github.com/argoproj/argo-cd/v3@v3.2.1/docs/snyk/v3.0.16/quay.io_argoproj_argocd_v3.0.16.html (about) 1 <!DOCTYPE html> 2 <html lang="en"> 3 4 <head> 5 <meta http-equiv="Content-type" content="text/html; charset=utf-8"> 6 <meta http-equiv="Content-Language" content="en-us"> 7 <meta name="viewport" content="width=device-width, initial-scale=1.0"> 8 <meta http-equiv="X-UA-Compatible" content="IE=edge"> 9 <title>Snyk test report</title> 10 <meta name="description" content="27 known vulnerabilities found in 85 vulnerable dependency paths."> 11 <base target="_blank"> 12 <link rel="icon" type="image/png" href="https://res.cloudinary.com/snyk/image/upload/v1468845142/favicon/favicon.png" 13 sizes="194x194"> 14 <link rel="shortcut icon" href="https://res.cloudinary.com/snyk/image/upload/v1468845142/favicon/favicon.ico"> 15 <style type="text/css"> 16 17 body { 18 -moz-font-feature-settings: "pnum"; 19 -webkit-font-feature-settings: "pnum"; 20 font-variant-numeric: proportional-nums; 21 display: flex; 22 flex-direction: column; 23 font-feature-settings: "pnum"; 24 font-size: 100%; 25 line-height: 1.5; 26 min-height: 100vh; 27 -webkit-text-size-adjust: 100%; 28 margin: 0; 29 padding: 0; 30 background-color: #F5F5F5; 31 font-family: 'Arial', 'Helvetica', Calibri, sans-serif; 32 } 33 34 h1, 35 h2, 36 h3, 37 h4, 38 h5, 39 h6 { 40 font-weight: 500; 41 } 42 43 a, 44 a:link, 45 a:visited { 46 border-bottom: 1px solid #4b45a9; 47 text-decoration: none; 48 color: #4b45a9; 49 } 50 51 a:hover, 52 a:focus, 53 a:active { 54 border-bottom: 1px solid #4b45a9; 55 } 56 57 hr { 58 border: none; 59 margin: 1em 0; 60 border-top: 1px solid #c5c5c5; 61 } 62 63 ul { 64 padding: 0 1em; 65 margin: 1em 0; 66 } 67 68 code { 69 background-color: #EEE; 70 color: #333; 71 padding: 0.25em 0.5em; 72 border-radius: 0.25em; 73 } 74 75 pre { 76 background-color: #333; 77 font-family: monospace; 78 padding: 0.5em 1em 0.75em; 79 border-radius: 0.25em; 80 font-size: 14px; 81 } 82 83 pre code { 84 padding: 0; 85 background-color: transparent; 86 color: #fff; 87 } 88 89 a code { 90 border-radius: .125rem .125rem 0 0; 91 padding-bottom: 0; 92 color: #4b45a9; 93 } 94 95 a[href^="http://"]:after, 96 a[href^="https://"]:after { 97 background-image: linear-gradient(transparent,transparent),url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%20112%20109%22%3E%3Cg%20id%3D%22Page-1%22%20fill%3D%22none%22%20fill-rule%3D%22evenodd%22%3E%3Cg%20id%3D%22link-external%22%3E%3Cg%20id%3D%22arrow%22%3E%3Cpath%20id%3D%22Line%22%20stroke%3D%22%234B45A9%22%20stroke-width%3D%2215%22%20d%3D%22M88.5%2021l-43%2042.5%22%20stroke-linecap%3D%22square%22%2F%3E%3Cpath%20id%3D%22Triangle%22%20fill%3D%22%234B45A9%22%20d%3D%22M111.2%200v50L61%200z%22%2F%3E%3C%2Fg%3E%3Cpath%20id%3D%22square%22%20fill%3D%22%234B45A9%22%20d%3D%22M66%2015H0v94h94V44L79%2059v35H15V30h36z%22%2F%3E%3C%2Fg%3E%3C%2Fg%3E%3C%2Fsvg%3E"); 98 background-repeat: no-repeat; 99 background-size: .75rem; 100 content: ""; 101 display: inline-block; 102 height: .75rem; 103 margin-left: .25rem; 104 width: .75rem; 105 } 106 107 108 /* Layout */ 109 110 [class*=layout-container] { 111 margin: 0 auto; 112 max-width: 71.25em; 113 padding: 1.9em 1.3em; 114 position: relative; 115 } 116 .layout-container--short { 117 padding-top: 0; 118 padding-bottom: 0; 119 max-width: 48.75em; 120 } 121 122 .layout-container--short:after { 123 display: block; 124 content: ""; 125 clear: both; 126 } 127 128 /* Header */ 129 130 .header { 131 padding-bottom: 1px; 132 } 133 134 .paths { 135 margin-left: 8px; 136 } 137 .header-wrap { 138 display: flex; 139 flex-direction: row; 140 justify-content: space-between; 141 padding-top: 2em; 142 } 143 .project__header { 144 background-color: #030328; 145 color: #fff; 146 margin-bottom: -1px; 147 padding-top: 1em; 148 padding-bottom: 0.25em; 149 border-bottom: 2px solid #BBB; 150 } 151 152 .project__header__title { 153 overflow-wrap: break-word; 154 word-wrap: break-word; 155 word-break: break-all; 156 margin-bottom: .1em; 157 margin-top: 0; 158 } 159 160 .timestamp { 161 float: right; 162 clear: none; 163 margin-bottom: 0; 164 } 165 166 .meta-counts { 167 clear: both; 168 display: block; 169 flex-wrap: wrap; 170 justify-content: space-between; 171 margin: 0 0 1.5em; 172 color: #fff; 173 clear: both; 174 font-size: 1.1em; 175 } 176 177 .meta-count { 178 display: block; 179 flex-basis: 100%; 180 margin: 0 1em 1em 0; 181 float: left; 182 padding-right: 1em; 183 border-right: 2px solid #fff; 184 } 185 186 .meta-count:last-child { 187 border-right: 0; 188 padding-right: 0; 189 margin-right: 0; 190 } 191 192 /* Card */ 193 194 .card { 195 background-color: #fff; 196 border: 1px solid #c5c5c5; 197 border-radius: .25rem; 198 margin: 0 0 2em 0; 199 position: relative; 200 min-height: 40px; 201 padding: 1.5em; 202 } 203 204 .card__labels { 205 position: absolute; 206 top: 1.1em; 207 left: 0; 208 display: flex; 209 align-items: center; 210 gap: 8px; 211 } 212 213 .card .label { 214 background-color: #767676; 215 border: 2px solid #767676; 216 color: white; 217 padding: 0.25rem 0.75rem; 218 font-size: 0.875rem; 219 text-transform: uppercase; 220 display: inline-block; 221 margin: 0; 222 border-radius: 0.25rem; 223 } 224 225 .card .label__text { 226 vertical-align: text-top; 227 font-weight: bold; 228 } 229 230 .card .label--critical { 231 background-color: #AB1A1A; 232 border-color: #AB1A1A; 233 } 234 235 .card .label--high { 236 background-color: #CE5019; 237 border-color: #CE5019; 238 } 239 240 .card .label--medium { 241 background-color: #D68000; 242 border-color: #D68000; 243 } 244 245 .card .label--low { 246 background-color: #88879E; 247 border-color: #88879E; 248 } 249 250 .severity--low { 251 border-color: #88879E; 252 } 253 254 .severity--medium { 255 border-color: #D68000; 256 } 257 258 .severity--high { 259 border-color: #CE5019; 260 } 261 262 .severity--critical { 263 border-color: #AB1A1A; 264 } 265 266 .card--vuln { 267 padding-top: 4em; 268 } 269 270 .card--vuln .card__labels > .label:first-child { 271 padding-left: 1.9em; 272 padding-right: 1.9em; 273 border-radius: 0 0.25rem 0.25rem 0; 274 } 275 276 .card--vuln .card__section h2 { 277 font-size: 22px; 278 margin-bottom: 0.5em; 279 } 280 281 .card--vuln .card__section p { 282 margin: 0 0 0.5em 0; 283 } 284 285 .card--vuln .card__meta { 286 padding: 0 0 0 1em; 287 margin: 0; 288 font-size: 1.1em; 289 } 290 291 .card .card__meta__paths { 292 font-size: 0.9em; 293 } 294 295 .card--vuln .card__title { 296 font-size: 28px; 297 margin-top: 0; 298 margin-right: 100px; /* Ensure space for the risk score */ 299 } 300 301 .card--vuln .card__cta p { 302 margin: 0; 303 text-align: right; 304 } 305 306 .risk-score-display { 307 position: absolute; 308 top: 1.5em; 309 right: 1.5em; 310 text-align: right; 311 z-index: 10; 312 } 313 314 .risk-score-display__label { 315 font-size: 0.7em; 316 font-weight: bold; 317 color: #586069; 318 text-transform: uppercase; 319 line-height: 1; 320 margin-bottom: 3px; 321 } 322 323 .risk-score-display__value { 324 font-size: 1.9em; 325 font-weight: 600; 326 color: #24292e; 327 line-height: 1; 328 } 329 330 .source-panel { 331 clear: both; 332 display: flex; 333 justify-content: flex-start; 334 flex-direction: column; 335 align-items: flex-start; 336 padding: 0.5em 0; 337 width: fit-content; 338 } 339 340 341 342 </style> 343 <style type="text/css"> 344 .metatable { 345 text-size-adjust: 100%; 346 -webkit-font-smoothing: antialiased; 347 -webkit-box-direction: normal; 348 color: inherit; 349 font-feature-settings: "pnum"; 350 box-sizing: border-box; 351 background: transparent; 352 border: 0; 353 font: inherit; 354 font-size: 100%; 355 margin: 0; 356 outline: none; 357 padding: 0; 358 text-align: left; 359 text-decoration: none; 360 vertical-align: baseline; 361 z-index: auto; 362 margin-top: 12px; 363 border-collapse: collapse; 364 border-spacing: 0; 365 font-variant-numeric: tabular-nums; 366 max-width: 51.75em; 367 } 368 369 tbody { 370 text-size-adjust: 100%; 371 -webkit-font-smoothing: antialiased; 372 -webkit-box-direction: normal; 373 color: inherit; 374 font-feature-settings: "pnum"; 375 border-collapse: collapse; 376 border-spacing: 0; 377 box-sizing: border-box; 378 background: transparent; 379 border: 0; 380 font: inherit; 381 font-size: 100%; 382 margin: 0; 383 outline: none; 384 padding: 0; 385 text-align: left; 386 text-decoration: none; 387 vertical-align: baseline; 388 z-index: auto; 389 display: flex; 390 flex-wrap: wrap; 391 } 392 393 .meta-row { 394 text-size-adjust: 100%; 395 -webkit-font-smoothing: antialiased; 396 -webkit-box-direction: normal; 397 color: inherit; 398 font-feature-settings: "pnum"; 399 border-collapse: collapse; 400 border-spacing: 0; 401 box-sizing: border-box; 402 background: transparent; 403 border: 0; 404 font: inherit; 405 font-size: 100%; 406 outline: none; 407 text-align: left; 408 text-decoration: none; 409 vertical-align: baseline; 410 z-index: auto; 411 display: flex; 412 align-items: start; 413 border-top: 1px solid #d3d3d9; 414 padding: 8px 0 0 0; 415 border-bottom: none; 416 margin: 8px; 417 width: 47.75%; 418 } 419 420 .meta-row-label { 421 text-size-adjust: 100%; 422 -webkit-font-smoothing: antialiased; 423 -webkit-box-direction: normal; 424 font-feature-settings: "pnum"; 425 border-collapse: collapse; 426 border-spacing: 0; 427 color: #4c4a73; 428 box-sizing: border-box; 429 background: transparent; 430 border: 0; 431 font: inherit; 432 margin: 0; 433 outline: none; 434 text-decoration: none; 435 z-index: auto; 436 align-self: start; 437 flex: 1; 438 font-size: 1rem; 439 line-height: 1.5rem; 440 padding: 0; 441 text-align: left; 442 vertical-align: top; 443 text-transform: none; 444 letter-spacing: 0; 445 } 446 447 .meta-row-value { 448 text-size-adjust: 100%; 449 -webkit-font-smoothing: antialiased; 450 -webkit-box-direction: normal; 451 color: inherit; 452 font-feature-settings: "pnum"; 453 border-collapse: collapse; 454 border-spacing: 0; 455 word-break: break-word; 456 box-sizing: border-box; 457 background: transparent; 458 border: 0; 459 font: inherit; 460 font-size: 100%; 461 margin: 0; 462 outline: none; 463 padding: 0; 464 text-align: right; 465 text-decoration: none; 466 vertical-align: baseline; 467 z-index: auto; 468 } 469 </style> 470 </head> 471 472 <body class="section-projects"> 473 <main class="layout-stacked"> 474 <div class="layout-stacked__header header"> 475 <header class="project__header"> 476 <div class="layout-container"> 477 <a class="brand" href="https://snyk.io" title="Snyk"> 478 <svg width="68px" height="35px" viewBox="0 0 68 35" version="1.1" xmlns="http://www.w3.org/2000/svg" role="img"> 479 <title>Snyk - Open Source Security</title> 480 <g stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"> 481 <g fill="#fff"> 482 <path d="M5.732,27.278 C3.445,27.278 1.589,26.885 0,26.124 L0.483,22.472 C2.163,23.296 4.056,23.689 5.643,23.689 C6.801,23.689 7.563,23.295 7.563,22.599 C7.563,20.594 0.333,21.076 0.333,15.839 C0.333,12.491 3.407,10.729 7.259,10.729 C9.179,10.729 11.161,11.249 12.444,11.704 L11.924,15.294 C10.577,14.774 8.747,14.291 7.222,14.291 C6.282,14.291 5.518,14.621 5.518,15.231 C5.518,17.208 12.903,16.815 12.903,21.925 C12.903,25.325 9.877,27.277 5.733,27.277 L5.732,27.278 Z M25.726,26.936 L25.726,17.894 C25.726,15.827 24.811,14.85 23.069,14.85 C22.219,14.85 21.329,15.09 20.719,15.46 L20.719,26.936 L15.352,26.936 L15.352,11.262 L20.602,10.83 L20.474,13.392 L20.652,13.392 C21.784,11.87 23.702,10.716 25.992,10.716 C28.736,10.716 31.112,12.416 31.112,16.436 L31.112,26.936 L25.724,26.936 L25.726,26.936 Z M61.175,26.936 L56.879,19.479 L56.446,19.479 L56.446,26.935 L51.082,26.935 L51.082,8.37 L56.447,0 L56.447,17.323 C57.515,16.017 61.112,11.059 61.112,11.059 L67.732,11.059 L61.454,17.689 L67.949,26.95 L61.175,26.95 L61.175,26.938 L61.175,26.936 Z M44.13,11.11 L41.93,18.262 C41.5,19.606 41.08,22.079 41.08,22.079 C41.08,22.079 40.75,19.516 40.292,18.172 L37.94,11.108 L31.928,11.108 L38.462,26.935 C37.572,29.04 36.199,30.815 34.369,30.815 C34.039,30.815 33.709,30.802 33.389,30.765 L31.255,34.061 C31.928,34.441 33.212,34.835 34.737,34.835 C38.703,34.835 41.359,31.627 43.215,26.885 L49.443,11.108 L44.132,11.108 L44.13,11.11 Z"></path> 483 </g> 484 </g> 485 </svg> 486 </a> 487 <div class="header-wrap"> 488 <h1 class="project__header__title">Snyk test report</h1> 489 490 <p class="timestamp">September 14th 2025, 12:27:38 am (UTC+00:00)</p> 491 </div> 492 <div class="source-panel"> 493 <span>Scanned the following paths:</span> 494 <ul> 495 <li class="paths">quay.io/argoproj/argocd:v3.0.16/argoproj/argocd/Dockerfile (deb)</li> 496 <li class="paths">quay.io/argoproj/argocd:v3.0.16/argoproj/argo-cd/v3//usr/local/bin/argocd (gomodules)</li> 497 <li class="paths">quay.io/argoproj/argocd:v3.0.16//usr/local/bin/kustomize (gomodules)</li> 498 <li class="paths">quay.io/argoproj/argocd:v3.0.16/helm/v3//usr/local/bin/helm (gomodules)</li> 499 <li class="paths">quay.io/argoproj/argocd:v3.0.16/git-lfs/git-lfs//usr/bin/git-lfs (gomodules)</li> 500 </ul> 501 </div> 502 503 <div class="meta-counts"> 504 <div class="meta-count"><span>27</span> <span>known vulnerabilities</span></div> 505 <div class="meta-count"><span>85 vulnerable dependency paths</span></div> 506 <div class="meta-count"><span>2358</span> <span>dependencies</span></div> 507 </div><!-- .meta-counts --> 508 </div><!-- .layout-container--short --> 509 </header><!-- .project__header --> 510 </div><!-- .layout-stacked__header --> 511 512 <div class="layout-container" style="padding-top: 35px;"> 513 <div class="cards--vuln filter--patch filter--ignore"> 514 <div class="card card--vuln disclosure--not-new severity--high" data-snyk-test="high"> 515 <h2 class="card__title">Allocation of Resources Without Limits or Throttling</h2> 516 <div class="card__section"> 517 518 <div class="card__labels"> 519 <div class="label label--high"> 520 <span class="label__text">high severity</span> 521 </div> 522 </div> 523 524 <hr/> 525 526 <ul class="card__meta"> 527 <li class="card__meta__item"> 528 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argo-cd/v3 <span class="list-paths__item__arrow">›</span> /usr/local/bin/argocd 529 </li> 530 <li class="card__meta__item"> 531 Package Manager: golang 532 </li> 533 <li class="card__meta__item"> 534 Vulnerable module: 535 536 github.com/expr-lang/expr/vm 537 </li> 538 539 <li class="card__meta__item">Introduced through: 540 541 github.com/argoproj/argo-cd/v3@* and github.com/expr-lang/expr/vm@v1.16.9 542 543 </li> 544 </ul> 545 546 <hr/> 547 548 549 <h3 class="card__section__title">Detailed paths</h3> 550 551 <ul class="card__meta__paths"> 552 <li> 553 <span class="list-paths__item__introduced"><em>Introduced through</em>: 554 github.com/argoproj/argo-cd/v3@* 555 <span class="list-paths__item__arrow">›</span> 556 github.com/expr-lang/expr/vm@v1.16.9 557 558 </span> 559 560 </li> 561 </ul><!-- .list-paths --> 562 563 </div><!-- .card__section --> 564 565 <hr/> 566 <!-- Overview --> 567 <h2 id="overview">Overview</h2> 568 <p>Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the <code>parseExpression()</code> function in <code>parser.go</code>, due to the unrestricted size of input strings, which can cause the generation of large Abstract Syntax Trees (ASTs). An attacker can crash the application by supplying excessively long deeply nested expression strings.</p> 569 <h2 id="workaround">Workaround</h2> 570 <p>This vulnerability can be avoided by checking and limiting the length of input expressions before parsing them.</p> 571 <h2 id="remediation">Remediation</h2> 572 <p>Upgrade <code>github.com/expr-lang/expr/vm</code> to version 1.17.0 or higher.</p> 573 <h2 id="references">References</h2> 574 <ul> 575 <li><a href="https://github.com/expr-lang/expr/commit/0d19441454426d2f58edb22c31f3ba5f99c7a26e">GitHub Commit</a></li> 576 <li><a href="https://github.com/expr-lang/expr/pull/762">GitHub PR</a></li> 577 </ul> 578 579 <hr/> 580 581 <div class="cta card__cta"> 582 <p><a href="https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMEXPRLANGEXPRVM-9460820">More about this vulnerability</a></p> 583 </div> 584 585 </div><!-- .card --> 586 <div class="card card--vuln disclosure--not-new severity--high" data-snyk-test="high"> 587 <h2 class="card__title">Allocation of Resources Without Limits or Throttling</h2> 588 <div class="card__section"> 589 590 <div class="card__labels"> 591 <div class="label label--high"> 592 <span class="label__text">high severity</span> 593 </div> 594 </div> 595 596 <hr/> 597 598 <ul class="card__meta"> 599 <li class="card__meta__item"> 600 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argo-cd/v3 <span class="list-paths__item__arrow">›</span> /usr/local/bin/argocd 601 </li> 602 <li class="card__meta__item"> 603 Package Manager: golang 604 </li> 605 <li class="card__meta__item"> 606 Vulnerable module: 607 608 github.com/expr-lang/expr/parser 609 </li> 610 611 <li class="card__meta__item">Introduced through: 612 613 github.com/argoproj/argo-cd/v3@* and github.com/expr-lang/expr/parser@v1.16.9 614 615 </li> 616 </ul> 617 618 <hr/> 619 620 621 <h3 class="card__section__title">Detailed paths</h3> 622 623 <ul class="card__meta__paths"> 624 <li> 625 <span class="list-paths__item__introduced"><em>Introduced through</em>: 626 github.com/argoproj/argo-cd/v3@* 627 <span class="list-paths__item__arrow">›</span> 628 github.com/expr-lang/expr/parser@v1.16.9 629 630 </span> 631 632 </li> 633 </ul><!-- .list-paths --> 634 635 </div><!-- .card__section --> 636 637 <hr/> 638 <!-- Overview --> 639 <h2 id="overview">Overview</h2> 640 <p>Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the <code>parseExpression()</code> function in <code>parser.go</code>, due to the unrestricted size of input strings, which can cause the generation of large Abstract Syntax Trees (ASTs). An attacker can crash the application by supplying excessively long deeply nested expression strings.</p> 641 <h2 id="workaround">Workaround</h2> 642 <p>This vulnerability can be avoided by checking and limiting the length of input expressions before parsing them.</p> 643 <h2 id="remediation">Remediation</h2> 644 <p>Upgrade <code>github.com/expr-lang/expr/parser</code> to version 1.17.0 or higher.</p> 645 <h2 id="references">References</h2> 646 <ul> 647 <li><a href="https://github.com/expr-lang/expr/commit/0d19441454426d2f58edb22c31f3ba5f99c7a26e">GitHub Commit</a></li> 648 <li><a href="https://github.com/expr-lang/expr/pull/762">GitHub PR</a></li> 649 </ul> 650 651 <hr/> 652 653 <div class="cta card__cta"> 654 <p><a href="https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMEXPRLANGEXPRPARSER-9460819">More about this vulnerability</a></p> 655 </div> 656 657 </div><!-- .card --> 658 <div class="card card--vuln disclosure--not-new severity--high" data-snyk-test="high"> 659 <h2 class="card__title">Allocation of Resources Without Limits or Throttling</h2> 660 <div class="card__section"> 661 662 <div class="card__labels"> 663 <div class="label label--high"> 664 <span class="label__text">high severity</span> 665 </div> 666 </div> 667 668 <hr/> 669 670 <ul class="card__meta"> 671 <li class="card__meta__item"> 672 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argo-cd/v3 <span class="list-paths__item__arrow">›</span> /usr/local/bin/argocd 673 </li> 674 <li class="card__meta__item"> 675 Package Manager: golang 676 </li> 677 <li class="card__meta__item"> 678 Vulnerable module: 679 680 github.com/expr-lang/expr/conf 681 </li> 682 683 <li class="card__meta__item">Introduced through: 684 685 github.com/argoproj/argo-cd/v3@* and github.com/expr-lang/expr/conf@v1.16.9 686 687 </li> 688 </ul> 689 690 <hr/> 691 692 693 <h3 class="card__section__title">Detailed paths</h3> 694 695 <ul class="card__meta__paths"> 696 <li> 697 <span class="list-paths__item__introduced"><em>Introduced through</em>: 698 github.com/argoproj/argo-cd/v3@* 699 <span class="list-paths__item__arrow">›</span> 700 github.com/expr-lang/expr/conf@v1.16.9 701 702 </span> 703 704 </li> 705 </ul><!-- .list-paths --> 706 707 </div><!-- .card__section --> 708 709 <hr/> 710 <!-- Overview --> 711 <h2 id="overview">Overview</h2> 712 <p>Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the <code>parseExpression()</code> function in <code>parser.go</code>, due to the unrestricted size of input strings, which can cause the generation of large Abstract Syntax Trees (ASTs). An attacker can crash the application by supplying excessively long deeply nested expression strings.</p> 713 <h2 id="workaround">Workaround</h2> 714 <p>This vulnerability can be avoided by checking and limiting the length of input expressions before parsing them.</p> 715 <h2 id="remediation">Remediation</h2> 716 <p>Upgrade <code>github.com/expr-lang/expr/conf</code> to version 1.17.0 or higher.</p> 717 <h2 id="references">References</h2> 718 <ul> 719 <li><a href="https://github.com/expr-lang/expr/commit/0d19441454426d2f58edb22c31f3ba5f99c7a26e">GitHub Commit</a></li> 720 <li><a href="https://github.com/expr-lang/expr/pull/762">GitHub PR</a></li> 721 </ul> 722 723 <hr/> 724 725 <div class="cta card__cta"> 726 <p><a href="https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMEXPRLANGEXPRCONF-9460818">More about this vulnerability</a></p> 727 </div> 728 729 </div><!-- .card --> 730 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 731 <h2 class="card__title">Directory Traversal</h2> 732 <div class="card__section"> 733 734 <div class="card__labels"> 735 <div class="label label--medium"> 736 <span class="label__text">medium severity</span> 737 </div> 738 </div> 739 740 <hr/> 741 742 <ul class="card__meta"> 743 <li class="card__meta__item"> 744 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 745 </li> 746 <li class="card__meta__item"> 747 Package Manager: ubuntu:24.04 748 </li> 749 <li class="card__meta__item"> 750 Vulnerable module: 751 752 tar 753 </li> 754 755 <li class="card__meta__item">Introduced through: 756 757 docker-image|quay.io/argoproj/argocd@v3.0.16 and tar@1.35+dfsg-3build1 758 759 </li> 760 </ul> 761 762 <hr/> 763 764 765 <h3 class="card__section__title">Detailed paths</h3> 766 767 <ul class="card__meta__paths"> 768 <li> 769 <span class="list-paths__item__introduced"><em>Introduced through</em>: 770 docker-image|quay.io/argoproj/argocd@v3.0.16 771 <span class="list-paths__item__arrow">›</span> 772 tar@1.35+dfsg-3build1 773 774 </span> 775 776 </li> 777 <li> 778 <span class="list-paths__item__introduced"><em>Introduced through</em>: 779 docker-image|quay.io/argoproj/argocd@v3.0.16 780 <span class="list-paths__item__arrow">›</span> 781 dash@0.5.12-6ubuntu5 782 <span class="list-paths__item__arrow">›</span> 783 dpkg@1.22.6ubuntu6.1 784 <span class="list-paths__item__arrow">›</span> 785 tar@1.35+dfsg-3build1 786 787 </span> 788 789 </li> 790 </ul><!-- .list-paths --> 791 792 </div><!-- .card__section --> 793 794 <hr/> 795 <!-- Overview --> 796 <h2 id="nvd-description">NVD Description</h2> 797 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>tar</code> package and not the <code>tar</code> package as distributed by <code>Ubuntu</code>.</em> 798 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 799 <p>GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in which "tar xf" is run more than once (e.g., when installing a package can automatically install two dependencies that are set up as untrusted tarballs instead of official packages). NOTE: the official GNU Tar manual has an otherwise-empty directory for each "tar xf" in its Security Rules of Thumb; however, third-party advice leads users to run "tar xf" more than once into the same directory.</p> 800 <h2 id="remediation">Remediation</h2> 801 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>tar</code>.</p> 802 <h2 id="references">References</h2> 803 <ul> 804 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-45582">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-45582</a></li> 805 <li><a href="https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md">https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md</a></li> 806 <li><a href="https://www.gnu.org/software/tar/">https://www.gnu.org/software/tar/</a></li> 807 <li><a href="https://lists.gnu.org/archive/html/bug-tar/2025-08/msg00012.html">https://lists.gnu.org/archive/html/bug-tar/2025-08/msg00012.html</a></li> 808 <li><a href="https://www.gnu.org/software/tar/manual/html_node/Integrity.html">https://www.gnu.org/software/tar/manual/html_node/Integrity.html</a></li> 809 <li><a href="https://www.gnu.org/software/tar/manual/html_node/Security-rules-of-thumb.html">https://www.gnu.org/software/tar/manual/html_node/Security-rules-of-thumb.html</a></li> 810 </ul> 811 812 <hr/> 813 814 <div class="cta card__cta"> 815 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-TAR-10769052">More about this vulnerability</a></p> 816 </div> 817 818 </div><!-- .card --> 819 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 820 <h2 class="card__title">CVE-2025-7709</h2> 821 <div class="card__section"> 822 823 <div class="card__labels"> 824 <div class="label label--medium"> 825 <span class="label__text">medium severity</span> 826 </div> 827 </div> 828 829 <hr/> 830 831 <ul class="card__meta"> 832 <li class="card__meta__item"> 833 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 834 </li> 835 <li class="card__meta__item"> 836 Package Manager: ubuntu:24.04 837 </li> 838 <li class="card__meta__item"> 839 Vulnerable module: 840 841 sqlite3/libsqlite3-0 842 </li> 843 844 <li class="card__meta__item">Introduced through: 845 846 847 docker-image|quay.io/argoproj/argocd@v3.0.16, gnupg2/gpg@2.4.4-2ubuntu17.3 and others 848 </li> 849 </ul> 850 851 <hr/> 852 853 854 <h3 class="card__section__title">Detailed paths</h3> 855 856 <ul class="card__meta__paths"> 857 <li> 858 <span class="list-paths__item__introduced"><em>Introduced through</em>: 859 docker-image|quay.io/argoproj/argocd@v3.0.16 860 <span class="list-paths__item__arrow">›</span> 861 gnupg2/gpg@2.4.4-2ubuntu17.3 862 <span class="list-paths__item__arrow">›</span> 863 sqlite3/libsqlite3-0@3.45.1-1ubuntu2.4 864 865 </span> 866 867 </li> 868 </ul><!-- .list-paths --> 869 870 </div><!-- .card__section --> 871 872 <hr/> 873 <!-- Overview --> 874 <h2 id="nvd-description">NVD Description</h2> 875 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>sqlite3</code> package and not the <code>sqlite3</code> package as distributed by <code>Ubuntu</code>.</em> 876 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 877 <p>An integer overflow exists in the FTS5 <a href="https://sqlite.org/fts5.html">https://sqlite.org/fts5.html</a> extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.</p> 878 <h2 id="remediation">Remediation</h2> 879 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>sqlite3</code>.</p> 880 <h2 id="references">References</h2> 881 <ul> 882 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-7709">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-7709</a></li> 883 <li><a href="https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g">https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g</a></li> 884 </ul> 885 886 <hr/> 887 888 <div class="cta card__cta"> 889 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-SQLITE3-12554290">More about this vulnerability</a></p> 890 </div> 891 892 </div><!-- .card --> 893 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 894 <h2 class="card__title">Insecure Storage of Sensitive Information</h2> 895 <div class="card__section"> 896 897 <div class="card__labels"> 898 <div class="label label--medium"> 899 <span class="label__text">medium severity</span> 900 </div> 901 </div> 902 903 <hr/> 904 905 <ul class="card__meta"> 906 <li class="card__meta__item"> 907 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 908 </li> 909 <li class="card__meta__item"> 910 Package Manager: ubuntu:24.04 911 </li> 912 <li class="card__meta__item"> 913 Vulnerable module: 914 915 pam/libpam0g 916 </li> 917 918 <li class="card__meta__item">Introduced through: 919 920 docker-image|quay.io/argoproj/argocd@v3.0.16 and pam/libpam0g@1.5.3-5ubuntu5.4 921 922 </li> 923 </ul> 924 925 <hr/> 926 927 928 <h3 class="card__section__title">Detailed paths</h3> 929 930 <ul class="card__meta__paths"> 931 <li> 932 <span class="list-paths__item__introduced"><em>Introduced through</em>: 933 docker-image|quay.io/argoproj/argocd@v3.0.16 934 <span class="list-paths__item__arrow">›</span> 935 pam/libpam0g@1.5.3-5ubuntu5.4 936 937 </span> 938 939 </li> 940 <li> 941 <span class="list-paths__item__introduced"><em>Introduced through</em>: 942 docker-image|quay.io/argoproj/argocd@v3.0.16 943 <span class="list-paths__item__arrow">›</span> 944 shadow/login@1:4.13+dfsg1-4ubuntu3.2 945 <span class="list-paths__item__arrow">›</span> 946 pam/libpam0g@1.5.3-5ubuntu5.4 947 948 </span> 949 950 </li> 951 <li> 952 <span class="list-paths__item__introduced"><em>Introduced through</em>: 953 docker-image|quay.io/argoproj/argocd@v3.0.16 954 <span class="list-paths__item__arrow">›</span> 955 util-linux@2.39.3-9ubuntu6.3 956 <span class="list-paths__item__arrow">›</span> 957 pam/libpam0g@1.5.3-5ubuntu5.4 958 959 </span> 960 961 </li> 962 <li> 963 <span class="list-paths__item__introduced"><em>Introduced through</em>: 964 docker-image|quay.io/argoproj/argocd@v3.0.16 965 <span class="list-paths__item__arrow">›</span> 966 apt@2.8.3 967 <span class="list-paths__item__arrow">›</span> 968 adduser@3.137ubuntu1 969 <span class="list-paths__item__arrow">›</span> 970 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 971 <span class="list-paths__item__arrow">›</span> 972 pam/libpam0g@1.5.3-5ubuntu5.4 973 974 </span> 975 976 </li> 977 <li> 978 <span class="list-paths__item__introduced"><em>Introduced through</em>: 979 docker-image|quay.io/argoproj/argocd@v3.0.16 980 <span class="list-paths__item__arrow">›</span> 981 apt@2.8.3 982 <span class="list-paths__item__arrow">›</span> 983 adduser@3.137ubuntu1 984 <span class="list-paths__item__arrow">›</span> 985 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 986 <span class="list-paths__item__arrow">›</span> 987 pam/libpam-modules@1.5.3-5ubuntu5.4 988 <span class="list-paths__item__arrow">›</span> 989 pam/libpam0g@1.5.3-5ubuntu5.4 990 991 </span> 992 993 </li> 994 <li> 995 <span class="list-paths__item__introduced"><em>Introduced through</em>: 996 docker-image|quay.io/argoproj/argocd@v3.0.16 997 <span class="list-paths__item__arrow">›</span> 998 apt@2.8.3 999 <span class="list-paths__item__arrow">›</span> 1000 adduser@3.137ubuntu1 1001 <span class="list-paths__item__arrow">›</span> 1002 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 1003 <span class="list-paths__item__arrow">›</span> 1004 pam/libpam-modules@1.5.3-5ubuntu5.4 1005 <span class="list-paths__item__arrow">›</span> 1006 pam/libpam-modules-bin@1.5.3-5ubuntu5.4 1007 <span class="list-paths__item__arrow">›</span> 1008 pam/libpam0g@1.5.3-5ubuntu5.4 1009 1010 </span> 1011 1012 </li> 1013 <li> 1014 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1015 docker-image|quay.io/argoproj/argocd@v3.0.16 1016 <span class="list-paths__item__arrow">›</span> 1017 pam/libpam-modules-bin@1.5.3-5ubuntu5.4 1018 1019 </span> 1020 1021 </li> 1022 <li> 1023 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1024 docker-image|quay.io/argoproj/argocd@v3.0.16 1025 <span class="list-paths__item__arrow">›</span> 1026 apt@2.8.3 1027 <span class="list-paths__item__arrow">›</span> 1028 adduser@3.137ubuntu1 1029 <span class="list-paths__item__arrow">›</span> 1030 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 1031 <span class="list-paths__item__arrow">›</span> 1032 pam/libpam-modules@1.5.3-5ubuntu5.4 1033 <span class="list-paths__item__arrow">›</span> 1034 pam/libpam-modules-bin@1.5.3-5ubuntu5.4 1035 1036 </span> 1037 1038 </li> 1039 <li> 1040 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1041 docker-image|quay.io/argoproj/argocd@v3.0.16 1042 <span class="list-paths__item__arrow">›</span> 1043 pam/libpam-modules@1.5.3-5ubuntu5.4 1044 1045 </span> 1046 1047 </li> 1048 <li> 1049 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1050 docker-image|quay.io/argoproj/argocd@v3.0.16 1051 <span class="list-paths__item__arrow">›</span> 1052 pam/libpam-runtime@1.5.3-5ubuntu5.4 1053 <span class="list-paths__item__arrow">›</span> 1054 pam/libpam-modules@1.5.3-5ubuntu5.4 1055 1056 </span> 1057 1058 </li> 1059 <li> 1060 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1061 docker-image|quay.io/argoproj/argocd@v3.0.16 1062 <span class="list-paths__item__arrow">›</span> 1063 shadow/login@1:4.13+dfsg1-4ubuntu3.2 1064 <span class="list-paths__item__arrow">›</span> 1065 pam/libpam-modules@1.5.3-5ubuntu5.4 1066 1067 </span> 1068 1069 </li> 1070 <li> 1071 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1072 docker-image|quay.io/argoproj/argocd@v3.0.16 1073 <span class="list-paths__item__arrow">›</span> 1074 apt@2.8.3 1075 <span class="list-paths__item__arrow">›</span> 1076 adduser@3.137ubuntu1 1077 <span class="list-paths__item__arrow">›</span> 1078 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 1079 <span class="list-paths__item__arrow">›</span> 1080 pam/libpam-modules@1.5.3-5ubuntu5.4 1081 1082 </span> 1083 1084 </li> 1085 <li> 1086 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1087 docker-image|quay.io/argoproj/argocd@v3.0.16 1088 <span class="list-paths__item__arrow">›</span> 1089 pam/libpam-runtime@1.5.3-5ubuntu5.4 1090 1091 </span> 1092 1093 </li> 1094 <li> 1095 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1096 docker-image|quay.io/argoproj/argocd@v3.0.16 1097 <span class="list-paths__item__arrow">›</span> 1098 shadow/login@1:4.13+dfsg1-4ubuntu3.2 1099 <span class="list-paths__item__arrow">›</span> 1100 pam/libpam-runtime@1.5.3-5ubuntu5.4 1101 1102 </span> 1103 1104 </li> 1105 </ul><!-- .list-paths --> 1106 1107 </div><!-- .card__section --> 1108 1109 <hr/> 1110 <!-- Overview --> 1111 <h2 id="nvd-description">NVD Description</h2> 1112 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>pam</code> package and not the <code>pam</code> package as distributed by <code>Ubuntu</code>.</em> 1113 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 1114 <p>A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.</p> 1115 <h2 id="remediation">Remediation</h2> 1116 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>pam</code>.</p> 1117 <h2 id="references">References</h2> 1118 <ul> 1119 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-10041">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-10041</a></li> 1120 <li><a href="https://access.redhat.com/security/cve/CVE-2024-10041">https://access.redhat.com/security/cve/CVE-2024-10041</a></li> 1121 <li><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2319212">https://bugzilla.redhat.com/show_bug.cgi?id=2319212</a></li> 1122 <li><a href="https://access.redhat.com/errata/RHSA-2024:9941">https://access.redhat.com/errata/RHSA-2024:9941</a></li> 1123 <li><a href="https://access.redhat.com/errata/RHSA-2024:10379">https://access.redhat.com/errata/RHSA-2024:10379</a></li> 1124 <li><a href="https://access.redhat.com/errata/RHSA-2024:11250">https://access.redhat.com/errata/RHSA-2024:11250</a></li> 1125 </ul> 1126 1127 <hr/> 1128 1129 <div class="cta card__cta"> 1130 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-PAM-8303372">More about this vulnerability</a></p> 1131 </div> 1132 1133 </div><!-- .card --> 1134 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 1135 <h2 class="card__title">Improper Authentication</h2> 1136 <div class="card__section"> 1137 1138 <div class="card__labels"> 1139 <div class="label label--medium"> 1140 <span class="label__text">medium severity</span> 1141 </div> 1142 </div> 1143 1144 <hr/> 1145 1146 <ul class="card__meta"> 1147 <li class="card__meta__item"> 1148 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 1149 </li> 1150 <li class="card__meta__item"> 1151 Package Manager: ubuntu:24.04 1152 </li> 1153 <li class="card__meta__item"> 1154 Vulnerable module: 1155 1156 pam/libpam0g 1157 </li> 1158 1159 <li class="card__meta__item">Introduced through: 1160 1161 docker-image|quay.io/argoproj/argocd@v3.0.16 and pam/libpam0g@1.5.3-5ubuntu5.4 1162 1163 </li> 1164 </ul> 1165 1166 <hr/> 1167 1168 1169 <h3 class="card__section__title">Detailed paths</h3> 1170 1171 <ul class="card__meta__paths"> 1172 <li> 1173 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1174 docker-image|quay.io/argoproj/argocd@v3.0.16 1175 <span class="list-paths__item__arrow">›</span> 1176 pam/libpam0g@1.5.3-5ubuntu5.4 1177 1178 </span> 1179 1180 </li> 1181 <li> 1182 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1183 docker-image|quay.io/argoproj/argocd@v3.0.16 1184 <span class="list-paths__item__arrow">›</span> 1185 shadow/login@1:4.13+dfsg1-4ubuntu3.2 1186 <span class="list-paths__item__arrow">›</span> 1187 pam/libpam0g@1.5.3-5ubuntu5.4 1188 1189 </span> 1190 1191 </li> 1192 <li> 1193 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1194 docker-image|quay.io/argoproj/argocd@v3.0.16 1195 <span class="list-paths__item__arrow">›</span> 1196 util-linux@2.39.3-9ubuntu6.3 1197 <span class="list-paths__item__arrow">›</span> 1198 pam/libpam0g@1.5.3-5ubuntu5.4 1199 1200 </span> 1201 1202 </li> 1203 <li> 1204 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1205 docker-image|quay.io/argoproj/argocd@v3.0.16 1206 <span class="list-paths__item__arrow">›</span> 1207 apt@2.8.3 1208 <span class="list-paths__item__arrow">›</span> 1209 adduser@3.137ubuntu1 1210 <span class="list-paths__item__arrow">›</span> 1211 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 1212 <span class="list-paths__item__arrow">›</span> 1213 pam/libpam0g@1.5.3-5ubuntu5.4 1214 1215 </span> 1216 1217 </li> 1218 <li> 1219 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1220 docker-image|quay.io/argoproj/argocd@v3.0.16 1221 <span class="list-paths__item__arrow">›</span> 1222 apt@2.8.3 1223 <span class="list-paths__item__arrow">›</span> 1224 adduser@3.137ubuntu1 1225 <span class="list-paths__item__arrow">›</span> 1226 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 1227 <span class="list-paths__item__arrow">›</span> 1228 pam/libpam-modules@1.5.3-5ubuntu5.4 1229 <span class="list-paths__item__arrow">›</span> 1230 pam/libpam0g@1.5.3-5ubuntu5.4 1231 1232 </span> 1233 1234 </li> 1235 <li> 1236 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1237 docker-image|quay.io/argoproj/argocd@v3.0.16 1238 <span class="list-paths__item__arrow">›</span> 1239 apt@2.8.3 1240 <span class="list-paths__item__arrow">›</span> 1241 adduser@3.137ubuntu1 1242 <span class="list-paths__item__arrow">›</span> 1243 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 1244 <span class="list-paths__item__arrow">›</span> 1245 pam/libpam-modules@1.5.3-5ubuntu5.4 1246 <span class="list-paths__item__arrow">›</span> 1247 pam/libpam-modules-bin@1.5.3-5ubuntu5.4 1248 <span class="list-paths__item__arrow">›</span> 1249 pam/libpam0g@1.5.3-5ubuntu5.4 1250 1251 </span> 1252 1253 </li> 1254 <li> 1255 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1256 docker-image|quay.io/argoproj/argocd@v3.0.16 1257 <span class="list-paths__item__arrow">›</span> 1258 pam/libpam-modules-bin@1.5.3-5ubuntu5.4 1259 1260 </span> 1261 1262 </li> 1263 <li> 1264 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1265 docker-image|quay.io/argoproj/argocd@v3.0.16 1266 <span class="list-paths__item__arrow">›</span> 1267 apt@2.8.3 1268 <span class="list-paths__item__arrow">›</span> 1269 adduser@3.137ubuntu1 1270 <span class="list-paths__item__arrow">›</span> 1271 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 1272 <span class="list-paths__item__arrow">›</span> 1273 pam/libpam-modules@1.5.3-5ubuntu5.4 1274 <span class="list-paths__item__arrow">›</span> 1275 pam/libpam-modules-bin@1.5.3-5ubuntu5.4 1276 1277 </span> 1278 1279 </li> 1280 <li> 1281 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1282 docker-image|quay.io/argoproj/argocd@v3.0.16 1283 <span class="list-paths__item__arrow">›</span> 1284 pam/libpam-modules@1.5.3-5ubuntu5.4 1285 1286 </span> 1287 1288 </li> 1289 <li> 1290 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1291 docker-image|quay.io/argoproj/argocd@v3.0.16 1292 <span class="list-paths__item__arrow">›</span> 1293 pam/libpam-runtime@1.5.3-5ubuntu5.4 1294 <span class="list-paths__item__arrow">›</span> 1295 pam/libpam-modules@1.5.3-5ubuntu5.4 1296 1297 </span> 1298 1299 </li> 1300 <li> 1301 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1302 docker-image|quay.io/argoproj/argocd@v3.0.16 1303 <span class="list-paths__item__arrow">›</span> 1304 shadow/login@1:4.13+dfsg1-4ubuntu3.2 1305 <span class="list-paths__item__arrow">›</span> 1306 pam/libpam-modules@1.5.3-5ubuntu5.4 1307 1308 </span> 1309 1310 </li> 1311 <li> 1312 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1313 docker-image|quay.io/argoproj/argocd@v3.0.16 1314 <span class="list-paths__item__arrow">›</span> 1315 apt@2.8.3 1316 <span class="list-paths__item__arrow">›</span> 1317 adduser@3.137ubuntu1 1318 <span class="list-paths__item__arrow">›</span> 1319 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 1320 <span class="list-paths__item__arrow">›</span> 1321 pam/libpam-modules@1.5.3-5ubuntu5.4 1322 1323 </span> 1324 1325 </li> 1326 <li> 1327 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1328 docker-image|quay.io/argoproj/argocd@v3.0.16 1329 <span class="list-paths__item__arrow">›</span> 1330 pam/libpam-runtime@1.5.3-5ubuntu5.4 1331 1332 </span> 1333 1334 </li> 1335 <li> 1336 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1337 docker-image|quay.io/argoproj/argocd@v3.0.16 1338 <span class="list-paths__item__arrow">›</span> 1339 shadow/login@1:4.13+dfsg1-4ubuntu3.2 1340 <span class="list-paths__item__arrow">›</span> 1341 pam/libpam-runtime@1.5.3-5ubuntu5.4 1342 1343 </span> 1344 1345 </li> 1346 </ul><!-- .list-paths --> 1347 1348 </div><!-- .card__section --> 1349 1350 <hr/> 1351 <!-- Overview --> 1352 <h2 id="nvd-description">NVD Description</h2> 1353 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>pam</code> package and not the <code>pam</code> package as distributed by <code>Ubuntu</code>.</em> 1354 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 1355 <p>A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.</p> 1356 <h2 id="remediation">Remediation</h2> 1357 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>pam</code>.</p> 1358 <h2 id="references">References</h2> 1359 <ul> 1360 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-10963">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-10963</a></li> 1361 <li><a href="https://access.redhat.com/security/cve/CVE-2024-10963">https://access.redhat.com/security/cve/CVE-2024-10963</a></li> 1362 <li><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2324291">https://bugzilla.redhat.com/show_bug.cgi?id=2324291</a></li> 1363 <li><a href="https://access.redhat.com/errata/RHSA-2024:10232">https://access.redhat.com/errata/RHSA-2024:10232</a></li> 1364 <li><a href="https://access.redhat.com/errata/RHSA-2024:10244">https://access.redhat.com/errata/RHSA-2024:10244</a></li> 1365 <li><a href="https://access.redhat.com/errata/RHSA-2024:10379">https://access.redhat.com/errata/RHSA-2024:10379</a></li> 1366 <li><a href="https://access.redhat.com/errata/RHSA-2024:10518">https://access.redhat.com/errata/RHSA-2024:10518</a></li> 1367 <li><a href="https://access.redhat.com/errata/RHSA-2024:10528">https://access.redhat.com/errata/RHSA-2024:10528</a></li> 1368 <li><a href="https://access.redhat.com/errata/RHSA-2024:10852">https://access.redhat.com/errata/RHSA-2024:10852</a></li> 1369 </ul> 1370 1371 <hr/> 1372 1373 <div class="cta card__cta"> 1374 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-PAM-8352843">More about this vulnerability</a></p> 1375 </div> 1376 1377 </div><!-- .card --> 1378 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 1379 <h2 class="card__title">Improper Validation of Syntactic Correctness of Input</h2> 1380 <div class="card__section"> 1381 1382 <div class="card__labels"> 1383 <div class="label label--medium"> 1384 <span class="label__text">medium severity</span> 1385 </div> 1386 </div> 1387 1388 <hr/> 1389 1390 <ul class="card__meta"> 1391 <li class="card__meta__item"> 1392 Manifest file: quay.io/argoproj/argocd:v3.0.16/helm/v3 <span class="list-paths__item__arrow">›</span> /usr/local/bin/helm 1393 </li> 1394 <li class="card__meta__item"> 1395 Package Manager: golang 1396 </li> 1397 <li class="card__meta__item"> 1398 Vulnerable module: 1399 1400 golang.org/x/net/html 1401 </li> 1402 1403 <li class="card__meta__item">Introduced through: 1404 1405 helm.sh/helm/v3@* and golang.org/x/net/html@v0.33.0 1406 1407 </li> 1408 </ul> 1409 1410 <hr/> 1411 1412 1413 <h3 class="card__section__title">Detailed paths</h3> 1414 1415 <ul class="card__meta__paths"> 1416 <li> 1417 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1418 helm.sh/helm/v3@* 1419 <span class="list-paths__item__arrow">›</span> 1420 golang.org/x/net/html@v0.33.0 1421 1422 </span> 1423 1424 </li> 1425 </ul><!-- .list-paths --> 1426 1427 </div><!-- .card__section --> 1428 1429 <hr/> 1430 <!-- Overview --> 1431 <h2 id="overview">Overview</h2> 1432 <p><a href="https://pkg.go.dev/golang.org/x/net/html">golang.org/x/net/html</a> is a package that implements an HTML5-compliant tokenizer and parser.</p> 1433 <p>Affected versions of this package are vulnerable to Improper Validation of Syntactic Correctness of Input in the tokenizer in <code>token.go</code>, which incorrectly interprets tags as closing tags, allowing malicious input to be incorrectly processed and the DOM to be corrupted.</p> 1434 <h2 id="details">Details</h2> 1435 <p>Cross-site scripting (or XSS) is a code vulnerability that occurs when an attacker “injects” a malicious script into an otherwise trusted website. The injected script gets downloaded and executed by the end user’s browser when the user interacts with the compromised website.</p> 1436 <p>This is done by escaping the context of the web application; the web application then delivers that data to its users along with other trusted dynamic content, without validating it. The browser unknowingly executes malicious script on the client side (through client-side languages; usually JavaScript or HTML) in order to perform actions that are otherwise typically blocked by the browser’s Same Origin Policy.</p> 1437 <p>Injecting malicious code is the most prevalent manner by which XSS is exploited; for this reason, escaping characters in order to prevent this manipulation is the top method for securing code against this vulnerability.</p> 1438 <p>Escaping means that the application is coded to mark key characters, and particularly key characters included in user input, to prevent those characters from being interpreted in a dangerous context. For example, in HTML, <code><</code> can be coded as <code>&lt</code>; and <code>></code> can be coded as <code>&gt</code>; in order to be interpreted and displayed as themselves in text, while within the code itself, they are used for HTML tags. If malicious content is injected into an application that escapes special characters and that malicious content uses <code><</code> and <code>></code> as HTML tags, those characters are nonetheless not interpreted as HTML tags by the browser if they’ve been correctly escaped in the application code and in this way the attempted attack is diverted.</p> 1439 <p>The most prominent use of XSS is to steal cookies (source: OWASP HttpOnly) and hijack user sessions, but XSS exploits have been used to expose sensitive information, enable access to privileged services and functionality and deliver malware. </p> 1440 <h3 id="types-of-attacks">Types of attacks</h3> 1441 <p>There are a few methods by which XSS can be manipulated:</p> 1442 <table> 1443 <thead> 1444 <tr> 1445 <th>Type</th> 1446 <th>Origin</th> 1447 <th>Description</th> 1448 </tr> 1449 </thead> 1450 <tbody><tr> 1451 <td><strong>Stored</strong></td> 1452 <td>Server</td> 1453 <td>The malicious code is inserted in the application (usually as a link) by the attacker. The code is activated every time a user clicks the link.</td> 1454 </tr> 1455 <tr> 1456 <td><strong>Reflected</strong></td> 1457 <td>Server</td> 1458 <td>The attacker delivers a malicious link externally from the vulnerable web site application to a user. When clicked, malicious code is sent to the vulnerable web site, which reflects the attack back to the user’s browser.</td> 1459 </tr> 1460 <tr> 1461 <td><strong>DOM-based</strong></td> 1462 <td>Client</td> 1463 <td>The attacker forces the user’s browser to render a malicious page. The data in the page itself delivers the cross-site scripting data.</td> 1464 </tr> 1465 <tr> 1466 <td><strong>Mutated</strong></td> 1467 <td></td> 1468 <td>The attacker injects code that appears safe, but is then rewritten and modified by the browser, while parsing the markup. An example is rebalancing unclosed quotation marks or even adding quotation marks to unquoted parameters.</td> 1469 </tr> 1470 </tbody></table> 1471 <h3 id="affected-environments">Affected environments</h3> 1472 <p>The following environments are susceptible to an XSS attack:</p> 1473 <ul> 1474 <li>Web servers</li> 1475 <li>Application servers</li> 1476 <li>Web application environments</li> 1477 </ul> 1478 <h3 id="how-to-prevent">How to prevent</h3> 1479 <p>This section describes the top best practices designed to specifically protect your code: </p> 1480 <ul> 1481 <li>Sanitize data input in an HTTP request before reflecting it back, ensuring all data is validated, filtered or escaped before echoing anything back to the user, such as the values of query parameters during searches. </li> 1482 <li>Convert special characters such as <code>?</code>, <code>&</code>, <code>/</code>, <code><</code>, <code>></code> and spaces to their respective HTML or URL encoded equivalents. </li> 1483 <li>Give users the option to disable client-side scripts.</li> 1484 <li>Redirect invalid requests.</li> 1485 <li>Detect simultaneous logins, including those from two separate IP addresses, and invalidate those sessions.</li> 1486 <li>Use and enforce a Content Security Policy (source: Wikipedia) to disable any features that might be manipulated for an XSS attack.</li> 1487 <li>Read the documentation for any of the libraries referenced in your code to understand which elements allow for embedded HTML.</li> 1488 </ul> 1489 <h2 id="remediation">Remediation</h2> 1490 <p>Upgrade <code>golang.org/x/net/html</code> to version 0.38.0 or higher.</p> 1491 <h2 id="references">References</h2> 1492 <ul> 1493 <li><a href="https://github.com/golang/net/commit/e1fcd82abba34df74614020343be8eb1fe85f0d9">GitHub Commit</a></li> 1494 <li><a href="https://github.com/golang/go/issues/73070">GitHub Issue</a></li> 1495 <li><a href="https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA">Google Groups Announcement</a></li> 1496 </ul> 1497 1498 <hr/> 1499 1500 <div class="cta card__cta"> 1501 <p><a href="https://snyk.io/vuln/SNYK-GOLANG-GOLANGORGXNETHTML-9572088">More about this vulnerability</a></p> 1502 </div> 1503 1504 </div><!-- .card --> 1505 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 1506 <h2 class="card__title">CVE-2025-8058</h2> 1507 <div class="card__section"> 1508 1509 <div class="card__labels"> 1510 <div class="label label--medium"> 1511 <span class="label__text">medium severity</span> 1512 </div> 1513 </div> 1514 1515 <hr/> 1516 1517 <ul class="card__meta"> 1518 <li class="card__meta__item"> 1519 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 1520 </li> 1521 <li class="card__meta__item"> 1522 Package Manager: ubuntu:24.04 1523 </li> 1524 <li class="card__meta__item"> 1525 Vulnerable module: 1526 1527 glibc/libc-bin 1528 </li> 1529 1530 <li class="card__meta__item">Introduced through: 1531 1532 docker-image|quay.io/argoproj/argocd@v3.0.16 and glibc/libc-bin@2.39-0ubuntu8.5 1533 1534 </li> 1535 </ul> 1536 1537 <hr/> 1538 1539 1540 <h3 class="card__section__title">Detailed paths</h3> 1541 1542 <ul class="card__meta__paths"> 1543 <li> 1544 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1545 docker-image|quay.io/argoproj/argocd@v3.0.16 1546 <span class="list-paths__item__arrow">›</span> 1547 glibc/libc-bin@2.39-0ubuntu8.5 1548 1549 </span> 1550 1551 </li> 1552 <li> 1553 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1554 docker-image|quay.io/argoproj/argocd@v3.0.16 1555 <span class="list-paths__item__arrow">›</span> 1556 glibc/libc6@2.39-0ubuntu8.5 1557 1558 </span> 1559 1560 </li> 1561 </ul><!-- .list-paths --> 1562 1563 </div><!-- .card__section --> 1564 1565 <hr/> 1566 <!-- Overview --> 1567 <h2 id="nvd-description">NVD Description</h2> 1568 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>glibc</code> package and not the <code>glibc</code> package as distributed by <code>Ubuntu</code>.</em> 1569 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 1570 <p>The regcomp function in the GNU C library version from 2.4 to 2.41 is 1571 subject to a double free if some previous allocation fails. It can be 1572 accomplished either by a malloc failure or by using an interposed malloc 1573 that injects random malloc failures. The double free can allow buffer 1574 manipulation depending of how the regex is constructed. This issue 1575 affects all architectures and ABIs supported by the GNU C library.</p> 1576 <h2 id="remediation">Remediation</h2> 1577 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>glibc</code>.</p> 1578 <h2 id="references">References</h2> 1579 <ul> 1580 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-8058">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-8058</a></li> 1581 <li><a href="https://sourceware.org/bugzilla/show_bug.cgi?id=33185">https://sourceware.org/bugzilla/show_bug.cgi?id=33185</a></li> 1582 <li><a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f">https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f</a></li> 1583 </ul> 1584 1585 <hr/> 1586 1587 <div class="cta card__cta"> 1588 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-GLIBC-11031045">More about this vulnerability</a></p> 1589 </div> 1590 1591 </div><!-- .card --> 1592 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 1593 <h2 class="card__title">MPL-2.0 license</h2> 1594 <div class="card__section"> 1595 1596 <div class="card__labels"> 1597 <div class="label label--medium"> 1598 <span class="label__text">medium severity</span> 1599 </div> 1600 </div> 1601 1602 <hr/> 1603 1604 <ul class="card__meta"> 1605 <li class="card__meta__item"> 1606 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argo-cd/v3 <span class="list-paths__item__arrow">›</span> /usr/local/bin/argocd 1607 </li> 1608 <li class="card__meta__item"> 1609 Package Manager: golang 1610 </li> 1611 <li class="card__meta__item"> 1612 Module: 1613 1614 github.com/r3labs/diff/v3 1615 </li> 1616 1617 <li class="card__meta__item">Introduced through: 1618 1619 github.com/argoproj/argo-cd/v3@* and github.com/r3labs/diff/v3@v3.0.1 1620 1621 </li> 1622 </ul> 1623 1624 <hr/> 1625 1626 1627 <h3 class="card__section__title">Detailed paths</h3> 1628 1629 <ul class="card__meta__paths"> 1630 <li> 1631 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1632 github.com/argoproj/argo-cd/v3@* 1633 <span class="list-paths__item__arrow">›</span> 1634 github.com/r3labs/diff/v3@v3.0.1 1635 1636 </span> 1637 1638 </li> 1639 </ul><!-- .list-paths --> 1640 1641 </div><!-- .card__section --> 1642 1643 <hr/> 1644 <!-- Overview --> 1645 <p>MPL-2.0 license</p> 1646 1647 <hr/> 1648 1649 <div class="cta card__cta"> 1650 <p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:r3labs:diff:v3:MPL-2.0">More about this vulnerability</a></p> 1651 </div> 1652 1653 </div><!-- .card --> 1654 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 1655 <h2 class="card__title">MPL-2.0 license</h2> 1656 <div class="card__section"> 1657 1658 <div class="card__labels"> 1659 <div class="label label--medium"> 1660 <span class="label__text">medium severity</span> 1661 </div> 1662 </div> 1663 1664 <hr/> 1665 1666 <ul class="card__meta"> 1667 <li class="card__meta__item"> 1668 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argo-cd/v3 <span class="list-paths__item__arrow">›</span> /usr/local/bin/argocd 1669 </li> 1670 <li class="card__meta__item"> 1671 Package Manager: golang 1672 </li> 1673 <li class="card__meta__item"> 1674 Module: 1675 1676 github.com/hashicorp/go-version 1677 </li> 1678 1679 <li class="card__meta__item">Introduced through: 1680 1681 github.com/argoproj/argo-cd/v3@* and github.com/hashicorp/go-version@v1.6.0 1682 1683 </li> 1684 </ul> 1685 1686 <hr/> 1687 1688 1689 <h3 class="card__section__title">Detailed paths</h3> 1690 1691 <ul class="card__meta__paths"> 1692 <li> 1693 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1694 github.com/argoproj/argo-cd/v3@* 1695 <span class="list-paths__item__arrow">›</span> 1696 github.com/hashicorp/go-version@v1.6.0 1697 1698 </span> 1699 1700 </li> 1701 </ul><!-- .list-paths --> 1702 1703 </div><!-- .card__section --> 1704 1705 <hr/> 1706 <!-- Overview --> 1707 <p>MPL-2.0 license</p> 1708 1709 <hr/> 1710 1711 <div class="cta card__cta"> 1712 <p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-version:MPL-2.0">More about this vulnerability</a></p> 1713 </div> 1714 1715 </div><!-- .card --> 1716 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 1717 <h2 class="card__title">MPL-2.0 license</h2> 1718 <div class="card__section"> 1719 1720 <div class="card__labels"> 1721 <div class="label label--medium"> 1722 <span class="label__text">medium severity</span> 1723 </div> 1724 </div> 1725 1726 <hr/> 1727 1728 <ul class="card__meta"> 1729 <li class="card__meta__item"> 1730 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argo-cd/v3 <span class="list-paths__item__arrow">›</span> /usr/local/bin/argocd 1731 </li> 1732 <li class="card__meta__item"> 1733 Package Manager: golang 1734 </li> 1735 <li class="card__meta__item"> 1736 Module: 1737 1738 github.com/hashicorp/go-retryablehttp 1739 </li> 1740 1741 <li class="card__meta__item">Introduced through: 1742 1743 github.com/argoproj/argo-cd/v3@* and github.com/hashicorp/go-retryablehttp@v0.7.7 1744 1745 </li> 1746 </ul> 1747 1748 <hr/> 1749 1750 1751 <h3 class="card__section__title">Detailed paths</h3> 1752 1753 <ul class="card__meta__paths"> 1754 <li> 1755 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1756 github.com/argoproj/argo-cd/v3@* 1757 <span class="list-paths__item__arrow">›</span> 1758 github.com/hashicorp/go-retryablehttp@v0.7.7 1759 1760 </span> 1761 1762 </li> 1763 </ul><!-- .list-paths --> 1764 1765 </div><!-- .card__section --> 1766 1767 <hr/> 1768 <!-- Overview --> 1769 <p>MPL-2.0 license</p> 1770 1771 <hr/> 1772 1773 <div class="cta card__cta"> 1774 <p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-retryablehttp:MPL-2.0">More about this vulnerability</a></p> 1775 </div> 1776 1777 </div><!-- .card --> 1778 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 1779 <h2 class="card__title">MPL-2.0 license</h2> 1780 <div class="card__section"> 1781 1782 <div class="card__labels"> 1783 <div class="label label--medium"> 1784 <span class="label__text">medium severity</span> 1785 </div> 1786 </div> 1787 1788 <hr/> 1789 1790 <ul class="card__meta"> 1791 <li class="card__meta__item"> 1792 Manifest file: quay.io/argoproj/argocd:v3.0.16/helm/v3 <span class="list-paths__item__arrow">›</span> /usr/local/bin/helm 1793 </li> 1794 <li class="card__meta__item"> 1795 Package Manager: golang 1796 </li> 1797 <li class="card__meta__item"> 1798 Module: 1799 1800 github.com/hashicorp/go-multierror 1801 </li> 1802 1803 <li class="card__meta__item">Introduced through: 1804 1805 helm.sh/helm/v3@* and github.com/hashicorp/go-multierror@v1.1.1 1806 1807 </li> 1808 </ul> 1809 1810 <hr/> 1811 1812 1813 <h3 class="card__section__title">Detailed paths</h3> 1814 1815 <ul class="card__meta__paths"> 1816 <li> 1817 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1818 helm.sh/helm/v3@* 1819 <span class="list-paths__item__arrow">›</span> 1820 github.com/hashicorp/go-multierror@v1.1.1 1821 1822 </span> 1823 1824 </li> 1825 </ul><!-- .list-paths --> 1826 1827 </div><!-- .card__section --> 1828 1829 <hr/> 1830 <!-- Overview --> 1831 <p>MPL-2.0 license</p> 1832 1833 <hr/> 1834 1835 <div class="cta card__cta"> 1836 <p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-multierror:MPL-2.0">More about this vulnerability</a></p> 1837 </div> 1838 1839 </div><!-- .card --> 1840 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 1841 <h2 class="card__title">MPL-2.0 license</h2> 1842 <div class="card__section"> 1843 1844 <div class="card__labels"> 1845 <div class="label label--medium"> 1846 <span class="label__text">medium severity</span> 1847 </div> 1848 </div> 1849 1850 <hr/> 1851 1852 <ul class="card__meta"> 1853 <li class="card__meta__item"> 1854 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argo-cd/v3 <span class="list-paths__item__arrow">›</span> /usr/local/bin/argocd 1855 </li> 1856 <li class="card__meta__item"> 1857 Package Manager: golang 1858 </li> 1859 <li class="card__meta__item"> 1860 Module: 1861 1862 github.com/hashicorp/go-cleanhttp 1863 </li> 1864 1865 <li class="card__meta__item">Introduced through: 1866 1867 github.com/argoproj/argo-cd/v3@* and github.com/hashicorp/go-cleanhttp@v0.5.2 1868 1869 </li> 1870 </ul> 1871 1872 <hr/> 1873 1874 1875 <h3 class="card__section__title">Detailed paths</h3> 1876 1877 <ul class="card__meta__paths"> 1878 <li> 1879 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1880 github.com/argoproj/argo-cd/v3@* 1881 <span class="list-paths__item__arrow">›</span> 1882 github.com/hashicorp/go-cleanhttp@v0.5.2 1883 1884 </span> 1885 1886 </li> 1887 </ul><!-- .list-paths --> 1888 1889 </div><!-- .card__section --> 1890 1891 <hr/> 1892 <!-- Overview --> 1893 <p>MPL-2.0 license</p> 1894 1895 <hr/> 1896 1897 <div class="cta card__cta"> 1898 <p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:hashicorp:go-cleanhttp:MPL-2.0">More about this vulnerability</a></p> 1899 </div> 1900 1901 </div><!-- .card --> 1902 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 1903 <h2 class="card__title">MPL-2.0 license</h2> 1904 <div class="card__section"> 1905 1906 <div class="card__labels"> 1907 <div class="label label--medium"> 1908 <span class="label__text">medium severity</span> 1909 </div> 1910 </div> 1911 1912 <hr/> 1913 1914 <ul class="card__meta"> 1915 <li class="card__meta__item"> 1916 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argo-cd/v3 <span class="list-paths__item__arrow">›</span> /usr/local/bin/argocd 1917 </li> 1918 <li class="card__meta__item"> 1919 Package Manager: golang 1920 </li> 1921 <li class="card__meta__item"> 1922 Module: 1923 1924 github.com/gosimple/slug 1925 </li> 1926 1927 <li class="card__meta__item">Introduced through: 1928 1929 github.com/argoproj/argo-cd/v3@* and github.com/gosimple/slug@v1.15.0 1930 1931 </li> 1932 </ul> 1933 1934 <hr/> 1935 1936 1937 <h3 class="card__section__title">Detailed paths</h3> 1938 1939 <ul class="card__meta__paths"> 1940 <li> 1941 <span class="list-paths__item__introduced"><em>Introduced through</em>: 1942 github.com/argoproj/argo-cd/v3@* 1943 <span class="list-paths__item__arrow">›</span> 1944 github.com/gosimple/slug@v1.15.0 1945 1946 </span> 1947 1948 </li> 1949 </ul><!-- .list-paths --> 1950 1951 </div><!-- .card__section --> 1952 1953 <hr/> 1954 <!-- Overview --> 1955 <p>MPL-2.0 license</p> 1956 1957 <hr/> 1958 1959 <div class="cta card__cta"> 1960 <p><a href="https://snyk.io/vuln/snyk:lic:golang:github.com:gosimple:slug:MPL-2.0">More about this vulnerability</a></p> 1961 </div> 1962 1963 </div><!-- .card --> 1964 <div class="card card--vuln disclosure--not-new severity--medium" data-snyk-test="medium"> 1965 <h2 class="card__title">Improper Encoding or Escaping of Output</h2> 1966 <div class="card__section"> 1967 1968 <div class="card__labels"> 1969 <div class="label label--medium"> 1970 <span class="label__text">medium severity</span> 1971 </div> 1972 </div> 1973 1974 <hr/> 1975 1976 <ul class="card__meta"> 1977 <li class="card__meta__item"> 1978 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 1979 </li> 1980 <li class="card__meta__item"> 1981 Package Manager: ubuntu:24.04 1982 </li> 1983 <li class="card__meta__item"> 1984 Vulnerable module: 1985 1986 git/git-man 1987 </li> 1988 1989 <li class="card__meta__item">Introduced through: 1990 1991 1992 docker-image|quay.io/argoproj/argocd@v3.0.16, git@1:2.43.0-1ubuntu7.3 and others 1993 </li> 1994 </ul> 1995 1996 <hr/> 1997 1998 1999 <h3 class="card__section__title">Detailed paths</h3> 2000 2001 <ul class="card__meta__paths"> 2002 <li> 2003 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2004 docker-image|quay.io/argoproj/argocd@v3.0.16 2005 <span class="list-paths__item__arrow">›</span> 2006 git@1:2.43.0-1ubuntu7.3 2007 <span class="list-paths__item__arrow">›</span> 2008 git/git-man@1:2.43.0-1ubuntu7.3 2009 2010 </span> 2011 2012 </li> 2013 <li> 2014 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2015 docker-image|quay.io/argoproj/argocd@v3.0.16 2016 <span class="list-paths__item__arrow">›</span> 2017 git@1:2.43.0-1ubuntu7.3 2018 2019 </span> 2020 2021 </li> 2022 <li> 2023 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2024 docker-image|quay.io/argoproj/argocd@v3.0.16 2025 <span class="list-paths__item__arrow">›</span> 2026 git-lfs@3.4.1-1ubuntu0.3 2027 <span class="list-paths__item__arrow">›</span> 2028 git@1:2.43.0-1ubuntu7.3 2029 2030 </span> 2031 2032 </li> 2033 </ul><!-- .list-paths --> 2034 2035 </div><!-- .card__section --> 2036 2037 <hr/> 2038 <!-- Overview --> 2039 <h2 id="nvd-description">NVD Description</h2> 2040 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>git</code> package and not the <code>git</code> package as distributed by <code>Ubuntu</code>.</em> 2041 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 2042 <p>Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.</p> 2043 <h2 id="remediation">Remediation</h2> 2044 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>git</code>.</p> 2045 <h2 id="references">References</h2> 2046 <ul> 2047 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-52005">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-52005</a></li> 2048 <li><a href="https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329">https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329</a></li> 2049 <li><a href="https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net">https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net</a></li> 2050 </ul> 2051 2052 <hr/> 2053 2054 <div class="cta card__cta"> 2055 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-GIT-8637112">More about this vulnerability</a></p> 2056 </div> 2057 2058 </div><!-- .card --> 2059 <div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low"> 2060 <h2 class="card__title">CVE-2024-56433</h2> 2061 <div class="card__section"> 2062 2063 <div class="card__labels"> 2064 <div class="label label--low"> 2065 <span class="label__text">low severity</span> 2066 </div> 2067 </div> 2068 2069 <hr/> 2070 2071 <ul class="card__meta"> 2072 <li class="card__meta__item"> 2073 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 2074 </li> 2075 <li class="card__meta__item"> 2076 Package Manager: ubuntu:24.04 2077 </li> 2078 <li class="card__meta__item"> 2079 Vulnerable module: 2080 2081 shadow/passwd 2082 </li> 2083 2084 <li class="card__meta__item">Introduced through: 2085 2086 docker-image|quay.io/argoproj/argocd@v3.0.16 and shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 2087 2088 </li> 2089 </ul> 2090 2091 <hr/> 2092 2093 2094 <h3 class="card__section__title">Detailed paths</h3> 2095 2096 <ul class="card__meta__paths"> 2097 <li> 2098 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2099 docker-image|quay.io/argoproj/argocd@v3.0.16 2100 <span class="list-paths__item__arrow">›</span> 2101 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 2102 2103 </span> 2104 2105 </li> 2106 <li> 2107 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2108 docker-image|quay.io/argoproj/argocd@v3.0.16 2109 <span class="list-paths__item__arrow">›</span> 2110 openssh/openssh-client@1:9.6p1-3ubuntu13.13 2111 <span class="list-paths__item__arrow">›</span> 2112 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 2113 2114 </span> 2115 2116 </li> 2117 <li> 2118 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2119 docker-image|quay.io/argoproj/argocd@v3.0.16 2120 <span class="list-paths__item__arrow">›</span> 2121 apt@2.8.3 2122 <span class="list-paths__item__arrow">›</span> 2123 adduser@3.137ubuntu1 2124 <span class="list-paths__item__arrow">›</span> 2125 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 2126 2127 </span> 2128 2129 </li> 2130 <li> 2131 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2132 docker-image|quay.io/argoproj/argocd@v3.0.16 2133 <span class="list-paths__item__arrow">›</span> 2134 shadow/login@1:4.13+dfsg1-4ubuntu3.2 2135 2136 </span> 2137 2138 </li> 2139 </ul><!-- .list-paths --> 2140 2141 </div><!-- .card__section --> 2142 2143 <hr/> 2144 <!-- Overview --> 2145 <h2 id="nvd-description">NVD Description</h2> 2146 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>shadow</code> package and not the <code>shadow</code> package as distributed by <code>Ubuntu</code>.</em> 2147 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 2148 <p>shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.</p> 2149 <h2 id="remediation">Remediation</h2> 2150 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>shadow</code>.</p> 2151 <h2 id="references">References</h2> 2152 <ul> 2153 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-56433">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-56433</a></li> 2154 <li><a href="https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241">https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241</a></li> 2155 <li><a href="https://github.com/shadow-maint/shadow/issues/1157">https://github.com/shadow-maint/shadow/issues/1157</a></li> 2156 <li><a href="https://github.com/shadow-maint/shadow/releases/tag/4.4">https://github.com/shadow-maint/shadow/releases/tag/4.4</a></li> 2157 </ul> 2158 2159 <hr/> 2160 2161 <div class="cta card__cta"> 2162 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-SHADOW-8600509">More about this vulnerability</a></p> 2163 </div> 2164 2165 </div><!-- .card --> 2166 <div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low"> 2167 <h2 class="card__title">Release of Invalid Pointer or Reference</h2> 2168 <div class="card__section"> 2169 2170 <div class="card__labels"> 2171 <div class="label label--low"> 2172 <span class="label__text">low severity</span> 2173 </div> 2174 </div> 2175 2176 <hr/> 2177 2178 <ul class="card__meta"> 2179 <li class="card__meta__item"> 2180 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 2181 </li> 2182 <li class="card__meta__item"> 2183 Package Manager: ubuntu:24.04 2184 </li> 2185 <li class="card__meta__item"> 2186 Vulnerable module: 2187 2188 patch 2189 </li> 2190 2191 <li class="card__meta__item">Introduced through: 2192 2193 docker-image|quay.io/argoproj/argocd@v3.0.16 and patch@2.7.6-7build3 2194 2195 </li> 2196 </ul> 2197 2198 <hr/> 2199 2200 2201 <h3 class="card__section__title">Detailed paths</h3> 2202 2203 <ul class="card__meta__paths"> 2204 <li> 2205 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2206 docker-image|quay.io/argoproj/argocd@v3.0.16 2207 <span class="list-paths__item__arrow">›</span> 2208 patch@2.7.6-7build3 2209 2210 </span> 2211 2212 </li> 2213 </ul><!-- .list-paths --> 2214 2215 </div><!-- .card__section --> 2216 2217 <hr/> 2218 <!-- Overview --> 2219 <h2 id="nvd-description">NVD Description</h2> 2220 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>patch</code> package and not the <code>patch</code> package as distributed by <code>Ubuntu</code>.</em> 2221 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 2222 <p>An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.</p> 2223 <h2 id="remediation">Remediation</h2> 2224 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>patch</code>.</p> 2225 <h2 id="references">References</h2> 2226 <ul> 2227 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2021-45261">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2021-45261</a></li> 2228 <li><a href="https://savannah.gnu.org/bugs/?61685">https://savannah.gnu.org/bugs/?61685</a></li> 2229 </ul> 2230 2231 <hr/> 2232 2233 <div class="cta card__cta"> 2234 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-PATCH-6707039">More about this vulnerability</a></p> 2235 </div> 2236 2237 </div><!-- .card --> 2238 <div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low"> 2239 <h2 class="card__title">Double Free</h2> 2240 <div class="card__section"> 2241 2242 <div class="card__labels"> 2243 <div class="label label--low"> 2244 <span class="label__text">low severity</span> 2245 </div> 2246 </div> 2247 2248 <hr/> 2249 2250 <ul class="card__meta"> 2251 <li class="card__meta__item"> 2252 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 2253 </li> 2254 <li class="card__meta__item"> 2255 Package Manager: ubuntu:24.04 2256 </li> 2257 <li class="card__meta__item"> 2258 Vulnerable module: 2259 2260 patch 2261 </li> 2262 2263 <li class="card__meta__item">Introduced through: 2264 2265 docker-image|quay.io/argoproj/argocd@v3.0.16 and patch@2.7.6-7build3 2266 2267 </li> 2268 </ul> 2269 2270 <hr/> 2271 2272 2273 <h3 class="card__section__title">Detailed paths</h3> 2274 2275 <ul class="card__meta__paths"> 2276 <li> 2277 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2278 docker-image|quay.io/argoproj/argocd@v3.0.16 2279 <span class="list-paths__item__arrow">›</span> 2280 patch@2.7.6-7build3 2281 2282 </span> 2283 2284 </li> 2285 </ul><!-- .list-paths --> 2286 2287 </div><!-- .card__section --> 2288 2289 <hr/> 2290 <!-- Overview --> 2291 <h2 id="nvd-description">NVD Description</h2> 2292 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>patch</code> package and not the <code>patch</code> package as distributed by <code>Ubuntu</code>.</em> 2293 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 2294 <p>A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.</p> 2295 <h2 id="remediation">Remediation</h2> 2296 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>patch</code>.</p> 2297 <h2 id="references">References</h2> 2298 <ul> 2299 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2018-6952">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2018-6952</a></li> 2300 <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952</a></li> 2301 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6952">https://security-tracker.debian.org/tracker/CVE-2018-6952</a></li> 2302 <li><a href="https://security.gentoo.org/glsa/201904-17">https://security.gentoo.org/glsa/201904-17</a></li> 2303 <li><a href="https://savannah.gnu.org/bugs/index.php?53133">https://savannah.gnu.org/bugs/index.php?53133</a></li> 2304 <li><a href="https://access.redhat.com/errata/RHSA-2019:2033">https://access.redhat.com/errata/RHSA-2019:2033</a></li> 2305 <li><a href="http://www.securityfocus.com/bid/103047">http://www.securityfocus.com/bid/103047</a></li> 2306 </ul> 2307 2308 <hr/> 2309 2310 <div class="cta card__cta"> 2311 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-PATCH-6720551">More about this vulnerability</a></p> 2312 </div> 2313 2314 </div><!-- .card --> 2315 <div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low"> 2316 <h2 class="card__title">CVE-2024-41996</h2> 2317 <div class="card__section"> 2318 2319 <div class="card__labels"> 2320 <div class="label label--low"> 2321 <span class="label__text">low severity</span> 2322 </div> 2323 </div> 2324 2325 <hr/> 2326 2327 <ul class="card__meta"> 2328 <li class="card__meta__item"> 2329 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 2330 </li> 2331 <li class="card__meta__item"> 2332 Package Manager: ubuntu:24.04 2333 </li> 2334 <li class="card__meta__item"> 2335 Vulnerable module: 2336 2337 openssl/libssl3t64 2338 </li> 2339 2340 <li class="card__meta__item">Introduced through: 2341 2342 docker-image|quay.io/argoproj/argocd@v3.0.16 and openssl/libssl3t64@3.0.13-0ubuntu3.5 2343 2344 </li> 2345 </ul> 2346 2347 <hr/> 2348 2349 2350 <h3 class="card__section__title">Detailed paths</h3> 2351 2352 <ul class="card__meta__paths"> 2353 <li> 2354 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2355 docker-image|quay.io/argoproj/argocd@v3.0.16 2356 <span class="list-paths__item__arrow">›</span> 2357 openssl/libssl3t64@3.0.13-0ubuntu3.5 2358 2359 </span> 2360 2361 </li> 2362 <li> 2363 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2364 docker-image|quay.io/argoproj/argocd@v3.0.16 2365 <span class="list-paths__item__arrow">›</span> 2366 coreutils@9.4-3ubuntu6 2367 <span class="list-paths__item__arrow">›</span> 2368 openssl/libssl3t64@3.0.13-0ubuntu3.5 2369 2370 </span> 2371 2372 </li> 2373 <li> 2374 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2375 docker-image|quay.io/argoproj/argocd@v3.0.16 2376 <span class="list-paths__item__arrow">›</span> 2377 cyrus-sasl2/libsasl2-modules@2.1.28+dfsg1-5ubuntu3.1 2378 <span class="list-paths__item__arrow">›</span> 2379 openssl/libssl3t64@3.0.13-0ubuntu3.5 2380 2381 </span> 2382 2383 </li> 2384 <li> 2385 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2386 docker-image|quay.io/argoproj/argocd@v3.0.16 2387 <span class="list-paths__item__arrow">›</span> 2388 libfido2/libfido2-1@1.14.0-1build3 2389 <span class="list-paths__item__arrow">›</span> 2390 openssl/libssl3t64@3.0.13-0ubuntu3.5 2391 2392 </span> 2393 2394 </li> 2395 <li> 2396 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2397 docker-image|quay.io/argoproj/argocd@v3.0.16 2398 <span class="list-paths__item__arrow">›</span> 2399 openssh/openssh-client@1:9.6p1-3ubuntu13.13 2400 <span class="list-paths__item__arrow">›</span> 2401 openssl/libssl3t64@3.0.13-0ubuntu3.5 2402 2403 </span> 2404 2405 </li> 2406 <li> 2407 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2408 docker-image|quay.io/argoproj/argocd@v3.0.16 2409 <span class="list-paths__item__arrow">›</span> 2410 ca-certificates@20240203 2411 <span class="list-paths__item__arrow">›</span> 2412 openssl@3.0.13-0ubuntu3.5 2413 <span class="list-paths__item__arrow">›</span> 2414 openssl/libssl3t64@3.0.13-0ubuntu3.5 2415 2416 </span> 2417 2418 </li> 2419 <li> 2420 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2421 docker-image|quay.io/argoproj/argocd@v3.0.16 2422 <span class="list-paths__item__arrow">›</span> 2423 git@1:2.43.0-1ubuntu7.3 2424 <span class="list-paths__item__arrow">›</span> 2425 curl/libcurl3t64-gnutls@8.5.0-2ubuntu10.6 2426 <span class="list-paths__item__arrow">›</span> 2427 libssh/libssh-4@0.10.6-2ubuntu0.1 2428 <span class="list-paths__item__arrow">›</span> 2429 openssl/libssl3t64@3.0.13-0ubuntu3.5 2430 2431 </span> 2432 2433 </li> 2434 <li> 2435 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2436 docker-image|quay.io/argoproj/argocd@v3.0.16 2437 <span class="list-paths__item__arrow">›</span> 2438 git@1:2.43.0-1ubuntu7.3 2439 <span class="list-paths__item__arrow">›</span> 2440 curl/libcurl3t64-gnutls@8.5.0-2ubuntu10.6 2441 <span class="list-paths__item__arrow">›</span> 2442 krb5/libgssapi-krb5-2@1.20.1-6ubuntu2.6 2443 <span class="list-paths__item__arrow">›</span> 2444 krb5/libkrb5-3@1.20.1-6ubuntu2.6 2445 <span class="list-paths__item__arrow">›</span> 2446 openssl/libssl3t64@3.0.13-0ubuntu3.5 2447 2448 </span> 2449 2450 </li> 2451 <li> 2452 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2453 docker-image|quay.io/argoproj/argocd@v3.0.16 2454 <span class="list-paths__item__arrow">›</span> 2455 git@1:2.43.0-1ubuntu7.3 2456 <span class="list-paths__item__arrow">›</span> 2457 curl/libcurl3t64-gnutls@8.5.0-2ubuntu10.6 2458 <span class="list-paths__item__arrow">›</span> 2459 openldap/libldap2@2.6.7+dfsg-1~exp1ubuntu8.2 2460 <span class="list-paths__item__arrow">›</span> 2461 cyrus-sasl2/libsasl2-2@2.1.28+dfsg1-5ubuntu3.1 2462 <span class="list-paths__item__arrow">›</span> 2463 openssl/libssl3t64@3.0.13-0ubuntu3.5 2464 2465 </span> 2466 2467 </li> 2468 <li> 2469 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2470 docker-image|quay.io/argoproj/argocd@v3.0.16 2471 <span class="list-paths__item__arrow">›</span> 2472 openssl@3.0.13-0ubuntu3.5 2473 2474 </span> 2475 2476 </li> 2477 <li> 2478 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2479 docker-image|quay.io/argoproj/argocd@v3.0.16 2480 <span class="list-paths__item__arrow">›</span> 2481 ca-certificates@20240203 2482 <span class="list-paths__item__arrow">›</span> 2483 openssl@3.0.13-0ubuntu3.5 2484 2485 </span> 2486 2487 </li> 2488 </ul><!-- .list-paths --> 2489 2490 </div><!-- .card__section --> 2491 2492 <hr/> 2493 <!-- Overview --> 2494 <h2 id="nvd-description">NVD Description</h2> 2495 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>openssl</code> package and not the <code>openssl</code> package as distributed by <code>Ubuntu</code>.</em> 2496 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 2497 <p>Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.</p> 2498 <h2 id="remediation">Remediation</h2> 2499 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>openssl</code>.</p> 2500 <h2 id="references">References</h2> 2501 <ul> 2502 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-41996">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-41996</a></li> 2503 <li><a href="https://dheatattack.gitlab.io/details/">https://dheatattack.gitlab.io/details/</a></li> 2504 <li><a href="https://dheatattack.gitlab.io/faq/">https://dheatattack.gitlab.io/faq/</a></li> 2505 <li><a href="https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1">https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1</a></li> 2506 </ul> 2507 2508 <hr/> 2509 2510 <div class="cta card__cta"> 2511 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-OPENSSL-7838291">More about this vulnerability</a></p> 2512 </div> 2513 2514 </div><!-- .card --> 2515 <div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low"> 2516 <h2 class="card__title">Information Exposure</h2> 2517 <div class="card__section"> 2518 2519 <div class="card__labels"> 2520 <div class="label label--low"> 2521 <span class="label__text">low severity</span> 2522 </div> 2523 </div> 2524 2525 <hr/> 2526 2527 <ul class="card__meta"> 2528 <li class="card__meta__item"> 2529 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 2530 </li> 2531 <li class="card__meta__item"> 2532 Package Manager: ubuntu:24.04 2533 </li> 2534 <li class="card__meta__item"> 2535 Vulnerable module: 2536 2537 libgcrypt20 2538 </li> 2539 2540 <li class="card__meta__item">Introduced through: 2541 2542 docker-image|quay.io/argoproj/argocd@v3.0.16 and libgcrypt20@1.10.3-2build1 2543 2544 </li> 2545 </ul> 2546 2547 <hr/> 2548 2549 2550 <h3 class="card__section__title">Detailed paths</h3> 2551 2552 <ul class="card__meta__paths"> 2553 <li> 2554 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2555 docker-image|quay.io/argoproj/argocd@v3.0.16 2556 <span class="list-paths__item__arrow">›</span> 2557 libgcrypt20@1.10.3-2build1 2558 2559 </span> 2560 2561 </li> 2562 <li> 2563 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2564 docker-image|quay.io/argoproj/argocd@v3.0.16 2565 <span class="list-paths__item__arrow">›</span> 2566 gnupg2/dirmngr@2.4.4-2ubuntu17.3 2567 <span class="list-paths__item__arrow">›</span> 2568 libgcrypt20@1.10.3-2build1 2569 2570 </span> 2571 2572 </li> 2573 <li> 2574 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2575 docker-image|quay.io/argoproj/argocd@v3.0.16 2576 <span class="list-paths__item__arrow">›</span> 2577 gnupg2/gpg@2.4.4-2ubuntu17.3 2578 <span class="list-paths__item__arrow">›</span> 2579 libgcrypt20@1.10.3-2build1 2580 2581 </span> 2582 2583 </li> 2584 <li> 2585 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2586 docker-image|quay.io/argoproj/argocd@v3.0.16 2587 <span class="list-paths__item__arrow">›</span> 2588 gnupg2/gpg-agent@2.4.4-2ubuntu17.3 2589 <span class="list-paths__item__arrow">›</span> 2590 libgcrypt20@1.10.3-2build1 2591 2592 </span> 2593 2594 </li> 2595 <li> 2596 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2597 docker-image|quay.io/argoproj/argocd@v3.0.16 2598 <span class="list-paths__item__arrow">›</span> 2599 apt@2.8.3 2600 <span class="list-paths__item__arrow">›</span> 2601 apt/libapt-pkg6.0t64@2.8.3 2602 <span class="list-paths__item__arrow">›</span> 2603 libgcrypt20@1.10.3-2build1 2604 2605 </span> 2606 2607 </li> 2608 <li> 2609 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2610 docker-image|quay.io/argoproj/argocd@v3.0.16 2611 <span class="list-paths__item__arrow">›</span> 2612 apt@2.8.3 2613 <span class="list-paths__item__arrow">›</span> 2614 gnupg2/gpgv@2.4.4-2ubuntu17.3 2615 <span class="list-paths__item__arrow">›</span> 2616 libgcrypt20@1.10.3-2build1 2617 2618 </span> 2619 2620 </li> 2621 <li> 2622 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2623 docker-image|quay.io/argoproj/argocd@v3.0.16 2624 <span class="list-paths__item__arrow">›</span> 2625 gnupg2/gpg@2.4.4-2ubuntu17.3 2626 <span class="list-paths__item__arrow">›</span> 2627 gnupg2/gpgconf@2.4.4-2ubuntu17.3 2628 <span class="list-paths__item__arrow">›</span> 2629 libgcrypt20@1.10.3-2build1 2630 2631 </span> 2632 2633 </li> 2634 <li> 2635 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2636 docker-image|quay.io/argoproj/argocd@v3.0.16 2637 <span class="list-paths__item__arrow">›</span> 2638 apt@2.8.3 2639 <span class="list-paths__item__arrow">›</span> 2640 adduser@3.137ubuntu1 2641 <span class="list-paths__item__arrow">›</span> 2642 shadow/passwd@1:4.13+dfsg1-4ubuntu3.2 2643 <span class="list-paths__item__arrow">›</span> 2644 pam/libpam-modules@1.5.3-5ubuntu5.4 2645 <span class="list-paths__item__arrow">›</span> 2646 systemd/libsystemd0@255.4-1ubuntu8.10 2647 <span class="list-paths__item__arrow">›</span> 2648 libgcrypt20@1.10.3-2build1 2649 2650 </span> 2651 2652 </li> 2653 </ul><!-- .list-paths --> 2654 2655 </div><!-- .card__section --> 2656 2657 <hr/> 2658 <!-- Overview --> 2659 <h2 id="nvd-description">NVD Description</h2> 2660 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>libgcrypt20</code> package and not the <code>libgcrypt20</code> package as distributed by <code>Ubuntu</code>.</em> 2661 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 2662 <p>A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.</p> 2663 <h2 id="remediation">Remediation</h2> 2664 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>libgcrypt20</code>.</p> 2665 <h2 id="references">References</h2> 2666 <ul> 2667 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-2236">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-2236</a></li> 2668 <li><a href="https://access.redhat.com/errata/RHSA-2024:9404">https://access.redhat.com/errata/RHSA-2024:9404</a></li> 2669 <li><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2268268">https://bugzilla.redhat.com/show_bug.cgi?id=2268268</a></li> 2670 <li><a href="https://access.redhat.com/errata/RHSA-2025:3534">https://access.redhat.com/errata/RHSA-2025:3534</a></li> 2671 <li><a href="https://access.redhat.com/errata/RHSA-2025:3530">https://access.redhat.com/errata/RHSA-2025:3530</a></li> 2672 <li><a href="https://access.redhat.com/security/cve/CVE-2024-2236">https://access.redhat.com/security/cve/CVE-2024-2236</a></li> 2673 <li><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2245218">https://bugzilla.redhat.com/show_bug.cgi?id=2245218</a></li> 2674 </ul> 2675 2676 <hr/> 2677 2678 <div class="cta card__cta"> 2679 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-LIBGCRYPT20-6693674">More about this vulnerability</a></p> 2680 </div> 2681 2682 </div><!-- .card --> 2683 <div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low"> 2684 <h2 class="card__title">Out-of-bounds Write</h2> 2685 <div class="card__section"> 2686 2687 <div class="card__labels"> 2688 <div class="label label--low"> 2689 <span class="label__text">low severity</span> 2690 </div> 2691 </div> 2692 2693 <hr/> 2694 2695 <ul class="card__meta"> 2696 <li class="card__meta__item"> 2697 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 2698 </li> 2699 <li class="card__meta__item"> 2700 Package Manager: ubuntu:24.04 2701 </li> 2702 <li class="card__meta__item"> 2703 Vulnerable module: 2704 2705 gnupg2/gpgv 2706 </li> 2707 2708 <li class="card__meta__item">Introduced through: 2709 2710 docker-image|quay.io/argoproj/argocd@v3.0.16 and gnupg2/gpgv@2.4.4-2ubuntu17.3 2711 2712 </li> 2713 </ul> 2714 2715 <hr/> 2716 2717 2718 <h3 class="card__section__title">Detailed paths</h3> 2719 2720 <ul class="card__meta__paths"> 2721 <li> 2722 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2723 docker-image|quay.io/argoproj/argocd@v3.0.16 2724 <span class="list-paths__item__arrow">›</span> 2725 gnupg2/gpgv@2.4.4-2ubuntu17.3 2726 2727 </span> 2728 2729 </li> 2730 <li> 2731 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2732 docker-image|quay.io/argoproj/argocd@v3.0.16 2733 <span class="list-paths__item__arrow">›</span> 2734 apt@2.8.3 2735 <span class="list-paths__item__arrow">›</span> 2736 gnupg2/gpgv@2.4.4-2ubuntu17.3 2737 2738 </span> 2739 2740 </li> 2741 <li> 2742 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2743 docker-image|quay.io/argoproj/argocd@v3.0.16 2744 <span class="list-paths__item__arrow">›</span> 2745 gnupg2/dirmngr@2.4.4-2ubuntu17.3 2746 <span class="list-paths__item__arrow">›</span> 2747 gnupg2/gpgconf@2.4.4-2ubuntu17.3 2748 2749 </span> 2750 2751 </li> 2752 <li> 2753 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2754 docker-image|quay.io/argoproj/argocd@v3.0.16 2755 <span class="list-paths__item__arrow">›</span> 2756 gnupg2/gpg-agent@2.4.4-2ubuntu17.3 2757 <span class="list-paths__item__arrow">›</span> 2758 gnupg2/gpgconf@2.4.4-2ubuntu17.3 2759 2760 </span> 2761 2762 </li> 2763 <li> 2764 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2765 docker-image|quay.io/argoproj/argocd@v3.0.16 2766 <span class="list-paths__item__arrow">›</span> 2767 gnupg2/gpg@2.4.4-2ubuntu17.3 2768 <span class="list-paths__item__arrow">›</span> 2769 gnupg2/gpgconf@2.4.4-2ubuntu17.3 2770 2771 </span> 2772 2773 </li> 2774 <li> 2775 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2776 docker-image|quay.io/argoproj/argocd@v3.0.16 2777 <span class="list-paths__item__arrow">›</span> 2778 gnupg2/dirmngr@2.4.4-2ubuntu17.3 2779 2780 </span> 2781 2782 </li> 2783 <li> 2784 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2785 docker-image|quay.io/argoproj/argocd@v3.0.16 2786 <span class="list-paths__item__arrow">›</span> 2787 gnupg2/gpg@2.4.4-2ubuntu17.3 2788 2789 </span> 2790 2791 </li> 2792 <li> 2793 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2794 docker-image|quay.io/argoproj/argocd@v3.0.16 2795 <span class="list-paths__item__arrow">›</span> 2796 gnupg2/gpg-agent@2.4.4-2ubuntu17.3 2797 2798 </span> 2799 2800 </li> 2801 </ul><!-- .list-paths --> 2802 2803 </div><!-- .card__section --> 2804 2805 <hr/> 2806 <!-- Overview --> 2807 <h2 id="nvd-description">NVD Description</h2> 2808 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>gnupg2</code> package and not the <code>gnupg2</code> package as distributed by <code>Ubuntu</code>.</em> 2809 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 2810 <p>GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.</p> 2811 <h2 id="remediation">Remediation</h2> 2812 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>gnupg2</code>.</p> 2813 <h2 id="references">References</h2> 2814 <ul> 2815 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-3219">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-3219</a></li> 2816 <li><a href="https://access.redhat.com/security/cve/CVE-2022-3219">https://access.redhat.com/security/cve/CVE-2022-3219</a></li> 2817 <li><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2127010">https://bugzilla.redhat.com/show_bug.cgi?id=2127010</a></li> 2818 <li><a href="https://dev.gnupg.org/D556">https://dev.gnupg.org/D556</a></li> 2819 <li><a href="https://dev.gnupg.org/T5993">https://dev.gnupg.org/T5993</a></li> 2820 <li><a href="https://marc.info/?l=oss-security&m=165696590211434&w=4">https://marc.info/?l=oss-security&m=165696590211434&w=4</a></li> 2821 <li><a href="https://security.netapp.com/advisory/ntap-20230324-0001/">https://security.netapp.com/advisory/ntap-20230324-0001/</a></li> 2822 </ul> 2823 2824 <hr/> 2825 2826 <div class="cta card__cta"> 2827 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-GNUPG2-6702792">More about this vulnerability</a></p> 2828 </div> 2829 2830 </div><!-- .card --> 2831 <div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low"> 2832 <h2 class="card__title">Allocation of Resources Without Limits or Throttling</h2> 2833 <div class="card__section"> 2834 2835 <div class="card__labels"> 2836 <div class="label label--low"> 2837 <span class="label__text">low severity</span> 2838 </div> 2839 </div> 2840 2841 <hr/> 2842 2843 <ul class="card__meta"> 2844 <li class="card__meta__item"> 2845 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 2846 </li> 2847 <li class="card__meta__item"> 2848 Package Manager: ubuntu:24.04 2849 </li> 2850 <li class="card__meta__item"> 2851 Vulnerable module: 2852 2853 glibc/libc-bin 2854 </li> 2855 2856 <li class="card__meta__item">Introduced through: 2857 2858 docker-image|quay.io/argoproj/argocd@v3.0.16 and glibc/libc-bin@2.39-0ubuntu8.5 2859 2860 </li> 2861 </ul> 2862 2863 <hr/> 2864 2865 2866 <h3 class="card__section__title">Detailed paths</h3> 2867 2868 <ul class="card__meta__paths"> 2869 <li> 2870 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2871 docker-image|quay.io/argoproj/argocd@v3.0.16 2872 <span class="list-paths__item__arrow">›</span> 2873 glibc/libc-bin@2.39-0ubuntu8.5 2874 2875 </span> 2876 2877 </li> 2878 <li> 2879 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2880 docker-image|quay.io/argoproj/argocd@v3.0.16 2881 <span class="list-paths__item__arrow">›</span> 2882 glibc/libc6@2.39-0ubuntu8.5 2883 2884 </span> 2885 2886 </li> 2887 </ul><!-- .list-paths --> 2888 2889 </div><!-- .card__section --> 2890 2891 <hr/> 2892 <!-- Overview --> 2893 <h2 id="nvd-description">NVD Description</h2> 2894 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>glibc</code> package and not the <code>glibc</code> package as distributed by <code>Ubuntu</code>.</em> 2895 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 2896 <p>sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.</p> 2897 <h2 id="remediation">Remediation</h2> 2898 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>glibc</code>.</p> 2899 <h2 id="references">References</h2> 2900 <ul> 2901 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-20013">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-20013</a></li> 2902 <li><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a></li> 2903 <li><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a></li> 2904 <li><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a></li> 2905 </ul> 2906 2907 <hr/> 2908 2909 <div class="cta card__cta"> 2910 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-GLIBC-6727419">More about this vulnerability</a></p> 2911 </div> 2912 2913 </div><!-- .card --> 2914 <div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low"> 2915 <h2 class="card__title">CVE-2025-9086</h2> 2916 <div class="card__section"> 2917 2918 <div class="card__labels"> 2919 <div class="label label--low"> 2920 <span class="label__text">low severity</span> 2921 </div> 2922 </div> 2923 2924 <hr/> 2925 2926 <ul class="card__meta"> 2927 <li class="card__meta__item"> 2928 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 2929 </li> 2930 <li class="card__meta__item"> 2931 Package Manager: ubuntu:24.04 2932 </li> 2933 <li class="card__meta__item"> 2934 Vulnerable module: 2935 2936 curl/libcurl3t64-gnutls 2937 </li> 2938 2939 <li class="card__meta__item">Introduced through: 2940 2941 2942 docker-image|quay.io/argoproj/argocd@v3.0.16, git@1:2.43.0-1ubuntu7.3 and others 2943 </li> 2944 </ul> 2945 2946 <hr/> 2947 2948 2949 <h3 class="card__section__title">Detailed paths</h3> 2950 2951 <ul class="card__meta__paths"> 2952 <li> 2953 <span class="list-paths__item__introduced"><em>Introduced through</em>: 2954 docker-image|quay.io/argoproj/argocd@v3.0.16 2955 <span class="list-paths__item__arrow">›</span> 2956 git@1:2.43.0-1ubuntu7.3 2957 <span class="list-paths__item__arrow">›</span> 2958 curl/libcurl3t64-gnutls@8.5.0-2ubuntu10.6 2959 2960 </span> 2961 2962 </li> 2963 </ul><!-- .list-paths --> 2964 2965 </div><!-- .card__section --> 2966 2967 <hr/> 2968 <!-- Overview --> 2969 <h2 id="nvd-description">NVD Description</h2> 2970 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>curl</code> package and not the <code>curl</code> package as distributed by <code>Ubuntu</code>.</em> 2971 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 2972 <ol> 2973 <li>A cookie is set using the <code>secure</code> keyword for <code>https://target</code></li> 2974 <li>curl is redirected to or otherwise made to speak with <code>http://target</code> (same 2975 hostname, but using clear text HTTP) using the same cookie set</li> 2976 <li>The same cookie name is set - but with just a slash as path (<code>path=&#39;/&#39;</code>). 2977 Since this site is not secure, the cookie <em>should</em> just be ignored.</li> 2978 <li>A bug in the path comparison logic makes curl read outside a heap buffer 2979 boundary</li> 2980 </ol> 2981 <p>The bug either causes a crash or it potentially makes the comparison come to 2982 the wrong conclusion and lets the clear-text site override the contents of the 2983 secure cookie, contrary to expectations and depending on the memory contents 2984 immediately following the single-byte allocation that holds the path.</p> 2985 <p>The presumed and correct behavior would be to plainly ignore the second set of 2986 the cookie since it was already set as secure on a secure host so overriding 2987 it on an insecure host should not be okay.</p> 2988 <h2 id="remediation">Remediation</h2> 2989 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>curl</code>.</p> 2990 <h2 id="references">References</h2> 2991 <ul> 2992 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-9086">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-9086</a></li> 2993 <li><a href="https://curl.se/docs/CVE-2025-9086.html">https://curl.se/docs/CVE-2025-9086.html</a></li> 2994 <li><a href="https://curl.se/docs/CVE-2025-9086.json">https://curl.se/docs/CVE-2025-9086.json</a></li> 2995 <li><a href="https://hackerone.com/reports/3294999">https://hackerone.com/reports/3294999</a></li> 2996 </ul> 2997 2998 <hr/> 2999 3000 <div class="cta card__cta"> 3001 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-CURL-12613443">More about this vulnerability</a></p> 3002 </div> 3003 3004 </div><!-- .card --> 3005 <div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low"> 3006 <h2 class="card__title">CVE-2025-10148</h2> 3007 <div class="card__section"> 3008 3009 <div class="card__labels"> 3010 <div class="label label--low"> 3011 <span class="label__text">low severity</span> 3012 </div> 3013 </div> 3014 3015 <hr/> 3016 3017 <ul class="card__meta"> 3018 <li class="card__meta__item"> 3019 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 3020 </li> 3021 <li class="card__meta__item"> 3022 Package Manager: ubuntu:24.04 3023 </li> 3024 <li class="card__meta__item"> 3025 Vulnerable module: 3026 3027 curl/libcurl3t64-gnutls 3028 </li> 3029 3030 <li class="card__meta__item">Introduced through: 3031 3032 3033 docker-image|quay.io/argoproj/argocd@v3.0.16, git@1:2.43.0-1ubuntu7.3 and others 3034 </li> 3035 </ul> 3036 3037 <hr/> 3038 3039 3040 <h3 class="card__section__title">Detailed paths</h3> 3041 3042 <ul class="card__meta__paths"> 3043 <li> 3044 <span class="list-paths__item__introduced"><em>Introduced through</em>: 3045 docker-image|quay.io/argoproj/argocd@v3.0.16 3046 <span class="list-paths__item__arrow">›</span> 3047 git@1:2.43.0-1ubuntu7.3 3048 <span class="list-paths__item__arrow">›</span> 3049 curl/libcurl3t64-gnutls@8.5.0-2ubuntu10.6 3050 3051 </span> 3052 3053 </li> 3054 </ul><!-- .list-paths --> 3055 3056 </div><!-- .card__section --> 3057 3058 <hr/> 3059 <!-- Overview --> 3060 <h2 id="nvd-description">NVD Description</h2> 3061 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>curl</code> package and not the <code>curl</code> package as distributed by <code>Ubuntu</code>.</em> 3062 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 3063 <p>curl's websocket code did not update the 32 bit mask pattern for each new 3064 outgoing frame as the specification says. Instead it used a fixed mask that 3065 persisted and was used throughout the entire connection.</p> 3066 <p>A predictable mask pattern allows for a malicious server to induce traffic 3067 between the two communicating parties that could be interpreted by an involved 3068 proxy (configured or transparent) as genuine, real, HTTP traffic with content 3069 and thereby poison its cache. That cached poisoned content could then be 3070 served to all users of that proxy.</p> 3071 <h2 id="remediation">Remediation</h2> 3072 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>curl</code>.</p> 3073 <h2 id="references">References</h2> 3074 <ul> 3075 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-10148">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-10148</a></li> 3076 <li><a href="https://curl.se/docs/CVE-2025-10148.html">https://curl.se/docs/CVE-2025-10148.html</a></li> 3077 <li><a href="https://curl.se/docs/CVE-2025-10148.json">https://curl.se/docs/CVE-2025-10148.json</a></li> 3078 <li><a href="https://hackerone.com/reports/3330839">https://hackerone.com/reports/3330839</a></li> 3079 </ul> 3080 3081 <hr/> 3082 3083 <div class="cta card__cta"> 3084 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-CURL-12613507">More about this vulnerability</a></p> 3085 </div> 3086 3087 </div><!-- .card --> 3088 <div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low"> 3089 <h2 class="card__title">CVE-2025-0167</h2> 3090 <div class="card__section"> 3091 3092 <div class="card__labels"> 3093 <div class="label label--low"> 3094 <span class="label__text">low severity</span> 3095 </div> 3096 </div> 3097 3098 <hr/> 3099 3100 <ul class="card__meta"> 3101 <li class="card__meta__item"> 3102 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 3103 </li> 3104 <li class="card__meta__item"> 3105 Package Manager: ubuntu:24.04 3106 </li> 3107 <li class="card__meta__item"> 3108 Vulnerable module: 3109 3110 curl/libcurl3t64-gnutls 3111 </li> 3112 3113 <li class="card__meta__item">Introduced through: 3114 3115 3116 docker-image|quay.io/argoproj/argocd@v3.0.16, git@1:2.43.0-1ubuntu7.3 and others 3117 </li> 3118 </ul> 3119 3120 <hr/> 3121 3122 3123 <h3 class="card__section__title">Detailed paths</h3> 3124 3125 <ul class="card__meta__paths"> 3126 <li> 3127 <span class="list-paths__item__introduced"><em>Introduced through</em>: 3128 docker-image|quay.io/argoproj/argocd@v3.0.16 3129 <span class="list-paths__item__arrow">›</span> 3130 git@1:2.43.0-1ubuntu7.3 3131 <span class="list-paths__item__arrow">›</span> 3132 curl/libcurl3t64-gnutls@8.5.0-2ubuntu10.6 3133 3134 </span> 3135 3136 </li> 3137 </ul><!-- .list-paths --> 3138 3139 </div><!-- .card__section --> 3140 3141 <hr/> 3142 <!-- Overview --> 3143 <h2 id="nvd-description">NVD Description</h2> 3144 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>curl</code> package and not the <code>curl</code> package as distributed by <code>Ubuntu</code>.</em> 3145 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 3146 <p>When asked to use a <code>.netrc</code> file for credentials <strong>and</strong> to follow HTTP 3147 redirects, curl could leak the password used for the first host to the 3148 followed-to host under certain circumstances.</p> 3149 <p>This flaw only manifests itself if the netrc file has a <code>default</code> entry that 3150 omits both login and password. A rare circumstance.</p> 3151 <h2 id="remediation">Remediation</h2> 3152 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>curl</code>.</p> 3153 <h2 id="references">References</h2> 3154 <ul> 3155 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-0167">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-0167</a></li> 3156 <li><a href="https://curl.se/docs/CVE-2025-0167.json">https://curl.se/docs/CVE-2025-0167.json</a></li> 3157 <li><a href="https://hackerone.com/reports/2917232">https://hackerone.com/reports/2917232</a></li> 3158 <li><a href="https://security.netapp.com/advisory/ntap-20250306-0008/">https://security.netapp.com/advisory/ntap-20250306-0008/</a></li> 3159 <li><a href="https://curl.se/docs/CVE-2025-0167.html">https://curl.se/docs/CVE-2025-0167.html</a></li> 3160 </ul> 3161 3162 <hr/> 3163 3164 <div class="cta card__cta"> 3165 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-CURL-8689015">More about this vulnerability</a></p> 3166 </div> 3167 3168 </div><!-- .card --> 3169 <div class="card card--vuln disclosure--not-new severity--low" data-snyk-test="low"> 3170 <h2 class="card__title">Improper Input Validation</h2> 3171 <div class="card__section"> 3172 3173 <div class="card__labels"> 3174 <div class="label label--low"> 3175 <span class="label__text">low severity</span> 3176 </div> 3177 </div> 3178 3179 <hr/> 3180 3181 <ul class="card__meta"> 3182 <li class="card__meta__item"> 3183 Manifest file: quay.io/argoproj/argocd:v3.0.16/argoproj/argocd <span class="list-paths__item__arrow">›</span> Dockerfile 3184 </li> 3185 <li class="card__meta__item"> 3186 Package Manager: ubuntu:24.04 3187 </li> 3188 <li class="card__meta__item"> 3189 Vulnerable module: 3190 3191 coreutils 3192 </li> 3193 3194 <li class="card__meta__item">Introduced through: 3195 3196 docker-image|quay.io/argoproj/argocd@v3.0.16 and coreutils@9.4-3ubuntu6 3197 3198 </li> 3199 </ul> 3200 3201 <hr/> 3202 3203 3204 <h3 class="card__section__title">Detailed paths</h3> 3205 3206 <ul class="card__meta__paths"> 3207 <li> 3208 <span class="list-paths__item__introduced"><em>Introduced through</em>: 3209 docker-image|quay.io/argoproj/argocd@v3.0.16 3210 <span class="list-paths__item__arrow">›</span> 3211 coreutils@9.4-3ubuntu6 3212 3213 </span> 3214 3215 </li> 3216 </ul><!-- .list-paths --> 3217 3218 </div><!-- .card__section --> 3219 3220 <hr/> 3221 <!-- Overview --> 3222 <h2 id="nvd-description">NVD Description</h2> 3223 <p><strong><em>Note:</em></strong> <em>Versions mentioned in the description apply only to the upstream <code>coreutils</code> package and not the <code>coreutils</code> package as distributed by <code>Ubuntu</code>.</em> 3224 <em>See <code>How to fix?</code> for <code>Ubuntu:24.04</code> relevant fixed versions and status.</em></p> 3225 <p>chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.</p> 3226 <h2 id="remediation">Remediation</h2> 3227 <p>There is no fixed version for <code>Ubuntu:24.04</code> <code>coreutils</code>.</p> 3228 <h2 id="references">References</h2> 3229 <ul> 3230 <li><a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2781">http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2781</a></li> 3231 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2781">https://security-tracker.debian.org/tracker/CVE-2016-2781</a></li> 3232 <li><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a></li> 3233 <li><a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a></li> 3234 <li><a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a></li> 3235 <li><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E</a></li> 3236 </ul> 3237 3238 <hr/> 3239 3240 <div class="cta card__cta"> 3241 <p><a href="https://snyk.io/vuln/SNYK-UBUNTU2404-COREUTILS-6727355">More about this vulnerability</a></p> 3242 </div> 3243 3244 </div><!-- .card --> 3245 </div><!-- cards --> 3246 </div> 3247 </main><!-- .layout-stacked__content --> 3248 </body> 3249 3250 </html>