2:8.1.2269-1ubuntu5.7Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.
CVE-2022-1927vim2:8.1.2269-1ubuntu5.7Buffer Over-read in GitHub repository vim/vim prior to 8.2.
CVE-2022-1851vim2:8.1.2269-1ubuntu5.7Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
CVE-2022-0629vim2:8.1.2269-1ubuntu5.7Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
CVE-2022-1720vim2:8.1.2269-1ubuntu5.7Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
CVE-2022-1674vim2:8.1.2269-1ubuntu5.7NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.
CVE-2022-1968vim2:8.1.2269-1ubuntu5.7Use After Free in GitHub repository vim/vim prior to 8.2.
CVE-2022-0554vim2:8.1.2269-1ubuntu5.7Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.
CVE-2022-1621vim2:8.1.2269-1ubuntu5.7Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
CVE-2022-2175vim2:8.1.2269-1ubuntu5.7Buffer Over-read in GitHub repository vim/vim prior to 8.2.
CVE-2022-1629vim2:8.1.2269-1ubuntu5.7Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution
CVE-2021-4166vim2:8.1.2269-1ubuntu5.7vim is vulnerable to Out-of-bounds Read
CVE-2022-2946vim2:8.1.2269-1ubuntu5.7Use After Free in GitHub repository vim/vim prior to 9.0.0246.
CVE-2022-0359vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
CVE-2022-2183vim2:8.1.2269-1ubuntu5.7Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
CVE-2022-1420vim2:8.1.2269-1ubuntu5.7Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.
CVE-2022-0368vim2:8.1.2269-1ubuntu5.7Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
CVE-2022-0261vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
CVE-2022-0318vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in vim/vim prior to 8.2.
CVE-2022-2571vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.
CVE-2022-0361vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
CVE-2022-0417vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.
CVE-2022-2304vim2:8.1.2269-1ubuntu5.7Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
CVE-2021-4192vim2:8.1.2269-1ubuntu5.7vim is vulnerable to Use After Free
CVE-2022-0714vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.
CVE-2022-0413vim2:8.1.2269-1ubuntu5.7Use After Free in GitHub repository vim/vim prior to 8.2.
CVE-2022-0392vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.
CVE-2022-0685vim2:8.1.2269-1ubuntu5.7Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.
CVE-2022-0213vim2:8.1.2269-1ubuntu5.7vim is vulnerable to Heap-based Buffer Overflow
CVE-2022-2345vim2:8.1.2269-1ubuntu5.7Use After Free in GitHub repository vim/vim prior to 9.0.0046.
CVE-2022-0408vim2:8.1.2269-1ubuntu5.7Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
CVE-2022-0943vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.
CVE-2022-0351vim2:8.1.2269-1ubuntu5.7Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.
CVE-2022-1942vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
CVE-2022-0572vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
CVE-2022-1620vim2:8.1.2269-1ubuntu5.7NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.
CVE-2023-0049vim2:8.1.2269-1ubuntu5.7Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.
CVE-2023-0433vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
CVE-2023-1170vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1376.
CVE-2022-47024vim2:8.1.2269-1ubuntu5.7A null pointer dereference issue was discovered in function gui_x11_create_blank_mouse in gui_x11.c in vim 8.1.2269 thru 9.0.0339 allows attackers to cause denial of service or other unspecified impacts.
CVE-2023-0288vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1189.
CVE-2023-1264vim2:8.1.2269-1ubuntu5.7NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1392.
CVE-2023-1175vim2:8.1.2269-1ubuntu5.7Incorrect Calculation of Buffer Size in GitHub repository vim/vim prior to 9.0.1378.
CVE-2023-0054vim2:8.1.2269-1ubuntu5.7Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1145.
CVE-2022-37434zlib1:1.2.11.dfsg-2ubuntu1.3zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
CVE-2022-0529unzip6.0-25ubuntu1A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
CVE-2022-48303tar1.30+dfsg-7ubuntu0.20.04.2GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.
CVE-2022-32221curl7.68.0-1ubuntu2.12When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.
CVE-2022-43552curl7.68.0-1ubuntu2.12A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
CVE-2023-23916curl7.68.0-1ubuntu2.12An allocation of resources without limits or throttling vulnerability exists in curl
CVE-2023-27535curl7.68.0-1ubuntu2.12FTP too eager connection reuse
CVE-2022-3116heimdal7.7.0+dfsg-1ubuntu1A flawed logical condition in lib/gssapi/spnego/accept_sec_context.c allows a malicious actor to remotely trigger a NULL pointer dereference using a crafted negTokenInit token.
CVE-2022-41916heimdal7.7.0+dfsg-1ubuntu1Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's libhx509. Users should upgrade to Heimdal 7.7.1 or 7.8. There are no known workarounds for this issue.
CVE-2022-42898heimdal7.7.0+dfsg-1ubuntu1PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
CVE-2021-44758heimdal7.7.0+dfsg-1ubuntu1Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept.
CVE-2022-44640heimdal7.7.0+dfsg-1ubuntu1Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).
CVE-2022-45142heimdal7.7.0+dfsg-1ubuntu1The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
CVE-2022-3437heimdal7.7.0+dfsg-1ubuntu1A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.
CVE-2022-42898krb51.17-6ubuntu4.1PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
CVE-2021-37750krb51.17-6ubuntu4.1The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
CVE-2021-36222krb51.17-6ubuntu4.1ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.
CVE-2022-4304openssl1.1.1f-1ubuntu2.16A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.
CVE-2022-4450openssl1.1.1f-1ubuntu2.16The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.
CVE-2023-0215openssl1.1.1f-1ubuntu2.16The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.
CVE-2020-35527sqlite33.31.1-4ubuntu0.3In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.
CVE-2022-35737sqlite33.31.1-4ubuntu0.3SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
CVE-2020-35525sqlite33.31.1-4ubuntu0.3In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.

Low

CVEPackageVersionDescription
CVE-2021-4209gnutls283.6.13-2ubuntu1.6A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.
CVE-2022-1587pcre210.34-7An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
CVE-2022-1586pcre210.34-7An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
CVE-2023-26604systemd245.4-4ubuntu3.17systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.
CVE-2022-2206vim2:8.1.2269-1ubuntu5.7Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
CVE-2022-0443vim2:8.1.2269-1ubuntu5.7Use After Free in GitHub repository vim/vim prior to 8.2.
CVE-2022-1796vim2:8.1.2269-1ubuntu5.7Use After Free in GitHub repository vim/vim prior to 8.2.4979.
CVE-2022-2845vim2:8.1.2269-1ubuntu5.7Buffer Over-read in GitHub repository vim/vim prior to 9.0.0218.
CVE-2021-4193vim2:8.1.2269-1ubuntu5.7vim is vulnerable to Out-of-bounds Read
CVE-2022-2849vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.
CVE-2022-1735vim2:8.1.2269-1ubuntu5.7Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.
CVE-2022-1898vim2:8.1.2269-1ubuntu5.7Use After Free in GitHub repository vim/vim prior to 8.2.
CVE-2022-1733vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.
CVE-2022-2581vim2:8.1.2269-1ubuntu5.7Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.
CVE-2022-1785vim2:8.1.2269-1ubuntu5.7Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.
CVE-2022-0729vim2:8.1.2269-1ubuntu5.7Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.
CVE-2022-2125vim2:8.1.2269-1ubuntu5.7Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
CVE-2022-2129vim2:8.1.2269-1ubuntu5.7Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
CVE-2022-2124vim2:8.1.2269-1ubuntu5.7Buffer Over-read in GitHub repository vim/vim prior to 8.2.
CVE-2022-2126vim2:8.1.2269-1ubuntu5.7Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
CVE-2022-0530unzip6.0-25ubuntu1A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
CVE-2021-4217unzip6.0-25ubuntu1A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
CVE-2013-4235shadow1:4.8.1-1ubuntu5.20.04.2shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees
CVE-2021-43618gmp2:6.2.0+dfsg-4GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.
CVE-2022-35252curl7.68.0-1ubuntu2.12When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
CVE-2023-27536curl7.68.0-1ubuntu2.12GSS delegation too eager connection re-use
CVE-2023-27538curl7.68.0-1ubuntu2.12SSH connection too eager reuse still
CVE-2023-27533curl7.68.0-1ubuntu2.12TELNET option IAC injection
CVE-2023-27534curl7.68.0-1ubuntu2.12SFTP path ~ resolving discrepancy
CVE-2021-3671heimdal7.7.0+dfsg-1ubuntu1A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.
CVE-2016-2781coreutils8.30-3ubuntu2chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
CVE-2022-3219gnupg22.2.19-3ubuntu2.2GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.

Negligible

CVEPackageVersionDescription
CVE-2016-20013glibc2.31-0ubuntu9.9sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.
CVE-2021-39537ncurses6.2-0ubuntu2An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.
CVE-2022-29458ncurses6.2-0ubuntu2ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.
CVE-2017-11164pcre32:8.39-12ubuntu0.1In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.
CVE-2022-28321pam1.3.1-5ubuntu4.3The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.