Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

node:boron vulnerabilities found #617

Closed
IdanAdar opened this issue Jan 28, 2018 · 2 comments
Closed

node:boron vulnerabilities found #617

IdanAdar opened this issue Jan 28, 2018 · 2 comments

Comments

@IdanAdar
Copy link

Is it planned to fix the following?

When scanning an image built (today, for the first time) using FROM node:boron:

VULNERABLE PACKAGES FOUND
=========================

PACKAGE          VULNERABILITIES   CORRECTIVE ACTION   
curl             1                 Upgrade to curl 7.38.0-4+deb8u9   
libxml2          1                 Upgrade to libxml2 2.9.1+dfsg1-5+deb8u6   
sensible-utils   1                 Upgrade to sensible-utils 0.0.9+deb8u1 

And to expand on them:

VULNERABLE PACKAGES FOUND
=========================

curl
   Corrective action: Upgrade to curl 7.38.0-4+deb8u9

   FIX SUMMARY                                OFFICIAL NOTICE                                                        CVE ID   
-  Two vulnerabilities were discovered in     https://lists.debian.org/debian-security-announce/2018/msg00020.html   CVE-2018-1000005,CVE-2018-1000007   
   cURL, an URL transfer library.                                                                                       

libxml2
   Corrective action: Upgrade to libxml2 2.9.1+dfsg1-5+deb8u6

   FIX SUMMARY                                OFFICIAL NOTICE                                                        CVE ID   
-  Nick Wellnhofer discovered that certain    https://lists.debian.org/debian-security-announce/2018/msg00008.html   CVE-2017-15412   
   function calls inside XPath                                                                                          
predicates                                                                                                              
   can lead to use-after-free and                                                                                       
   double-free errors when                                                                                              
executed by                                                                                                             
   libxml2's XPath engine via an XSLT                                                                                   
   transformation.                                                                                                      

sensible-utils
   Corrective action: Upgrade to sensible-utils 0.0.9+deb8u1

   FIX SUMMARY                                OFFICIAL NOTICE                                                        CVE ID   
-  Gabriel Corona reported that               https://lists.debian.org/debian-security-announce/2017/msg00334.html   CVE-2017-17512   
   sensible-browser from sensible-utils,                                                                                
   a                                                                                                                    
collection of small utilities used to                                                                                   
   sensibly select and spawn an                                                                                         
appropriate                                                                                                             
   browser, editor or pager, does not                                                                                   
   validate strings before                                                                                              
launching the                                                                                                           
   program specified by the BROWSER                                                                                     
   environment variable,                                                                                                
potentially                                                                                                             
   allowing a remote attacker to conduct                                                                                
   argument-injection                                                                                                   
attacks if a user is                                                                                                    
   tricked into processing a specially                                                                                  
   crafted URL.                          
@chorrell
Copy link
Contributor

This might be related to #615 and #374

@chorrell
Copy link
Contributor

Closing as this has been answered before in #615 and #374

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants